Role Based and Energy Efficient Trust System for Clustered Wsn
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Security and trust are two interdependent concepts and are often used interchangeably when defining a secure wireless sensor network (WSN) system .However, security is different from trust in that, it assumes no node is trustworthy and requires ongoing authentication using sophisticated protocols leading to high communication and computation overheads. This makes the traditional cryptographic security tools hard, if not impossible, to be used in wireless sensor networks that are severely resource constrained. Trust on the other hand is the exact opposite of security in that any node can interact with any other and requires no authentication and mapping of hidden keys to carry on with their business and hence carries zero overhead. Trust management scheme calculates the trustworthiness of the node. Several trust systems have been proposed for the WSN.But they suffer from various limitation such as high cost and overhead. So light weight trust system is necessary because of the node’s resource constrained nature. This proposed system provides light weight trust decision making and it improves the dependability of the system by cancelling the feedback between clustered members. It uses self adaptive weighting scheme for trust aggregation. Thus, it needs less memory and communication overhead
Authors and Affiliations
S. Jeyantha Juliet, M. Varghese
HMM and its application in MSA
Abstract: This document gives an insightinto HMM and its application in context of Multiple sequence alignment (MSA). Various computational approaches proliferatedin response to resolve the complexities of Human...
An Efficient Content Based Image Retrieval System
Abstract : Content based image retrieval is an active research issue that had been famous from 1990s till present. The main target of CBIR is to get accurate results with lower computational time. This paper discus...
Genetic and Ant Colony Algorithms for Face Recognition and Detection Systems
Abstract: Face detection is one of the challenging problems in the digital image processing. Digital images have an enormous information and characteristics measures. But until today, a complete capable mechanism to extr...
A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
Abstract: Password-authenticated key exchange (PAKE) is an authentication mechanism where a client and a server who share a password and authenticate each other with that password and hence both will agree on a cry...
Performance Analysis of Hybrid (supervised and unsupervised) method for multiclass data set
Abstract: Due to the increasing demand for multivariate data analysis from the various application the dimensionality reduction becomes an important task to represent the data in low dimensional space for the robus...