Privacy Preserving efficient trusted model in WSN

Authors

  • Ligade KK Department of Computer Engineering, SKNCOE, Vadgaon, Pune, Savitribai Phule University, Pune, India
  • Pingat SP Department of Computer Engineering, SKNCOE, Vadgaon, Pune, Savitribai Phule University, Pune, India

DOI:

https://doi.org/10.26438/ijcse/v6i4.179184

Keywords:

Trust management, Security in wireless sensor networks, direct trust, indirect trust, Shortest path calculation

Abstract

In wireless sensor networks (WSNs), many factors, for instance, mutual interference of wireless connections, battlefield applications and nodes presented to the environment without top physical safety, effects in the sensor nodes being extra powerless in against to the attacked a compromised. For tackling the issues security, an effective appropriated trust model is proposed. They faces some issues, first is system was not focus on other trust metrics Trust is evaluated by the two ways direct and indirect trust on the basis of recommendation from third party. The third issue is offering the trust assessment on-neighbour nodes become very essential. Fourth, trust relationship between sensor nodes frequently modified in wireless sensor networks because of the dynamic topology. For solving all these issues proposed the efficient distributed trust model for wireless sensor networks. This system can estimate dependability of sensor nodes more accurately and prevent the security breaches more considerably. Also for sending the data from subject node to object there are number of paths are generated, in this system we used Dijkastra algorithm for finding the shortest path. Also for the existing system faces the problem of security against the different attacks on network. For security purpose we used ECC algorithm. Experimental result shows that energy consumption for proposed system and existing system.

References

guangjie Han, Jinfang Jiang ,Feng Wang, Lei Shu and Mohsen Guizani, "An Efficient Distributed Trust Model for Wireless Sensor Networks" May 2015.

Y. S. Moon, H. S. Lim, and E. Bertino, "Provenance based trustworthiness assessment in sensor networks" 2010

P. Mohapatra, K. Govindan "Trust computations and trust dynamics in mobile ad hoc networks: A survey," 2012

Y. Dong, H. Guo, G. Han, L. Shu, and D. Wu, "Cross-layer optimized routing in WSN with duty-cycle and energy harvesting, Wireless Commun" 2014

T. Schulze, K. Nordheimer and D. Veit, "Trustworthiness in networks:A simulation approach for approximating local trust and distrust values" 2010

L. K. Balzano, S. Ganeriwal, and M. B. Srivastava, "Reputation based framework for high integrity sensor networks" 2004

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i4.179184
Published: 2025-11-12

How to Cite

[1]
K. Ligade and S. Pingat, “Privacy Preserving efficient trusted model in WSN”, Int. J. Comp. Sci. Eng., vol. 6, no. 4, pp. 179–184, Nov. 2025.

Issue

Section

Research Article