Filters








17,820 Hits in 3.8 sec

A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management

Bingxia Yuan, Aruna K K
2022 Wireless Communications and Mobile Computing  
paper proposes a secure routing protocol for wireless sensor networks based on trust management.  ...  For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining  ...  TSRI is a trust assumption and trust-based resource routing protocol.  ... 
doi:10.1155/2022/5955543 fatcat:v7yextergjd7jfn2s6xgeliqt4

A Trust Calculation Algorithm for Communicating Nodes in Wireless Sensor Networks

Mr. Jeelani, Kishan Pal Singh, Aasim Zafar
2021 International Research Journal on Advanced Science Hub  
In various areas of the communication system, work based on Wireless Sensor Network (WSN) is being used these days.  ...  In this paper, we propose Trust Calculation Algorithm for communicating nodes in WSN. Trust calculation algorithm provide the trust-based routing table for every node.  ...  [12] evaluated the performance of the following routing protocols. Ad hoc on demand routing protocol, dynamic routing protocol and dynamic MANET on demand routing protocol for ZigBee.  ... 
doi:10.47392/irjash.2021.083 fatcat:ldtqx2iegzec7p3tkjlzor2cge

Immensely Discriminate Routing in Wireless Networks

Sujatha V, E. A. Mary Anitha
2017 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network.  ...  Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.  ...  In this scheme, the next hop node selection based on node link, Distance and quality of Service parameters. The above parameters are determined the next hop selection is evaluated by matrix.  ... 
doi:10.11591/ijeecs.v8.i3.pp712-714 fatcat:gkae2g2fezgndowpvxlwipf4ay

INFORMATION BASED MUTABLE TRUST COMMUNICATION SCHEME FOR HETEROGENEOUS WIRELESS NETWORKS

2018 Asia Pacific Journal of Contemporary Education and Communication Technology  
This paper addressed the past research effort in the direction of infrastructure based routing protocol.  ...  Moreover, the focus is on the evaluations of accuracy over the trust, hops and non trust based factors. We designed and implemented a model for the comprehensive investigations over the trust issue.  ...  Infrastructure Based Mutable Trust Scheme We proposed and evaluated an infrastructure based routing protocol for distributed heterogeneous networks.  ... 
doi:10.25275/apjcectv4i1ict1 fatcat:cjwdppns25f5hf2umi6il42lfa

An Encrypted Trust-Based Routing Protocol [article]

Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib
2015 arXiv   pre-print
In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme.  ...  The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks.However, regardless of the many security approaches and trust metrics available, trust-based  ...  Sanzgiri et al. in [4] propose a secure routing protocol based on authentication mechanisms. Zhang et al. in [5] provide a formal study of trust-based routing in ad-hoc wireless networks.  ... 
arXiv:1512.03280v1 fatcat:2cthuhpzirf5lnngx4gxupwu7i

Systematic literature review on designing trust-based security for WSNs

Raja waseem Anwar, Anazida Zainal, Saleem Iqbal
2019 Indonesian Journal of Electrical Engineering and Computer Science  
The results were analyzed focusing on the designs, applications and protocols and trust factors.  ...  <span>The study assessed the design and development of trust-based security for wireless sensor networks.  ...  RQ3: What are the secure routing processes in WSNs? The protocols for the trust evaluation for secure routing in WSNs have been focused.  ... 
doi:10.11591/ijeecs.v14.i3.pp1395-1404 fatcat:2khjokxovbhq7kafewvuictqsa

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

2019 KSII Transactions on Internet and Information Systems  
In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security  ...  The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.  ...  Eventhough RPASRP and TSRR implement similar reputation evaluation mechanism, TSRR protocol differs by selecting reliable trust based route by implementing Cross layer based dynamic reputation evaluation  ... 
doi:10.3837/tiis.2019.07.004 fatcat:ax4uucipxbdg3gn4h6x4g7c6ta

A Survey of Wireless Sensor Network Security and Routing Techniques

Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Kashif Naseer Qureshi
2015 Research Journal of Applied Sciences Engineering and Technology  
Trust-aware routing protocols play a vital role in security of Wireless Sensor Networks (WSNs).  ...  The main focus is on trust concepts and trust based approaches for wireless sensor networks. The study also highlights the difference between trust and security in the context of WSNs.  ...  Based on previous work, this study focuses on secure routing The WSN routing protocols are classified based on mode of functions, network structure and participation styles of sensor nodes.  ... 
doi:10.19026/rjaset.9.2595 fatcat:4fcnqn54nnhbzap7p6muntmlwq

