Filters








314 Hits in 9.9 sec

An Efficient Reputation-Based Routing Mechanism for Wireless Sensor Networks: Testing the Impact of Mobility and Hostile Nodes

Nathan Lewis, Noria Foukia
2008 2008 Sixth Annual Conference on Privacy, Security and Trust  
We also implement hostile nodes to test how our route selection and reputation mechanisms cope in their presence.  ...  In previous works [1] [2], we proposed a routing approach where nodes in a Wireless Sensor Network (WSN) rely on trusted neighbors and neighbors' reputation to dynamically select the best route to the  ...  Section 3 describes the new features that we introduced (mobility and hostile nodes) to test the efficiency of our route selection mechanism based on trust and reputation.  ... 
doi:10.1109/pst.2008.31 dblp:conf/pst/LewisF08 fatcat:khcokd4lpbavzjf65si7qnlcuu

Resilient networking in wireless sensor networks [article]

Ochirkhand Erdene-Ochir (CITI Insa Lyon / INRIA Grenoble Rhône-Alpes), Marine Minier (CITI Insa Lyon / INRIA Grenoble Rhône-Alpes), Fabrice Valois (CITI Insa Lyon / INRIA Grenoble Rhône-Alpes), Apostolos Kountouris
2010 arXiv   pre-print
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature.  ...  In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks.  ...  JTAG (Joint Test Action Group) is the interface used for component testing, such as Test Access Port (TAP) and as shown it can allow an adversary to gain full control of a sensor node.  ... 
arXiv:1003.5104v1 fatcat:nwpp45awtnbz7kfvrp6mkeoqi4

The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks

Novarun Deb, Manali Chakraborty, Nabendu Chaki
2011 International journal of network security and its applications  
Wireless networks are broadly classified into Wireless Ad-hoc Networks (WAHNs), Mobile Adhoc Networks (MANETs), Wireless Sensor Networks (WSNs) and the most recent Wireless Mesh Networks (WMNs).  ...  This paper is an extension to a survey of IDS solutions for MANETs and WMNs published earlier in the sense that the present survey offers a comparative insight of recent IDS solutions for all the sub domains  ...  All aspects of the wireless sensor network are being examined including secure and efficient routing [46, 48, 49, 50] , data aggregation [51, 52] , group formation [53] , and so on.  ... 
doi:10.5121/ijnsa.2011.3603 fatcat:ufywnimyvves5fo6xtyyoecbi4

A Survey on Measures for Secure Routing in Wireless Sensor Networks

Ansgar Kellner, Omar Alfandi
2012 International Journal of Sensor Networks and Data Communications  
In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas.  ...  One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments.  ...  The authors present a trust and reputation system middleware for WSNs in which sensor nodes form a community of trust based on reputation metrics.  ... 
doi:10.4172/2090-4886.1000101 fatcat:mmwfiy53e5fujeiwn44crw5zxa

A Survey on Measures for Secure Routing in Wireless Sensor Networks

Ansgar Kellner, Omar Alfandi, Dieter Hogrefe
2012 International Journal of Sensor Networks and Data Communications  
In the near future, it is likely that wireless sensor networks (WSNs) become a major technology for the sensing in different application areas.  ...  One of the main challenges in WSNs is the secure routing of data through the network. This is resulting from the fact that WSNs are normally deployed in unattended or even hostile environments.  ...  The authors present a trust and reputation system middleware for WSNs in which sensor nodes form a community of trust based on reputation metrics.  ... 
doi:10.4303/ijsndc/235548 fatcat:xa546pnnlreqdjvnb7qewx2j5i

Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks [chapter]

A. R.
2012 Wireless Sensor Networks - Technology and Protocols  
Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks 243  ...  SeFER -Secure, flexible, and efficient routing protocol SeFER (Secure, flexible, and efficient routing protocol for sensor networks) [67] is based on random key pre-distribution mechanism.  ... 
doi:10.5772/50736 fatcat:cdyl4gvtwbh5nem2z5vgb3oy3q

Trust Models in Wireless Sensor Networks: A Survey [chapter]

Mohammad Momani
2010 Communications in Computer and Information Science  
The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes  ...  However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete.  ...  The authors of [61] proposed the TIBFIT protocol to diagnose and mask arbitrary node failures in an event-driven wireless sensor network.  ... 
doi:10.1007/978-3-642-14478-3_4 fatcat:fsim2mgdozfn3n74mut436sory

