TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks

被引:33
|
作者
Mali, Goutam [1 ]
Misra, Sudip [1 ]
机构
[1] Indian Inst Technol Kharagpur, Sch Informat Technol, Kharagpur, W Bengal, India
关键词
Wireless multimedia sensor networks; node replication attack; trust; received signal strength; AD-HOC NETWORKS; SECURITY; LIGHTWEIGHT;
D O I
10.1109/TC.2015.2456026
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed topology management scheme in wireless multimedia sensor networks (WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains connectivity between camera sensor (CS) nodes. However, the deployment of WMSNs in unattended environments makes the nodes vulnerable to security attacks. Hence, security issues should be considered, along with topology management, in WMSNs. In this work, we propose a trust-based distributed topology management scheme, named TRAST, for use in WMSNs. TRASTexploits the received signal strength of the control packets, which are then used to construct the distributed topology. In a non-secure distributed topology, the use of trust helps in providing coverage of an event, and maintaining connectivity, even in the presence of malicious attacks. The proposed topology management scheme achieves higher average coverage ratio and average packet delivery ratio than those corresponding to the LDTS and T-Must schemes, in the presence of malicious attacks.
引用
收藏
页码:1978 / 1991
页数:14
相关论文
共 50 条
  • [1] Topology Management-Based Distributed Camera Actuation in Wireless Multimedia Sensor Networks
    Mali, Goutam
    Misra, Sudip
    [J]. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2017, 12 (01)
  • [2] A Trust-Based Distributed Data Fault Detection Algorithm for Wireless Sensor Networks
    Taghikhaki, Zahra
    Sharifi, Mohsen
    [J]. 2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 893 - 898
  • [3] Distributed topology management for wireless multimedia sensor networks: exploiting connectivity and cooperation
    Misra, Sudip
    Mali, Goutam
    Mondal, Ayan
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (07) : 1367 - 1386
  • [4] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [5] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [6] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39
  • [7] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [8] A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks
    Sun, Yan
    Luo, Hong
    Das, Sajal K.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 785 - 797
  • [9] Trust-Based Video Management Framework for Social Multimedia Networks
    Mada, Badr Eddine
    Bagaa, Miloud
    Taleb, Tarik
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2019, 21 (03) : 603 - 616
  • [10] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    [J]. 2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729