Scalable Trust-Based Secure WSNs
نویسندگان
چکیده
منابع مشابه
TBSRP: Trust Based Secure Routing Protocol for WSNs
A wireless sensor network is generally a vast network with large number of sensors nodes. It suffer from several constraints, like low computation capability, less storage capability, restricted energy resources, liability to physical capture, and therefore the use of insecure wireless communication channels. As the size and the density increases over the network, there are more chances of pene...
متن کاملReview of Trust based Methodologies in WSNs
In this research pa per we have do ne objective study on latest trust bas ed methodologies that are u sed in securing the WSN, the focu ses in our current s tudy have been on the aspect of en ergy and memory consumption due to implementation of tr ust based techniques. We have developed a comparative chart and review of the techniq ues and have found certain limitat ions worthwhile fo r conduct...
متن کاملA Fuzzy-based Trust Management in WSNs
Wireless sensor networks (WSNs) are composed of a large number of sensor nodes that are selforganized. The open nature of WSNs makes them easily exposed to a variety of attacks and brings many security challenges. Furthermore, because of the potentially dynamic behavior of WSNs, there is hardly any infrastructure or centralized control. To enhance the security in WSNs, it is necessary to evalua...
متن کاملFuzzy-Based Trust Prediction Model for Routing in WSNs
The cooperative nature of multihop wireless sensor networks (WSNs) makes it vulnerable to varied types of attacks. The sensitive application environments and resource constraints of WSNs mandate the requirement of lightweight security scheme. The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nod...
متن کاملTrust Based Secure Aodv in Manet
The nature of self-organization and the limitation of individual resources, MANET always confront security and selfishness issues. In this thesis, we design trusted routing protocols using trusted frame works and intrusion detection system (secure protocol) for MANET. Trust combination algorithms and trust mapping functions are provided in this model, where the former can aggregate different op...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and Communications
سال: 2014
ISSN: 2327-5219,2327-5227
DOI: 10.4236/jcc.2014.27003