Trust-Based Security: Advancement towards Protection of the Adhoc Network

Samita Dhiman, Manish Kumar
2021 CGC International Journal of Contemporary Technology and Research  
MANET (mobile ad hoc network) is a collection of mobile nodes that interact without the need for a fixed physical foundation.  ...  Furthermore, the study's analysis based on many aspects exposes the inadequacies of existing techniques and provides future directions for improvement.  ...  INTRODUCTION A Mobile Adhoc network is an infrastructure-free network made up of mobile nodes that dynamically choose the best path for data transmission.  ... 
doi:10.46860/cgcijctr.2021.12.31.240 fatcat:fj54hb7curbirgq7jc53p3l35m

Trust Based Approaches of Intrusion Detection Architecture for Wireless Sensor Networks: A Survey

Jeelani ., Manoj Rana, Aasim Zafar
2018 IJARCCE  
The Intrusion Detection Architecture (IDA) in Wireless Sensor Network is used to detect various attacks occurring on sensor nodes of WSNs that are placed in various hostile environments.  ...  Wireless Sensor Networks (WSNs) consists of tiny sensor nodes deployed in various geographic conditions to gather the information about the environment.  ...  [21] have investigated the impact of group mobility on performance of routing protocols under group mobility model using QualNet simulator.  ... 
doi:10.17148/ijarcce.2018.71024 fatcat:3qezkgmkyjbtjms6ecmnqeyp5q

Utilising Acknowledge for the Trust in Wireless Sensor Networks

Hosam Alrahhal, Razan Jamous, Rabie Ramadan, Abdulaziz M. Alayba, Kusum Yadav
2022 Applied Sciences  
It considers sensor nodes' limitations and cross-layer information for efficient secure routing in WSNs. It proposes a Tow-ACKs Trust (TAT) Routing protocol for secure routing in WSNs.  ...  TAT computes the trust values based on direct and indirect observation of the nodes.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app12042045 fatcat:ycqyaooyebhe7kolgixdyfeyfu

Survey: secure opportunistic routing protocols in wireless networks

Hanane Saidi, Addaim Adnane, Driss Gretete
2019 International Journal of Information Privacy Security and Integrity  
In this paper, we are going to give an analysis of OR protocols their classifications as well as an overview on the security approaches available for opportunistic routing protocols.  ...  However, they are both equally vulnerable to the same attacks because wireless networks might be deployed in hostile or unwatched environments.  ...  version for colours) the number of nodes in the network s infected nodes m malicious nodes g safe nodes c number of tested nodes at a time r the number of rounds.  ... 
doi:10.1504/ijipsi.2019.10025219 fatcat:7nb3pirzebcv5eevyy3ehn6b7y

Reputation- and Trust-Based Systems for Wireless Self-organizing Networks [article]

Jaydip Sen
2012 arXiv   pre-print
such as mobile ad hoc networks and wireless sensor networks.  ...  However, the conventional view of security based on cryptography alone is not sufficient for the defending against unique and novel types of misbehavior exhibited by nodes in wireless self-organizing networks  ...  Two types of wireless networks viz. Mobile Ad hoc Networks (MANETs) and Wireless Sensor Networks (WSNs) have undergone tremendous technological advances over the last few years.  ... 
arXiv:1110.0146v2 fatcat:q2mxf6mkf5hy5b3fgfymliekyq

Survey of Trust Models in Different Network Domains

Mohammad Momani, Subhash Challa
2010 International Journal of Ad Hoc, Sensor and Ubiquitous Computing  
The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes  ...  However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete.  ...  The authors of [105] proposed the TIBFIT protocol to diagnose and mask arbitrary node failures in an event-driven wireless sensor network.  ... 
doi:10.5121/ijasuc.2010.1301 fatcat:ohc7chbkfnhnvm4cftchq3b7be

Survey of trust models in different network domains [article]

Mohammad Momani, Subhash Challa
2010 arXiv   pre-print
The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes  ...  However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete.  ...  The authors of [105] proposed the TIBFIT protocol to diagnose and mask arbitrary node failures in an event-driven wireless sensor network.  ... 
arXiv:1010.0168v1 fatcat:ygatwov3efby3ovr7am5xfleam

Energy harvesting and battery power based routing in wireless sensor networks

Mohammad Hossein Anisi, Gaddafi Abdul-Salaam, Mohd. Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, Ismail Ahmedy
2015 Wireless networks  
Wireless sensor networks (WSNs) are a collection of several small and inexpensive battery-powered nodes, commonly used to monitor regions of interests and to collect data from the environment.  ...  The traditional battery based energy sources for sensor nodes and the conventional energy harvesting mechanisms that are widely used to in energy replenishment in WSN are reviewed.  ...  Acknowledgments The authors thank University of Malaya for the financial support (UMRG Grant RP036A-15AET, RP036B-15AET, RP036C-15AET, RG325-15AFR) and facilities to carry out the work.  ... 
doi:10.1007/s11276-015-1150-6 fatcat:e56gzsv6nfddhazeshpg2ld45y
« Previous Showing results 1 — 15 out of 314 results