1 Introduction
2 Related work
3 The proposed scheme
3.1 Trust computation model
3.2 Noise filter method
4 Results and discussion
-
One hundred twenty sensor nodes are randomly deployed in a rectangular region, and a base station is located in the center.
-
Sensor nodes are divided into 8 clusters with 15 nodes in each cluster.
-
The temperature reading of each normal sensor node is within (25, 30).
-
Assume that there are compromised nodes in the network and their data readings are within (40-45).
-
Suppose the NIC of each sensor node is in promiscuous mode so that it can overhear the data packets from its nearby neighbors.
-
To simulate the noise, 5% temperature readings from normal sensor nodes is not within (25, 30).
-
In each simulation, the base station launches 2000 queries to collect temperature readings from the monitored region.