期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN 被引量:1
1
作者 shaik sahil babu Arnab Raha Mrinal Kanti Naskar 《Wireless Sensor Network》 2014年第8期157-172,共16页
In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they can... In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink. Alternatively, trust management schemes are tools to evaluate the trust of a node and thereby choosing a node for routing, and also detecting their unexpected node behaviour (either faulty or malicious). In this paper, we propose TENCR: a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations. The proposed new technique detects the malicious and selfish nodes very efficiently than the arithmetic mean based methods, and allows trustworthy nodes in routing, thereby eliminating malicious/selfish nodes. Our proposed trust evaluation method is adaptive and energy efficient that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish. Hence, trustworthy nodes only be allowed in routing, and malicious/selfish nodes will be eliminated automatically. 展开更多
关键词 WIRELESS Sensor Network TRUST SECURITY
下载PDF
A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)
2
作者 shaik sahil babu Arnab Raha Mrinal Kanti Naskar 《Wireless Sensor Network》 2011年第4期125-134,共10页
The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, l... The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth. It is not economic and feasible because, depending on the application, WSN nodes are high-volume in number (hence, limited resources at each node), deployment area may be hazardous, unattended and/or hostile and sometimes dangerous. As WSNs are characterized by severely constrained resources and requirement to operate in an ad-hoc manner, security functionality implementation to protect nodes from adversary forces and secure routing of message from source node to base station has become a challenging task. In this paper, we present a direct trust dependent link state routing using route trusts which protects WSNs against routing attacks by eliminating the un-trusted nodes before making routes and finding best trustworthy route among them. We compare our work with the most prevalent routing protocols and show its benefits over them. 展开更多
关键词 Wireless Sensor Network (WSN) Geometric Mean (GM) Direct TRUST Indirect TRUST ROUTE TRUST (RT) Base Station (BS) Benevolent NODE MALICIOUS NODE Homogeneous Nodes PACKET LATENCY PACKET Transmission Rate MATLAB
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部