Author : Navami Patil G M 1
Date of Publication :7th May 2016
Abstract: the principle venture resist through remote sensor systems is security. Acknowledge as valid with models had been nowadays guided as a productive security way for WSNs. In this errand, it prompt a trust model for secure directing and restricting malignant assailants in WSN. To start with, report conviction, vitality conviction and data acknowledge as valid with are mulled over at some stage in the estimation of direct consider. Moreover, if the source and destination hubs are far away, then exhortation and diagonal concur with are figured. Consider consistency and consideration are characterized to reinforce the rightness of exhortation conviction. Malignant hubs might be related to low conviction values that is distinguished in direct and proposal concur with figuring. The proposed model can think about constancy of sensor hubs more prominent effectively and maintain a strategic distance from the security breaks additional accurately
Reference :
-
[1] Jinan Jiang, Guangjie Han, Feng Wang, Lei Shu, Member, IEEE, and Mohsen Guizani, “An Efficient Distributed Trust Model for Wireless Sensor Networks” Fellow, IEEE Transactions on Paralel and Distributed Systems, vol.26, no 5, may 2015.
[2] H. Chan and A Perrig, “Security and privacy in sensor networks,” Comput., vol. 36, no. 10, pp. 103–105, Oct. 2003.
[3] Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, “Pervasive, secure access to a hierarchical- based healthcare monitoring architecture in wireless heterogeneous sensor networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 7, pp. 400– 411, May 2009.
[4] V. C. Gungor, L. Bin, and G. P. Hancke, “Opportunities and challenges of wireless sensor networks in smart grid,” IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557–3564, Oct. 2010.
[5] G. Han, J. Jiang, L. Shu, J. Niu, and H. C. Chao, “Managements and applications of trust in wireless sensor networks: A Survey,” J. Comput. Syst. Sci., vol. 80, no. 3, pp. 602–617, 2014.
[6] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputation based framework for high integrity sensor networks,” in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 66–77
[7] Z. Yao, D. Kim, and Y. Doh, “PLUS: Parameterized and localized trust management scheme for sensor networks security,” in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2008, pp. 437–446.
[8] R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory,” Sensors, vol. 11, pp. 1345–1360, 2011