scholarly journals Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey

2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Weidong Fang ◽  
Wuxiong Zhang ◽  
Wei Chen ◽  
Tao Pan ◽  
Yepeng Ni ◽  
...  

As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical. Due to constrained resources of sensor node, WSN is becoming a vulnerable target to many security attacks. Compared to external attacks, it is more difficult to defend against internal attacks. The former can be defended by using encryption and authentication schemes. However, this is invalid for the latter, which can obtain all keys of the network. The studies have proved that the trust management technology is one of effective approaches for detecting and defending against internal attacks. Hence, it is necessary to investigate and review the attack and defense with trust management. In this paper, the state-of-the-art trust management schemes are deeply investigated for WSN. Moreover, their advantages and disadvantages are symmetrically compared and analyzed in defending against internal attacks. The future directions of trust management are further provided. Finally, the conclusions and prospects are given.

Author(s):  
Riaz Ahmed Shaikh ◽  
Brian J. dAuriol ◽  
Heejo Lee ◽  
Sungyoung Lee

Until recently, researchers have focused on the cryptographic-based security issues more intensively than the privacy and trust issues. However, without the incorporation of trust and privacy features, cryptographic-based security mechanisms are not capable of singlehandedly providing robustness, reliability and completeness in a security solution. In this chapter, we present generic and flexible taxonomies of privacy and trust. We also give detailed critical analyses of the state-of-the-art research, in the field of privacy and trust that is currently not available in the literature. This chapter also highlights the challenging issues and problems.


2020 ◽  
Vol 10 (1) ◽  
pp. 5108-5112
Author(s):  
M. B. Apsara ◽  
P. Dayananda ◽  
C. N. Sowmyarani

Wireless Sensor Networks (WSNs) is a fast-emerging technology which has become an integral part of the research. WSNs have various applications covering military, environment monitoring, health care, surveillance, national security, etc. Due to the inherent nature of wireless communication, such types of networks are more vulnerable to security attacks, and the authentication and confidentiality of wireless networks are much more critical. WSNs needs include efficient clustering methods, data aggregation methods, data compression methods, data encryption and authentication methods, and data gathering methods. WSNs are more vulnerable to attacks due to their ad hoc nature, so the design of a good key management scheme to provide security is necessary. In this paper, different methods of clustering, data aggregation, data compression, data encryption and authentication, and data gathering are analyzed. A survey is conducted on the key management schemes of WSNs.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2020 ◽  
Vol 26 ◽  
Author(s):  
Emir Muzurović ◽  
Zoja Stanković ◽  
Zlata Kovačević ◽  
Benida Šahmanović Škrijelj ◽  
Dimitri P Mikhailidis

: Diabetes mellitus (DM) is a chronic and complex metabolic disorder, and also an important cause of cardiovascular (CV) diseases (CVDs). Subclinical inflammation, observed in patients with type 2 DM (T2DM), cannot be considered the sole or primary cause of T2DM in the absence of classical risk factors, but it represents an important mechanism that serves as a bridge between primary causes of T2DM and its manifestation. Progress has been made in the identification of effective strategies to prevent or delay the onset of T2DM. It is important to identify those at increased risk for DM by using specific biomarkers. Inflammatory markers correlate with insulin resistance (IR) and glycoregulation in patients with DM. Also, several inflammatory markers have been shown to be useful in assessing the risk of developing DM and its complications. However, the intertwining of pathophysiological processes and the not-quite-specificity of inflammatory markers for certain clinical entities limits their practical use. In this review we consider the advantages and disadvantages of various inflammatory biomarkers of DM that have been investigated to date as well as possible future directions. Key features of such biomarkers should be high specificity, non-invasiveness and cost-effectiveness.


2019 ◽  
Vol 28 (04) ◽  
pp. 1930005 ◽  
Author(s):  
Michael A. Famiano

Nuclear masses are the most fundamental of all nuclear properties, yet they can provide a wealth of knowledge, including information on astrophysical sites, constraints on existing theory, and fundamental symmetries. In nearly all applications, it is necessary to measure nuclear masses with very high precision. As mass measurements push to more short-lived and more massive nuclei, the practical constraints on mass measurement techniques become more exacting. Various techniques used to measure nuclear masses, including their advantages and disadvantages are described. Descriptions of some of the world facilities at which the nuclear mass measurements are performed are given, and brief summaries of planned facilities are presented. Future directions are mentioned, and conclusions are presented which provide a possible outlook and emphasis on upcoming plans for nuclear mass measurements at existing facilities, those under construction, and those being planned.


Sign in / Sign up

Export Citation Format

Share Document