A Comparative Analysis of Trust Based Applications in Wireless Sensor Networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The wireless sensor network is a type of ad hoc network which is vulnerable to security attacks, specifically insider attacks. In spite of the fact that confidentiality, integrity and authentication helps in forestalling the particular sort of attacks, but they come at an expense. A traditional and evergreen concept of the trust evaluation and management, among the nodes of a network, for communication is a good and effective security measure. Overseeing trust in a distributed wireless sensor network is a challenging task when coordinated effort or participation is must in accomplishing mission and framework objectives. The paper represents a survey of various trust applications which are very helpful for carrying out a secure data transmission in a sensor network. The analysed trust applications malicious attack detection, secure data aggregation, secure node selection and secure routing.  

     

     


  • Keywords


    Malicious attack detection, secure data aggregation, secure node selection, trust applications, wireless sensor networks.

  • References


      [1] Z. Ye, T. Wen, Z. Liu, X. Song, and C. Fu, “An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks,” J. Sensors, vol. 2017, pp. 1–16, Oct. 2017.

      [2] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Commun. Surv. Tutorials Tutorials, vol. 13, no. 4, pp. 562–583, 2011.

      [3] Y. Liu and C. L. Q. Zeng, “Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks,” Telecommun. Syst., 2015.

      [4] I. M. U. B. A. R. Naseer, “Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks,” vol. 3, no. May 2008, pp. 846–858, 2009.

      [5] T. Zahariadis, P. Trakadas, H. C. Leligou, and S. Maniatis, “A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks,” pp. 805–826, 2013.

      [6] S. Ozdemir, “Functional Reputation Based Data Aggregation for Wireless Sensor Networks,” pp. 592–597, 2008.

      [7] X. A. M. A. Bhagyaveni and J. M. Leo, “for Wireless Sensor Networks,” pp. 117–140, 2015.

      [8] A. Ahmed, K. A. B. U. Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, “3.A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks,” Front. Comput. Sci., vol. 9, no. 2, pp. 280–296, 2015.

      [9] K. P. Rama Prabha and N. Jeyanthi, “A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks,” Wirel. Pers. Commun., vol. 98, no. 3, pp. 2959–2974, 2018.

      [10] I. Chlamtac, M. Conti, and J. J. N. Liu, “Mobile ad hoc networking: Imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003.

      [11] M. Ma and Y. Yang, “SenCar: An Energy-Efficient Data Gathering Mechanism for Large-Scale Multihop Sensor Networks,” IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 10, pp. 1476–1488, Oct. 2007.

      [12] H. A. Rahhal, I. A. Ali, and S. I. Shaheen, “A novel Trust-Based Cross-Layer Model for Wireless Sensor Networks,” in 2011 28th National Radio Science Conference (NRSC), 2011, pp. 1–10.

      [13] N. Lewis and N. Foukia, “An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes,” in 2008 Sixth Annual Conference on Privacy, Security and Trust, 2008, pp. 151–155.

      [14] H. Xia, E. H.-M. Sha, and Z. Jia, “Research of trust model based on fuzzy theory in mobile ad hoc networks,” IET Inf. Secur., vol. 8, no. 2, pp. 88–103, 2014.

      [15] F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection,” IEEE Trans. Netw. Serv. Manag., vol. 9, no. 2, pp. 169–183, Jun. 2012.

      [16] Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,” J. Netw. Comput. Appl., vol. 35, no. 3, pp. 867–880, May 2012.

      [17] G. Han, J. Jiang, L. Shu, J. Niu, and H. Chao, “Journal of Computer and System Sciences Management and applications of trust in Wireless Sensor Networks : A survey,” J. Comput. Syst. Sci., vol. 80, no. 3, pp. 602–617, 2014.

      [18] R. A. Shaikh, H. Jameel, Sungyoung Lee, S. Rajput, and Young Jae Song, “Trust Management Problem in Distributed Wireless Sensor Networks,” in 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’06), 2006, pp. 411–414.

      [19] M. R. Ahmed, X. Huang, D. Sharma, and H. Cui, “Wireless Sensor Network: Characteeristics and Architectures,” vol. 6, no. 12, pp. 1398–1401, 2012.

      [20] N. Lewis and N. Foukia, “An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes,” in 2008 Sixth Annual Conference on Privacy, Security and Trust, 2008, pp. 151–155.

      [21] Murthy, C. Siva Ram, B.S. Manoj (2004): Ad Hoc Wireless networks Architecture and Protocols. South Africa: Pearson Education.

      [22] https://wirelessmeshsensornetworks.wordpress.com/2014/02/18/characteristics-of-a-wireless-sensor-networks/


 

View

Download

Article ID: 20996
 
DOI: 10.14419/ijet.v7i4.12.20996




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.