Trust-based LEACH Protocol for Wireless Sensor Networks

被引:0
|
作者
Song, Fei [1 ]
Zhao, Baohua [1 ]
机构
[1] Univ Sci & Technol China, Dept Comp Sci, Hefei 230027, Peoples R China
来源
FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2 | 2008年
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The traditional security solution based on cryptography and authentication is not sufficient for wireless sensor networks, which encounters new challenges from internal attackers, and trust is recognized as a novel approach to defend against such attacks. In this paper we propose a trust-based LEACH(Low Energy Adaptive Clustering Hierarchy) protocol to provide secure routing, while preserving the essential functionalities of the original protocol. The decision-making of our scheme is based on the decision trust, evaluated separately and dynamically for different decisions by basic situational trust. The situational trust is maintained by a trust management module integrated with a trust-based routing module, having novel techniques in trust update model and cluster-head-assisted monitoring control. The simulation results demonstrate the effectiveness of our proposed scheme.
引用
收藏
页码:200 / 205
页数:6
相关论文
共 50 条
  • [1] TrustLP: A Trust-Based Localization Protocol for Wireless Sensor Networks
    Abbas, Ash Mohammad
    2015 13TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2015, : 529 - 536
  • [2] An Improvement of LEACH Routing Protocol Based on Trust for Wireless Sensor Networks
    Wang Weichao
    Du Fei
    Xu Qijian
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3330 - +
  • [3] A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
    Wang, Jian
    Jiang, Shuai
    Fapojuwo, Abraham O.
    SENSORS, 2017, 17 (06):
  • [4] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [5] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39
  • [6] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [7] TruFiX: A Configurable Trust-Based Cross-Layer Protocol for Wireless Sensor Networks
    Umar, Idris Abubakar
    Hanapi, Zurina Mohd
    Sali, A.
    Zulkarnain, Zuriati A.
    IEEE ACCESS, 2017, 5 : 2550 - 2562
  • [8] CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Elhajj, Imad
    Itani, Wassim
    SENSORS, 2015, 15 (02) : 3299 - 3333
  • [9] LEACH Routing Protocol Based on Wireless Sensor Networks
    Wu, Qing
    Yan, Yixin
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (05): : 251 - 258
  • [10] A Enhanced Protocol for LEACH Based Wireless Sensor Networks
    Sun, Yanhong
    Tang, Ming
    2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 344 - 347