Privacy Preserving efficient trusted model in WSN
DOI:
https://doi.org/10.26438/ijcse/v6i4.179184Keywords:
Trust management, Security in wireless sensor networks, direct trust, indirect trust, Shortest path calculationAbstract
In wireless sensor networks (WSNs), many factors, for instance, mutual interference of wireless connections, battlefield applications and nodes presented to the environment without top physical safety, effects in the sensor nodes being extra powerless in against to the attacked a compromised. For tackling the issues security, an effective appropriated trust model is proposed. They faces some issues, first is system was not focus on other trust metrics Trust is evaluated by the two ways direct and indirect trust on the basis of recommendation from third party. The third issue is offering the trust assessment on-neighbour nodes become very essential. Fourth, trust relationship between sensor nodes frequently modified in wireless sensor networks because of the dynamic topology. For solving all these issues proposed the efficient distributed trust model for wireless sensor networks. This system can estimate dependability of sensor nodes more accurately and prevent the security breaches more considerably. Also for sending the data from subject node to object there are number of paths are generated, in this system we used Dijkastra algorithm for finding the shortest path. Also for the existing system faces the problem of security against the different attacks on network. For security purpose we used ECC algorithm. Experimental result shows that energy consumption for proposed system and existing system.
References
guangjie Han, Jinfang Jiang ,Feng Wang, Lei Shu and Mohsen Guizani, "An Efficient Distributed Trust Model for Wireless Sensor Networks" May 2015.
Y. S. Moon, H. S. Lim, and E. Bertino, "Provenance based trustworthiness assessment in sensor networks" 2010
P. Mohapatra, K. Govindan "Trust computations and trust dynamics in mobile ad hoc networks: A survey," 2012
Y. Dong, H. Guo, G. Han, L. Shu, and D. Wu, "Cross-layer optimized routing in WSN with duty-cycle and energy harvesting, Wireless Commun" 2014
T. Schulze, K. Nordheimer and D. Veit, "Trustworthiness in networks:A simulation approach for approximating local trust and distrust values" 2010
L. K. Balzano, S. Ganeriwal, and M. B. Srivastava, "Reputation based framework for high integrity sensor networks" 2004
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
