Threats and Security using Trust Techniques in Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1

Abstract

Abstract: Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so theycan place where human cannot reach easily. As sensor nodes are placed in an open and insecure environment, they are prone to security attacks by adversaries. So, the security is an impo rtant issue in sensor networks.Traditional security mechanisms like cryptography, intruder detection, routing protocols were implemented to provide security in wireless sensor networks. These mechanisms are capable to detect and remove internal attacks but fail to detect compromised nodes in a network. Compromised node exposes all secrets of network to the adversary which in turn put all existing mechanisms at risk. To overcome this problem various trust and reputation mechanisms have been proposed. Trust can be calculated in two ways. First, it can directlycalculate with the past behavior of nodes. Secondly, it can be indirectly combined with the reputation of a node from the recommenders. Recommenders are neighbors of a node. In this paper, various security threats to the network, traditional security techniques, and various reputation and trust mechanisms h ave been discussed.

Authors and Affiliations

Vaishali Gupta , Manik Gupta

Keywords

Related Articles

 Comparative Performance Analysis of SALT and PEPPER Noise Removal

 Abstract: Noise is an important factor which when get added to an image reduces its quality and appearance.So in order to enhance the image qualities, it has to be removed with preserving the textural information a...

Moment Features Weighting for Image Retrieval

Abstract: Feature selection is an effective tool to improve the performance of content based image retrieval systems. This paper presents an effective moment weighting method according to image reconstruction and retriev...

 SSEGR: Secure Single-Copy Energy Efficient Geographical Routing Algorithm in Wireless Sensor Networks

Abstract: Geographical Routing Technique is a new trend in Wireless Sensor Networks in which the sensor nodes are enabled using Global Positioning Systems (GPS). This helps to easily detect the position of their neighbor...

 The Role of Information Communication Technology (Ict) In the Management of Schools: A Case Study of Primary and Secondary Schools in the Zimbabwean Harare Province (2006)

Abstract: The study covered schools in the province of Harare. A representative stratified sample was carried out in coming up with the number of both the primary and secondary schools. Ninety-four schools were sampledan...

 W-LEACH Decentralized: Weighted LEACH with a Decentralized way

 Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...

Download PDF file
  • EP ID EP154013
  • DOI -
  • Views 124
  • Downloads 0

How To Cite

Vaishali Gupta, Manik Gupta (2016). Threats and Security using Trust Techniques in Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 18(1), 104-114. https://europub.co.uk/articles/-A-154013