Role Based and Energy Efficient Trust System for Clustered Wsn
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Security and trust are two interdependent concepts and are often used interchangeably when defining a secure wireless sensor network (WSN) system .However, security is different from trust in that, it assumes no node is trustworthy and requires ongoing authentication using sophisticated protocols leading to high communication and computation overheads. This makes the traditional cryptographic security tools hard, if not impossible, to be used in wireless sensor networks that are severely resource constrained. Trust on the other hand is the exact opposite of security in that any node can interact with any other and requires no authentication and mapping of hidden keys to carry on with their business and hence carries zero overhead. Trust management scheme calculates the trustworthiness of the node. Several trust systems have been proposed for the WSN.But they suffer from various limitation such as high cost and overhead. So light weight trust system is necessary because of the node’s resource constrained nature. This proposed system provides light weight trust decision making and it improves the dependability of the system by cancelling the feedback between clustered members. It uses self adaptive weighting scheme for trust aggregation. Thus, it needs less memory and communication overhead
Authors and Affiliations
S. Jeyantha Juliet, M. Varghese
Performance measurement of MANET routing protocols underBlackhole security attack
Abstract: Unlike wired networks or other wireless networks, where the nodes communicate with each other viaan access point or a base station, wireless Mobile ad hoc network is an infrastructure less network where t...
An Enhanced Detection of Outlier using Independent Component Analysis among Multiple Data Instances via Oversampling
Abstract: Anomaly is a pattern of data that does not conforms to expected behavior. It is also referred as outlier, exceptions, peculiarities, surprise etc. Anomaly detection aims to identify a small group of insta...
Creating a Bicycle Design Approach Model Based on FashionStyles
Abstract: The authors created a Bicycle Design Approach Model Based on Fashion Styles as a means ofsupporting idea generation for product development that takes into account customer sensibilities, and theeffectiveness o...
A More Secure Position Based Graphical Password Authentication
Abstract: We are proposing a new pass-point graphical password authentication by using a simple virtual environment. Our virtual environment is influenced by a social networking site’ s game. In this system, user interac...
A New Web Document Retrieval Method Using Extended-IOWA (Extended-Induced Ordered Weighted Averaging) Operator on HTML Tags
Abstract: A new scenario has arisen into the information retrieval (IR) field with the increase in the use of mark-up languages. This paper targets structured IR and is focused on documents with structure. This assumptio...