Privacy Preserving efficient trusted model in WSN
K. K. Ligade1 , S. P. Pingat2
- Department of Computer Engineering, SKNCOE, Vadgaon, Pune, Savitribai Phule University, Pune, India.
- Department of Computer Engineering, SKNCOE, Vadgaon, Pune, Savitribai Phule University, Pune, India.
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-4 , Page no. 179-184, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i4.179184
Online published on Apr 30, 2018
Copyright © K. K. Ligade, S. P. Pingat . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: K. K. Ligade, S. P. Pingat, “Privacy Preserving efficient trusted model in WSN,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.179-184, 2018.
MLA Style Citation: K. K. Ligade, S. P. Pingat "Privacy Preserving efficient trusted model in WSN." International Journal of Computer Sciences and Engineering 6.4 (2018): 179-184.
APA Style Citation: K. K. Ligade, S. P. Pingat, (2018). Privacy Preserving efficient trusted model in WSN. International Journal of Computer Sciences and Engineering, 6(4), 179-184.
BibTex Style Citation:
@article{Ligade_2018,
author = { K. K. Ligade, S. P. Pingat},
title = {Privacy Preserving efficient trusted model in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {179-184},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1865},
doi = {https://doi.org/10.26438/ijcse/v6i4.179184}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.179184}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1865
TI - Privacy Preserving efficient trusted model in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - K. K. Ligade, S. P. Pingat
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 179-184
IS - 4
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
540 | 367 downloads | 305 downloads |
Abstract
In wireless sensor networks (WSNs), many factors, for instance, mutual interference of wireless connections, battlefield applications and nodes presented to the environment without top physical safety, effects in the sensor nodes being extra powerless in against to the attacked a compromised. For tackling the issues security, an effective appropriated trust model is proposed. They faces some issues, first is system was not focus on other trust metrics Trust is evaluated by the two ways direct and indirect trust on the basis of recommendation from third party. The third issue is offering the trust assessment on-neighbour nodes become very essential. Fourth, trust relationship between sensor nodes frequently modified in wireless sensor networks because of the dynamic topology. For solving all these issues proposed the efficient distributed trust model for wireless sensor networks. This system can estimate dependability of sensor nodes more accurately and prevent the security breaches more considerably. Also for sending the data from subject node to object there are number of paths are generated, in this system we used Dijkastra algorithm for finding the shortest path. Also for the existing system faces the problem of security against the different attacks on network. For security purpose we used ECC algorithm. Experimental result shows that energy consumption for proposed system and existing system.
Key-Words / Index Term
Trust management, Security in wireless sensor networks, direct trust, indirect trust, Shortest path calculation
References
[1] guangjie Han, Jinfang Jiang ,Feng Wang, Lei Shu and Mohsen Guizani, "An Efficient Distributed Trust Model for Wireless Sensor Networks" May 2015.
[2] Y. S. Moon, H. S. Lim, and E. Bertino, "Provenance based trustworthiness assessment in sensor networks" 2010
[3] P. Mohapatra, K. Govindan "Trust computations and trust dynamics in mobile ad hoc networks: A survey," 2012
[4] Y. Dong, H. Guo, G. Han, L. Shu, and D. Wu, "Cross-layer optimized routing in WSN with duty-cycle and energy harvesting, Wireless Commun" 2014
[5] T. Schulze, K. Nordheimer and D. Veit, "Trustworthiness in networks:A simulation approach for approximating local trust and distrust values" 2010
[6] L. K. Balzano, S. Ganeriwal, and M. B. Srivastava, "Reputation based framework for high integrity sensor networks" 2004