Wireless Sensor Network

Volume 6, Issue 8 (August 2014)

ISSN Print: 1945-3078   ISSN Online: 1945-3086

Google-based Impact Factor: 1  Citations  

Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN

HTML  Download Download as PDF (Size: 4065KB)  PP. 157-172  
DOI: 10.4236/wsn.2014.68016    5,342 Downloads   7,536 Views  Citations

ABSTRACT

In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink. Alternatively, trust management schemes are tools to evaluate the trust of a node and thereby choosing a node for routing, and also detecting their unexpected node behaviour (either faulty or malicious). In this paper, we propose TENCR: a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations. The proposed new technique detects the malicious and selfish nodes very efficiently than the arithmetic mean based methods, and allows trustworthy nodes in routing, thereby eliminating malicious/selfish nodes. Our proposed trust evaluation method is adaptive and energy efficient that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish. Hence, trustworthy nodes only be allowed in routing, and malicious/selfish nodes will be eliminated automatically.

Share and Cite:

Babu, S. , Raha, A. and Naskar, M. (2014) Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN. Wireless Sensor Network, 6, 157-172. doi: 10.4236/wsn.2014.68016.

Cited by

[1] Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior
2022
[2] Improving the Precision of Data by segregating Malicious Node from Sensor Network's
2021
[3] A Trust Calculation Algorithm for Communicating Nodes in Wireless Sensor Networks
2021
[4] Trust Evaluation Model Based on Statistical Tests in Social Network
2020
[5] Improved Trust Model based on Centrality Measures and Recommendation in Social Network
2020
[6] Detection Algorithm of Abnormal Behavior in Security for IIoT Based on Random Inspection
2020
[7] A Novel Trust Model for Secure Group Communication in Distributed Computing
2020
[8] HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN
2020
[9] An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks
2019
[10] A Lightweight Filter-Based Target Tracking Model in Wireless Sensor Network
2019
[11] Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks
2019
[12] A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks
Journal of Network and Computer Applications, 2018
[13] Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust.
2018
[14] A service oriented adaptive trust evaluation model for ubiquitous computing environment
International Journal of Ad Hoc and Ubiquitous Computing, 2018
[15] Trust analysis of WSN nodes based on fuzzy theory
International Journal of Computers and Applications, 2018
[16] Reconfiguration of Neighbouring Nodes in Coastal Monitoring Wireless Sensor Networks based on Leader Node Recommendation
2017
[17] Research on trust sensing based secure routing mechanism for wireless sensor network
2017
[18] Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Networks
2016
[19] Trust security mechanism for maritime wireless sensor networks
Concurrency and computation: practice and experience, 2016
[20] 基于链路状态质量的连续证据序列的信任模型研究
昆明理工大学学报: 自然科学版, 2015
[21] Storage & retrieval of trusted information: A temporal probabilistic database approach
Computer, Communication, Control and Information Technology (C3IT), 2015 Third International Conference, 2015
[22] KURCS: Key Updating for Removing & replacement of Compromised Sensor Nodes from Wireless Sensor Networks
2015
[23] Trust security mechanism for marine Wireless Sensor Networks
Computer Science and Information Systems (FedCSIS), 2015 Federated Conference on, 2015
[24] Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection
2015

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.