Trust aware systems in Wireless Sensor Networks

被引:0
作者
Rani [1 ]
JayaKumar [2 ]
Divya [3 ]
机构
[1] Anna Univ, Madras, Tamil Nadu, India
[2] RMK Engn Coll, Madras, Tamil Nadu, India
[3] Sri Sai Ram Engn Coll, Madras, Tamil Nadu, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15) | 2015年
关键词
security; trust evaluation; wireless sensor network; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Sensor network is an adaptable technology for perceiving environmental criterions and hence finds its pivotal role in a wide range of applications. The applications range from mission critical like military or patient monitoring systems to home surveillance systems where the network may be prone to security attacks. The network is vulnerable to attack as it may be deployed in hostile environments. In addition it may be exposed to attacks due to the inherent feature of not incorporating security mechanisms into the nodes. Hence additional programs for security may be added in the network. One such scheme is making the network a trust ware system. The trust computation serves as a powerful tool in the detection of unexpected node behaviour. In this paper we propose a trust mechanism to determine the trustworthiness of the sensor node. Most of the existing trust aware systems are centralised and suffer from single head failure. In this paper we propose a dynamic and decentralized system.
引用
收藏
页码:174 / 179
页数:6
相关论文
共 20 条
  • [11] Pissinou N., 2007, P INT C CONS COMM NE
  • [12] Ren Y., 2012, P IEEE INT C MOB DAT
  • [13] A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
    Ren, Yi
    Zadorozhny, Vladimir I.
    Oleshchuk, Vladimir A.
    Li, Frank Y.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1409 - 1423
  • [14] Taghikhaki Z., 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P584, DOI 10.1109/INFCOMW.2011.5928881
  • [15] On trust models and trust evaluation metrics for ad hoc networks
    Theodorakopoulos, G
    Baras, JS
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 318 - 328
  • [16] Umarani V., 2013, International Journal of Emerging Technology and Advanced Engineering, V3, P180
  • [17] An Energy-Efficient Clustering Solution for Wireless Sensor Networks
    Wei, Dali
    Jin, Yichao
    Vural, Serdar
    Moessner, Klaus
    Tafazolli, Rahim
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (11) : 3973 - 3983
  • [18] Trust prediction and trust-based source routing in mobile ad hoc networks
    Xia, Hui
    Jia, Zhiping
    Li, Xin
    Ju, Lei
    Sha, Edwin H. -M.
    [J]. AD HOC NETWORKS, 2013, 11 (07) : 2096 - 2114
  • [19] Yadav Kuldeep., 2010, P ACM S APPL COMPUTI, P1466, DOI DOI 10.1145/1774088.1774402
  • [20] Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    Yu, Yanli
    Li, Keqiu
    Zhou, Wanlei
    Li, Ping
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 867 - 880