Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

Trust Model for Secure Routing and Localizing Malicious Attackers in WSN

verfasst von : G. M. Navami Patil, P. I. Basarkod

Erschienen in: Computing and Network Sustainability

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The principle venture resists through remote sensor systems is security. Acknowledge as valid with models had been nowadays guided as a productive security way for WSNs. In this errand, it prompts a trust model for secure directing and restricting malignant assailants in WSN. To start with, report conviction, vitality conviction, and data acknowledge as valid with are mulled over at some stage in the estimation of direct consideration. Moreover, if the source and destination hubs are far away, then exhortation and diagonal concur with are figured. Consider, consistency and consideration are characterized to reinforce the rightness of exhortation conviction. Malignant hubs might be related to low conviction values that is distinguished in direct and proposal concur with figuring. The proposed model can think about constancy of sensor hubs more prominent effectively and maintain a strategic distance from the security breaks additional accurately.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103–105CrossRef Chan H, Perrig A (2003) Security and privacy in sensor networks. Computer 36(10):103–105CrossRef
2.
Zurück zum Zitat Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 11:1345–1360CrossRef Feng R, Xu X, Zhou X, Wan J (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory. Sensors 11:1345–1360CrossRef
3.
Zurück zum Zitat Ganeriwal S, Balzano LK, Srivastava MB (2004) Reputation based framework for high integrity sensor networks. In: Proceedings of 2nd ACM workshop security ad hoc sensor networks, pp 66–77 Ganeriwal S, Balzano LK, Srivastava MB (2004) Reputation based framework for high integrity sensor networks. In: Proceedings of 2nd ACM workshop security ad hoc sensor networks, pp 66–77
4.
Zurück zum Zitat Gungor VC, Bin L, Hancke GP (2010) Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans Ind Electron 57(10):3557–3564CrossRef Gungor VC, Bin L, Hancke GP (2010) Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans Ind Electron 57(10):3557–3564CrossRef
5.
Zurück zum Zitat Han G, Jiang J, Shu L, Niu J, Chao HC (2014) Managements and applications of trust in wireless sensor networks: a survey. J Comput Syst Sci 80(3):602–617CrossRefMATH Han G, Jiang J, Shu L, Niu J, Chao HC (2014) Managements and applications of trust in wireless sensor networks: a survey. J Comput Syst Sci 80(3):602–617CrossRefMATH
6.
Zurück zum Zitat Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH (2009) Pervasive, secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks. IEEE J Sel Areas Commun 24(7):400–411CrossRef Huang YM, Hsieh MY, Chao HC, Hung SH, Park JH (2009) Pervasive, secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks. IEEE J Sel Areas Commun 24(7):400–411CrossRef
7.
Zurück zum Zitat Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5) Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5)
8.
Zurück zum Zitat Yao Z, Kim D, Doh Y (2008) PLUS: parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE international conference mobile adhoc sensor systems, pp 437–446 Yao Z, Kim D, Doh Y (2008) PLUS: parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE international conference mobile adhoc sensor systems, pp 437–446
Metadaten
Titel
Trust Model for Secure Routing and Localizing Malicious Attackers in WSN
verfasst von
G. M. Navami Patil
P. I. Basarkod
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3935-5_1

Neuer Inhalt