Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks

被引:2
|
作者
Xia, Zhengxin [1 ,2 ]
Wei, Zhe [3 ]
Zhang, Huan [3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Continuing Educ, Nanjing 210042, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Engn Res Ctr Med Informat, Nanjing 210042, Peoples R China
[3] Civil Aviat Flight Univ China, Sch Comp Sci, Deyang 618307, Guanghan, Peoples R China
关键词
MALICIOUS NODES; DATA FUSION; REQUIREMENTS; AGGREGATION; INTERNET; SCHEME;
D O I
10.1155/2022/3449428
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cause of security vulnerability. In this study, firstly, the security standards that wireless sensor networks should have and the current security challenges faced by the network are discussed in detail, and the importance of security issues in wireless sensor networks is pointed out. Secondly, this paper studies and analyzes the current situation of wireless sensor network security problems including the internal and external attacks and the active and passive attacks. Thirdly, this paper also discusses the significance, concept, and characteristics of reputation and trust, the division and composition of reputation and trust system, and the common applications of the reputation and trust mechanism in wireless sensor networks.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Trust security mechanism for maritime wireless sensor networks
    Walid, Elgenaidi
    Thomas, Newe
    Eoin, O'Connell
    Gerard, Dooly
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [2] Trust Security Mechanism for Marine Wireless Sensor Networks
    Elgenaidi, Walid
    Newe, Thomas
    [J]. PROCEEDINGS OF THE 2015 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 5 : 1203 - 1208
  • [3] Security issues of wireless sensor networks in healthcare applications
    Ng, H. S.
    Sim, M. L.
    Tan, C. M.
    [J]. BT TECHNOLOGY JOURNAL, 2006, 24 (02) : 138 - 144
  • [4] Review on Security Issues and Attacks in Wireless Sensor Networks
    Kaur, Lovepreet
    Malhotra, Jyoteesh
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (04): : 81 - 88
  • [5] A Review on Security and Privacy Issues in Wireless Sensor Networks
    SunilKumar, K. N.
    Shivashankar
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 1979 - 1984
  • [6] Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
    Moshaddique Al Ameen
    Jingwei Liu
    Kyungsup Kwak
    [J]. Journal of Medical Systems, 2012, 36 : 93 - 101
  • [7] Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
    Al Ameen, Moshaddique
    Liu, Jingwei
    Kwak, Kyungsup
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) : 93 - 101
  • [8] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [9] Security Issues in Wireless Sensor Networks
    Sora, Daniel
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2010, 6 (04) : 26 - 30
  • [10] Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks
    Zheng, Guiping
    Gong, Bei
    Zhang, Yu
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021