Trust Model for Secure Routing and Localizing Malicious Attackers in WSN

被引:1
作者
Patil, G. M. Navami [1 ]
Basarkod, P. I. [1 ]
机构
[1] VTU, REVA Inst Technol & Management, Dept Elect & Commun, Bengaluru, India
来源
COMPUTING AND NETWORK SUSTAINABILITY | 2017年 / 12卷
关键词
Security; Routing protocols; Belief levels; WIRELESS SENSOR NETWORKS;
D O I
10.1007/978-981-10-3935-5_1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The principle venture resists through remote sensor systems is security. Acknowledge as valid with models had been nowadays guided as a productive security way for WSNs. In this errand, it prompts a trust model for secure directing and restricting malignant assailants in WSN. To start with, report conviction, vitality conviction, and data acknowledge as valid with are mulled over at some stage in the estimation of direct consideration. Moreover, if the source and destination hubs are far away, then exhortation and diagonal concur with are figured. Consider, consistency and consideration are characterized to reinforce the rightness of exhortation conviction. Malignant hubs might be related to low conviction values that is distinguished in direct and proposal concur with figuring. The proposed model can think about constancy of sensor hubs more prominent effectively and maintain a strategic distance from the security breaks additional accurately.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 8 条
[1]  
[Anonymous], 2004, INPROCEEDINGS ACM
[2]   Security and privacy in sensor networks [J].
Chan, HW ;
Perrig, A .
COMPUTER, 2003, 36 (10) :103-105
[3]   A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory [J].
Feng, Renjian ;
Xu, Xiaofeng ;
Zhou, Xiang ;
Wan, Jiangwen .
SENSORS, 2011, 11 (02) :1345-1360
[4]   Opportunities and Challenges of Wireless Sensor Networks in Smart Grid [J].
Gungor, Vehbi C. ;
Lu, Bin ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (10) :3557-3564
[5]   Management and applications of trust in Wireless Sensor Networks: A survey [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shu, Lei ;
Niu, Jianwei ;
Chao, Han-Chieh .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) :602-617
[6]   Pervasive, Secure Access to a Hierarchical Sensor-Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks [J].
Huang, Y. M. ;
Hsieh, M. Y. ;
Chao, H. C. ;
Hung, S. H. ;
Park, J. H. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (04) :400-411
[7]  
Jiang J., 2015, IEEE T PARALLEL DIST, V26
[8]  
Yao Z., 2008, IEEE INT C MOB AD HO, P437