An Energy-efficient System of Counteraction against Attacks in the Mobile Wireless Sensor Networks

被引:0
作者
Basan, Elena [1 ]
Makarevich, Oleg [1 ]
机构
[1] Southern Fed Univ, Dept Informat Secur, Taganrog, Russia
来源
2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY | 2015年
关键词
Wireless sensor networks; clustering; attacks; trust; algorithms; anomaly detection; trust evaluation; security; protocol; REPUTATION; TRUST;
D O I
10.1109/CyberC.2015.72
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is to create a model of secure wireless sensor network (WSN), which is able to defend against most of known network attacks and don't significantly reduce the energy power of sensor nodes (SN). We propose clustering as a way of network organization, which allows reducing energy consumption. Network Protection is based on the calculation of the trust level and the establishment of trusted relationships between trusted nodes. Operation of trust management system is based on a centralized method.
引用
收藏
页码:403 / 410
页数:8
相关论文
共 19 条
  • [1] Abramov E.S., 2013, SIN 13 P 6 INT C SEC, P372
  • [2] Abramov E. S., 2014, ENG SCI, V2, P101
  • [3] Abramov E.S., 2013, P INT SCI PRACT C IN, V1, P60
  • [4] Abramov E. S., 2012, P 13 INT SCI PRACT 1, P60
  • [5] Akkaya K., 2005, Ad Hoc Networks, V3, P325, DOI 10.1016/j.adhoc.2003.09.010
  • [6] [Anonymous], 2003, P 12 INT C WORLD WID
  • [7] [Anonymous], P SFEDU ENG INF SEC
  • [8] [Anonymous], 2014, SCIENCERISE
  • [9] Bin Yu, 2002, Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, P294
  • [10] A lightweight trust management based on Bayesian and Entropy for wireless sensor networks
    Che, Shenyun
    Feng, Renjian
    Liang, Xuan
    Wang, Xiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 168 - 175