Calculating Trust and Aggregation of a node using Poisson Distribution in WSN

نویسندگان

  • Arnab Ghosh
  • Sovan Bhattacharya
چکیده

Designing an accurate and efficient trust model in WSN is nowadays aresearch challenge.Trust in wirelesssensor networks is an important issue and it solves theproblem of access control, privacy, secure routing scheme and reliable communication.The notion of trust can bedefined as an aggregation of consensus given a set of past interactions. Aggregating data is a way of compressing the transmitted packet, in a sense that the packet is comprised of only necessary information. This paper present, total Trust calculation in WSN nodes. We calculate the total trust by direct trust using probabilistic approach and indirect trust using Dempstar-Shafer theory (combination of evidence).Here we also find out aggregation value of a node using Poisson distribution and alsocompare between PDR value and average cumulative Poisson distribution.Results of various simulation experiments show that theproposed system can be highly effective for aggregation value of a node than to aggregate of node using coding by ordering technique.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Secure Data Aggregation in Wireless Sensor Network using Trust Model

Wireless sensor networks usually consist of hundreds or thousands of inexpensive and low-powered sensing devices. In WSN, nodes have low computational power and communication resources to collect data to a specific function. Nodes have limited battery power and s mall data storage. In WSN, Security is an important issue, therefore its need to create a secure transmission model with min imum ove...

متن کامل

A confidence-aware interval-based trust model

It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, ...

متن کامل

A Rssi Based Localization Algorithm for WSN Using a Mobile Anchor Node

Wireless sensor networks attracting a great deal of research interest. Accurate localization of sensor nodes is a strong requirement in a wide area of applications. In recent years, several techniques have been proposed for localization in wireless sensor networks. In this paper we present a localization scheme with using only one mobile anchor station and received signal strength indicator tec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013