Downloads: 1 | Views: 169 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
New Innovation and Idea | Computer Science | India | Volume 11 Issue 6, June 2022 | Popularity: 4.5 / 10
A Trust Based Mechanism for Preventing Noncooperative Eaves Dropping in WSN
C. Nithya Praba, Dr. D. Kalaivani
Abstract: The eaves dropping attack is a serious security threat to a wirelesses or network (WSN) since the eaves dropping attack is a prerequisite for other attacks. The traditional security solution based on cryptography and authentication is not sufficient for wireless sensor networks, which encounters new challenges from internal attackers, and trust is recognized as a novel approach to defend against such attacks. In this paper, we propose a trust-based LEACH (low energy adaptive clustering hierarchy) protocol for clustering to provide secure routing, while preserving the essential functionalities of the original protocol. Within the cluster, a measurable indirect trust of a CM (Cluster Member) is evaluated by its CH (Cluster Head). Thus each CM does not need to maintain the feedback from other CMs, which will reduce the communication overhead and eliminate the possibility of a Eaves Dropping attack by compromised CMs. A source and sink network is considered, and the intra cluster communication between the source and the sink is subject to non cooperative eavesdropping on each link. Without compromising any nodes an attacker can interrupt the network system. The proposed trust management detects the malicious behavior of the eavesdropped nodes. It is based on four trust components intimacy, honesty, energy, unselfishness of the nodes.
Keywords: Network, Cluster head, sink node, Eavesdropping
Edition: Volume 11 Issue 6, June 2022
Pages: 401 - 404
DOI: https://www.doi.org/10.21275/SR22530161552
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 203 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science, United States of America, Volume 9 Issue 9, September 2020
Pages: 1095 - 1100Maintaining Social Distancing using Artificial Intelligence
Krish Chaudhary
Downloads: 0
Review Papers, Computer Science, India, Volume 11 Issue 7, July 2022
Pages: 1263 - 1270A Comparative Review of Recent Architectures of Convolutional Neural Networks
Kalpana Devi, Aman Kumar Sharma
Downloads: 0
Analysis Study Research Paper, Computer Science, India, Volume 11 Issue 11, November 2022
Pages: 85 - 90Analysis of an Ensemble Model for Network Intrusion Detection
Rahul R S, Rithvik M, Gururaja H S, Vikram K
Downloads: 0
Research Paper, Computer Science, India, Volume 11 Issue 11, November 2022
Pages: 648 - 656Cloud Mining based Congestion Control Blockchain DB
Arvind Kumar Maurya, Avinash Singh, Upendra Nath Tripathi
Downloads: 0
Research Paper, Computer Science, India, Volume 13 Issue 7, July 2024
Pages: 495 - 498Enhanced Daily Activity Recognition in Smart Homes: Leveraging Feature Selection, Neural Networks, and Appliance Load Signatures
Bina Ajaykumar Shah, Dr. Nagesh Salimath