The authentication method in wireless sensor network based on trust model

Author(s):  
Olesia Voitovych ◽  
Leonid Kupershtein ◽  
Olga Shulyatitska ◽  
Viktor Malyushytskyy
2019 ◽  
Vol 8 (4) ◽  
pp. 11730-11737

Wireless sensor network (WSN) is a noteworthy division in present day correspondence frameworks and faith detecting steering convention is utilized to improve security in WSN. Already, Trust Sensing based Secure Routing Mechanism (TSSRM) was projected which will diminish the overhead steering and improve the unwavering quality of information transmission over the system. In any case, the security tool of this technique might be invalid, if the system steering convention is modified. Hence, in this work, a Parameter and Distributed Trust Based Intrusion Detection System (PDTB-IDS) with a safe correspondence structure with a trust the board framework for remote sensor systems are proposed. The significant commitment is to distinguish different parameters and trust factors that impact trust in WSN is conveyed among different factors, for example, vitality, unwavering quality, information, and so on. Subsequently coordinate believe, proposal believe and circuit trust from those components are determined and the general trust estimation of the sensor hub is evaluated by joining the individual trust esteems. The trust model can decide whether or not the specific hub is pernicious or not by looking at trust got from the proposed method. The numerical assessment of the research work is completed with the help of NS2 simulation environment from which it is proved that the projected strategy provides enhanced outcome than the present TSSRM method.


2021 ◽  
Vol 9 (1) ◽  
pp. 1225-1229
Author(s):  
Dr. Senthilkumar A, Dr. Lekashri S, Abhay Chaturvedi, Dr. R. Manikandan

Trust is an essential parameter among sensor nodes to provide secured and successful communication. Many trust management schemes have been proposed earlier for large scale Wireless Sensor Network (WSN) however not cooperates well in terms of low dependability, memory overheads, large communication etc, therefore a system called Data Traffic Trust Scheme (DTTS) for clustered WSN is proposed here. Here the trust nodes are identified through the data traffic sampling rate. The trust rate is identified through the number of sent and receive data packets and the malicious packets are diagnosed through the un-matching packet rate. The simulation results are evaluated to show the efficiency for the proposed scheme.


2014 ◽  
Vol 622 ◽  
pp. 191-198
Author(s):  
Devasagayam Jayashree ◽  
V. Uma Rani ◽  
K. Soma Sundaram

Due to emerging technology Wireless Sensor Network (WSN), it is necessary to monitor the behavior of sensor nodes and establish the secure communication in network. Security is a challenging task in wireless environment. Several encryption mechanisms are available to prevent outsider attacks, but no mechanism available for insider attacks. A trust model is a collection of rules used to establish co-operation or collaboration among nodes as well as monitoring misbehavior of wireless sensor networks. Trust model is necessary to enhance secure localization, communication or routing, aggregation, collaboration among nodes. In this paper, proposed a behavior based distributed trust model for wireless sensor network to effectively deal with self-ish or malicious nodes. Here, take multidimensional trust attributes derived from communications and networks to evaluate the overall trust of sensor nodes. It monitors the behavior of nodes and establishes secure communication among networks.


2018 ◽  
Vol 14 (02) ◽  
pp. 48
Author(s):  
Rong Shi ◽  
Wang Xi

In order to improve the security of wireless sensor network, the trust model of wireless sensor network based on cloud theory is established. The similarity comparison algorithm is introduced. Trust is expressed as a quantitative value. The new update function is designed to make the acquisition of trust more reasonable. In the research method and algorithm design, the wireless sensor network is different from the traditional network security. The balance problem of wireless sensor network security in algorithm computing strength and security intensity is studied. The results show that the trust model has good robustness. It can identify the malicious nodes accurately and quickly, and prevent the network from being destroyed. Therefore, the idea of cloud theory can effectively improve the security of the network.


Sign in / Sign up

Export Citation Format

Share Document