Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach

被引:0
|
作者
Reddy, Yenumula B. [1 ]
Selmic, Rastko [2 ]
机构
[1] Grambling State Univ, Grambling, LA 71245 USA
[2] Louisiana Tech Univ, Ruston, LA 71270 USA
关键词
wireless sensor networks; repeated games; packet transfer; trust-based approach; secure transfer of data;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Trust is very important in wireless sensor networks to transfer the data from source to destination. The Dynamic Source Protocol calculates the alternate path, if any node fails to transfer the data. The Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path if the path has a malicious node. With the expense of an intruder detection system we can detect the malicious node and alter the data/packet transfer path. However, intruder detection system is very expensive for wireless sensor networks and there is no guarantee in detecting a malicious node. In the current research a trustbased approach is recommended to minimize the overheads of intruder detection system and it also detects the abnormal behavior nodes. The proposed model uses the repeated games to detect faulty nodes through the cooperative effort in the sensor network and further judges the trust of successive nodes. Simulations were presented for normalized payoff of packet dropping, average discount payoff, and trust relation.
引用
收藏
页码:218 / 223
页数:6
相关论文
共 50 条
  • [1] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [2] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    [J]. 2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [3] An Algorithm of Trust-based Secure Data Aggregation for Wireless Sensor Networks
    Ye Z.-W.
    Wen T.
    Liu Z.-Y.
    Fu C.-G.
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (06): : 789 - 794
  • [4] Collaborative Approach for Secure Packet Transfer in Wireless Sensor Networks
    Reddy, Yenumula B.
    Kafley, Sanjeeve
    Selmic, Rastko
    [J]. PROCEEDINGS OF SENSORCOMM 2011, THE FIFTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS, 2011, : 328 - 333
  • [5] Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik
    Seo, Sunho
    Chung, Jong-Moon
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (06) : 1066 - 1069
  • [6] A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
    Tang, Jiawei
    Liu, Anfeng
    Zhang, Jian
    Xiong, Neal N.
    Zeng, Zhiwen
    Wang, Tian
    [J]. SENSORS, 2018, 18 (03)
  • [7] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [8] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [9] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39
  • [10] An Intra-Cluster Trust-Based Secure Data Aggregation Framework for Wireless Sensor Networks
    Makin, Bhavna Arora
    Prof Devanand
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2011, 2 (01): : 75 - 88