Downloads: 108 | Views: 254
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.6 / 10
Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network
Pradnya S. Kulkarni, Dr. Aarti Dixit
Abstract: A sensor system will review our health, our home, the streets we follow, the workplace or the industry we work in or even the aircrafts we use, trying to improve our safety. Notwithstanding, the wireless sensor networks themselves are inclined to security attacks. The list of security attacks, in spite of the fact that officially exceptionally long, keeps on enlarging obstructing the development of these networks. The trust management schemes comprise of a powerful tool for the detection of unexpected node behaviors either malicious or faulty. In wireless sensor networks, sensor nodes in the region of interest must report the cognitiveprocess to the sink by sensing, and this report will satisfies the report frequency necessary by the sink. Inside the domain of system security, we decipher the idea of trust as a connection among entities that take part in different conventions. Trust relations are focused around confirmation made by the past connections of substances inside a convention. In wireless sensor network the resource efficiency and reliability of a trust system are the most basic supplies. Due to the low reliability and high overhead the developed existing trust systems for wireless sensor networks are unable of satisfying these supplies. Therefore there is need to propose a lightweight and reliable trust system which can efficientlydecrease the networking consumption while malicious, selfish and faulty cluster heads and also exceeds the limitations of traditional weighting methods for trust factors in which weights are allocated subjectively and also insist less communication overhead and memory.
Keywords: Wireless sensor network, trust management, reputation, trust model, self-adaptivity
Edition: Volume 3 Issue 11, November 2014
Pages: 1727 - 1731
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 805 - 811Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method
Aruna Reddy H., Shivamurthy G., Rajanna M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey