Skip to main content
Top
Published in:
Cover of the book

2017 | OriginalPaper | Chapter

Trust Model for Secure Routing and Localizing Malicious Attackers in WSN

Authors : G. M. Navami Patil, P. I. Basarkod

Published in: Computing and Network Sustainability

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The principle venture resists through remote sensor systems is security. Acknowledge as valid with models had been nowadays guided as a productive security way for WSNs. In this errand, it prompts a trust model for secure directing and restricting malignant assailants in WSN. To start with, report conviction, vitality conviction, and data acknowledge as valid with are mulled over at some stage in the estimation of direct consideration. Moreover, if the source and destination hubs are far away, then exhortation and diagonal concur with are figured. Consider, consistency and consideration are characterized to reinforce the rightness of exhortation conviction. Malignant hubs might be related to low conviction values that is distinguished in direct and proposal concur with figuring. The proposed model can think about constancy of sensor hubs more prominent effectively and maintain a strategic distance from the security breaks additional accurately.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103–105CrossRef Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103–105CrossRef
2.
go back to reference Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 11:1345–1360CrossRef Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 11:1345–1360CrossRef
3.
go back to reference Ganeriwal S, Balzano LK, Srivastava MB (2004) Reputation based framework for high integrity sensor networks. In: Proceedings of 2nd ACM workshop security ad hoc sensor networks, pp 66–77 Ganeriwal S, Balzano LK, Srivastava MB (2004) Reputation based framework for high integrity sensor networks. In: Proceedings of 2nd ACM workshop security ad hoc sensor networks, pp 66–77
4.
go back to reference Gungor VC, Bin L, Hancke GP (2010) Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans Ind Electron 57(10):3557–3564CrossRef Gungor VC, Bin L, Hancke GP (2010) Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans Ind Electron 57(10):3557–3564CrossRef
5.
go back to reference Han G, Jiang J, Shu L, Niu J, Chao HC (2014) Managements and applications of trust in wireless sensor networks: a survey. J Comput Syst Sci 80(3):602–617CrossRefMATH Han G, Jiang J, Shu L, Niu J, Chao HC (2014) Managements and applications of trust in wireless sensor networks: a survey. J Comput Syst Sci 80(3):602–617CrossRefMATH
6.
go back to reference Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH (2009) Pervasive, secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks. IEEE J Sel Areas Commun 24(7):400–411CrossRef Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH (2009) Pervasive, secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks. IEEE J Sel Areas Commun 24(7):400–411CrossRef
7.
go back to reference Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5) Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5)
8.
go back to reference Yao Z, Kim D, Doh Y (2008) PLUS: parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE international conference mobile adhoc sensor systems, pp 437–446 Yao Z, Kim D, Doh Y (2008) PLUS: parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE international conference mobile adhoc sensor systems, pp 437–446
Metadata
Title
Trust Model for Secure Routing and Localizing Malicious Attackers in WSN
Authors
G. M. Navami Patil
P. I. Basarkod
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3935-5_1