Node-Level Trust Evaluation in Wireless Sensor Networks

被引:28
|
作者
Desai, S. Sundeep [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol, Dept Comp Sci & Engn, Pune 411025, Maharashtra, India
关键词
Security; trust; trust evaluation algorithms; cryptography; node-level security; node-memory integrity; AD HOC; MANAGEMENT; SECURITY; ATTACKS; SYSTEMS; SERVICE;
D O I
10.1109/TIFS.2019.2894027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cryptographic methods do not cater to the limitations of wireless sensor networks (WSNs) primarily concerning code size, processing time, and power consumption. The study in this paper enumerates the security primitives in WSNs and accentuates the strength of trust evaluation as a security solution within the WSN precincts. This paper proposes a trust evaluation methodology that evaluates a node-level trust by using an internal resource of a node. It is a completely mediating technique which is independent of network topology and second-hand information. The challenge response method enables a node to evaluate trust for itself; and with its peer-node/s with which it intends to interact using the proposed self-scrutiny and self-attestation algorithms, respectively. The efficacy of the proposed software-based methodology and the algorithms is demonstrated with the actual implementation on sensor nodes. The ability to counter attack-scenarios along with the analysis exhibits the merit of the proposed work. The average values of the observed results illustrate the consistency and robust performance of the proposed trust evaluation algorithms.
引用
收藏
页码:2139 / 2152
页数:14
相关论文
共 50 条
  • [21] Comparative Evaluation of Trust Mechanisms for Wireless Sensor Networks
    Vasilache, Razvan-Andrei
    Gavrila, Ioan-Claudiu
    Grigorescu, Alin-Ciprian
    Gheorghe, Laura
    2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [22] Preserving Node-level Privacy in Graph Neural Networks
    Xiang, Zihang
    Wang, Tianhao
    Wang, Di
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 4714 - 4732
  • [23] Evaluation of Trust Management Approaches in Wireless Sensor Networks
    Kazmi, Farwa
    Khan, Muazzam A.
    Saeed, Ayesha
    Saqib, Nazar Abbas
    Abbas, Muhammad
    PROCEEDINGS OF 2018 15TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2018, : 870 - 875
  • [24] On the processing architecture in wireless video sensor networks: node and network level performance evaluation
    Yousefi, Mehdi Hadadian Nejad
    Kavian, Yousef S.
    Mahmoudi, Alimorad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (17) : 24789 - 24807
  • [25] On the processing architecture in wireless video sensor networks: node and network level performance evaluation
    Mehdi Hadadian Nejad Yousefi
    Yousef S. Kavian
    Alimorad Mahmoudi
    Multimedia Tools and Applications, 2019, 78 : 24789 - 24807
  • [26] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [27] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [28] A Wireless Sensor Networks Based on Multi-angle Trust of Node
    Dong Hui-hui
    Guo Ya-jun
    Yu Zhong-qiang
    Chen Hao
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 28 - 31
  • [29] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [30] On Throughput Region for Primary and Secondary Networks With Node-Level Cooperation
    Yuan, Xu
    Tian, Feng
    Hou, Y. Thomas
    Lou, Wenjing
    Sherali, Hanif D.
    Kompella, Sastry
    Reed, Jeffrey H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (10) : 2763 - 2775