Secure Geographic Routing in WSN based on Trust Adaptive Trust Model
نویسندگان
چکیده
منابع مشابه
Secure Routing Protocol for WSN based on Trust Evaluation
A wireless sensor network is generally a vast network with large number of sensors nodes. It suffers from several constraints, like low computation capability, less storage capability, restricted energy resources, liability to physical capture, and therefore the use of insecure wireless communication channels. As the size and the density increases over the network, there are more chances of pen...
متن کاملSelf Adaptive Trust Model for Secure Geographic Routing in Wireless Sensor Networks
The presence of malicious nodes in the ad hoc and sensor networks poses serious security attacks during routing which affects the network performance. To address such attacks, numerous researchers have proposed defense techniques using a human behavior pattern called trust. Among existing solutions, direct observations based trust models have gained significant attention in the research communi...
متن کاملCollaborative Trust - based Secure Routing based Ad - hoc Routing Protocol
The current existing Authenticated Routing for Ad Hoc Networks (ARAN) secure routing protocol is capable of defending itself against most malicious nodes and their different attacks. However, ARAN is not capable of defending itself against any authenticated selfish node participating in the network. Therefore, the objective of my thesis is to make the Authenticated Routing for Ad Hoc Networks s...
متن کاملCollaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks
In this paper we have proposed a secure routing protocol based on AODV for multihop ad hoc networks. Our protocol is unique in the sense that it is capable of finding a secure end-to-end route free of any malicious entity, thus resisting an internal attack within the network either in the form of compromised or disloyal nodes. We propose to find a secure and efficient route to a destination bas...
متن کاملTrust Enhanced Secure Multi-Path DSR Routing
Ad-hoc networks establish communication in improvised environments without requiring any fixed infrastructure. These networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. Therefore, it is required that the nodes cooperate for the integrity of network operation. However, nodes may refuse to cooperate by not forwarding packets...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.4121