Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Security Provision in Wireless Sensor Networks on the Basis of the Trust Model

verfasst von: T. D. Ovasapyan, D. V. Ivanov

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This article considers security provision in wireless sensor networks on the basis of the trust model. The operating principles of sensor networks are analyzed, and the classification of routing techniques is composed. Typical threats are analyzed and existing attacks against Wireless Sensor Networks (WSNs) identified. A technique of protection against malicious nodes is elaborated using the trust model. The experimental assessment of the technique for efficiency is performed by modeling its work in a WSN simulator.
Literatur
1.
Zurück zum Zitat Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835–843.CrossRef Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835–843.CrossRef
2.
Zurück zum Zitat Amitoj, K., Gursimrat, S., and Jagroop, K., SPIN: A Data Centric Protocol For Wireless Sensor Networks. https://www.ijert.org/view-pdf/2701/spin-a-data-centric-protocol-for-wireless-sensor-networks. Accessed October 10, 2017. Amitoj, K., Gursimrat, S., and Jagroop, K., SPIN: A Data Centric Protocol For Wireless Sensor Networks. https://​www.​ijert.​org/​view-pdf/​2701/​spin-a-data-centric-protocol-for-wireless-sensor-networks.​ Accessed October 10, 2017.
3.
Zurück zum Zitat Idrees, S., Chee-Onn, C., Hiroshi, I., and Tanveer, A., Threat Models and Security Issues in Wireless Sensor Networks. https://www.ijcte.org/papers/806-Z1040.pdf. Accessed October 10, 2017. Idrees, S., Chee-Onn, C., Hiroshi, I., and Tanveer, A., Threat Models and Security Issues in Wireless Sensor Networks. https://​www.​ijcte.​org/​papers/​806-Z1040.​pdf.​ Accessed October 10, 2017.
4.
Zurück zum Zitat Aitmagambetov, A. and Postol’skii, S., Review of problem areas in the security of wireless sensor networks, attacks and their defense mechanisms. https://sibac.info/studconf/tech/xxxii/42203. Accessed October 10, 2017. Aitmagambetov, A. and Postol’skii, S., Review of problem areas in the security of wireless sensor networks, attacks and their defense mechanisms. https://​sibac.​info/​studconf/​tech/​xxxii/​42203.​ Accessed October 10, 2017.
5.
Zurück zum Zitat Zahariadis, T., Leligou, H., and Karkazis, P., Design and implementation of a trust-aware routing protocol for large WSNs. https://www.ics.uci.edu/~dsm/ics280sensor/readings/networks/routing-survey.pdf. Accessed October 10, 2017. Zahariadis, T., Leligou, H., and Karkazis, P., Design and implementation of a trust-aware routing protocol for large WSNs. https://​www.​ics.​uci.​edu/​~dsm/​ics280sensor/​readings/​networks/​routing-survey.​pdf.​ Accessed October 10, 2017.
Metadaten
Titel
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
verfasst von
T. D. Ovasapyan
D. V. Ivanov
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080205

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt