Threats and Security using Trust Techniques in Wireless Sensor Networks
نویسندگان
چکیده
Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so they can place where human cannot reach easily. As sensor nodes are placed in an open and insecure environment, they are prone to security attacks by adversaries. So, the security is an impo rtant issue in sensor networks. Traditional security mechanisms like cryptography, intruder detection, routing protocols were implemented to provide security in wireless sensor networks. These mechanisms are capable to detect and remove internal attacks but fail to detect compromised nodes in a network. Compromised node exposes all secrets of network to the adversary which in turn put all existing mechanisms at risk. To overcome this problem various trust and reputation mechanisms have been proposed. Trust can be calculated in two ways. First, it can directly calculate with the past behavior of nodes. Secondly, it can be indirectly combined with the reputation of a node from the recommenders. Recommenders are neighbors of a node. In this paper, various security threats to the network, traditional security techniques, and various reputation and trust mechanisms h ave been discussed. Keyword: Wireless Sensor Networks, Sensor Node, Network Attacks, Security Mechanisms, Reputation, Trust.
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016