Review Of Trust Models In Wireless Sensor Networks

V. Uma Rani, K. Soma Sundaram
2014 Zenodo  
To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network.  ...  It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes.  ...  The direct trust dependent link state routing protocol (DTLSRP) [26] is a trust based routing protocol to protect network from routing attacks.  ... 
doi:10.5281/zenodo.1092174 fatcat:u5kvi6ozhzg6xivywxyasytawy

Avoiding Selfishness by Effective Routing Using Trust Based Mechanism

Devika Adithya Das
2014 IOSR Journal of Electronics and Communication Engineering  
The trust based routing algorithm is compared with the conventional routing protocols on the basis of mainly five parameters i.e. trust level, throughput , delay, packet delivery ratio and overhead.  ...  The Trust Based Routing Algorithm routes the packets through optimal energy nodes and thus leads to a more efficient high quality network.  ...  Here the trust mechanism is based on watchdog mechanism. Here the main disadvantage is trust evaluation based on nodes QOS property.  ... 
doi:10.9790/2834-09333037 fatcat:6ye76hzepnc6zox4574mjhmzpy

Trust Centric Stable Routing For Wireless Mesh Networks

Navamani Meganathan
2017 International Journal of Intelligent Engineering and Systems  
To address this issue, a protocol named Trust-Centric Stable Routing (TCSR) is proposed for WMNs which incorporates security, reliability enhancement and integration of payment systems.  ...  Here, trusted nodes with forwarding reliability are selected for secured and efficient data transmission by introducing reliable reputation based trust computation algorithm.  ...  . 2) Route discovery based on trust metric and cross layer based link quality metric 3) Enforcing cooperation among the nodes by integrating payment system 4) Designing a trust-centric stable routing protocol  ... 
doi:10.22266/ijies2017.1231.16 fatcat:cvlljmnopzej7azl3vrwjtoz6a

Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET

Abubakar M. Baba, Department of Computer Engineering, Kaduna Polytechnic, Kaduna, Nigeria, Simon, T. Apeh, Kachikwu, B. Erameh, epartment of Computer Engineering University of Benin Benin-City, Nigeria, Department of Computer Engineering Kaduna Polytechnic, Kaduna, Nigeria
2021 Advances in Multidisciplinary & Scientific Research Journal Publication  
Therefore, a highly secured Hybrid Trust-based Anonymous Authenticated Routing Protocol (HTBAARP) to mitigate flooding attacks is to be developed to avoid unauthorized access and to detect malicious nodes  ...  This will be achieved by integrating a Modified Authenticated Anonymous Routing Protocol (MAASR) to a Trusted Management Scheme (TMS).  ...  Authenticated Anonymous Secured Routing Protocol (AASR), develop and evaluate a trust-based management scheme, hybridize the trust-management scheme with the Modified Anonymous Authenticated Secured Routing  ... 
doi:10.22624/aims/abmic2021p12 fatcat:e2mwidlf75el5i32iuqkgpzva4

Design of Hierarchical Trust based Efficient Cluster Head Selection in WSN (HTECH)

L. Ramalingam, S. Audithan
2016 Indian Journal of Science and Technology  
This trust is evaluated based on node cooperativeness, Unselfishness, honest and data transmission rate.  ...  In this paper, we propose Design of Hierarchical Trust based Efficient Cluster Head Selection in WSN (HTECH) which demonstrates the Cluster Head (CH) selection process based on Trust based routing in WSN  ...  Hierarchical trust management protocol 6 applies both trust-based intrusion detection and trust-based geographic routing.  ... 
doi:10.17485/ijst/2016/v9i26/90074 fatcat:litpywiswneyfi4fzjp57fh3zu

GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks

Yassine Sabri, Najib El
2016 Communications on Applied Electronics  
GRPW-MuS (Geographic Routing to Multiple Sinks in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks  ...  GRPW-MuS, a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to  ...  But the scheme is based on trust evaluation, which predicts the future events by collecting the past events, so the trust evaluated by the node lags behind the attacks.  ... 
doi:10.5120/cae2016652472 fatcat:v6t6pfllunft7fhdvkht52losq

Attacks and Secure Geographic Routing In Wireless Sensor Networks

Sabri Yassine, Najib El Kamoun
2017 Indonesian Journal of Electrical Engineering and Computer Science  
GRPW (Geographic Routing in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks.  ...  GRPW , a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce  ...  But the scheme is based on trust evaluation, which predicts the future events by collecting the past events, so the trust evaluated by the node lags behind the attacks.  ... 
doi:10.11591/ijeecs.v5.i1.pp147-158 fatcat:354texwytjbr7jxdkox7awap5e
« Previous Showing results 1 — 15 out of 17,820 results