Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Secured File Sharing using Trust Mechanism in Wireless Sensor Network

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Vaishali Gupta, Manik Gupta
10.5120/ijca2016909990

Vaishali Gupta and Manik Gupta. Secured File Sharing using Trust Mechanism in Wireless Sensor Network. International Journal of Computer Applications 142(12):43-46, May 2016. BibTeX

@article{10.5120/ijca2016909990,
	author = {Vaishali Gupta and Manik Gupta},
	title = {Secured File Sharing using Trust Mechanism in Wireless Sensor Network},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {142},
	number = {12},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {43-46},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume142/number12/24951-2016909990},
	doi = {10.5120/ijca2016909990},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Wireless sensor network is an emerging technology. WSN’s are deployed in an open and unattended environment. Therefore they are prone to security threats. The traditional approach of cryptography alone was not sufficient for security. Cryptography was not able to prevent internal adversaries from inserting the forged data. As a result Trust factor scheme was introduced in wireless sensor networks to prevent internal security threats in a network. In a distributed deployment of wireless sensor network, nodes communicate with each other on the basis of their trustworthiness. But in a huge network it becomes challenge for sensor nodes to recognize all the sensor nodes present in a network and retain their trust values with it, as the changes are very frequent in wireless sensor networks. So nodes are more vulnerable to attacks. In a proposed work, the main base station keeps the trust value of all the sensor nodes. The trust values are defined by belief of an individual node in a network. Belief is the subjective trust which can be justified by the past judgments in a network. If the value of belief is more, the sensor node will be more trustworthy. Different algorithms have been applied to authenticate the new sensor node and to provide secured file sharing in a wireless sensor network.

References

  1. Agrawal, Dharma, and Qing-An Zeng. Introduction to wireless and mobile systems, Cengage Learning, 2015.
  2. Al-Turjman, Fadi M., Hossam S. Hassanein, and Mohamed A. Ibnkahla. Efficient deployment of wireless sensor networks targeting environment monitoring applications. Computer Communications 36. no. 2 . pp. 135-148. 2013
  3. Liu, Guojin, Rui Tan, Ruogu Zhou, Guoliang Xing, Wen-Zhan Song, and Jonathan M. Lees. Volcanic earthquake timing using wireless sensor networks. In Proceedings of the 12th international conference on Information processing in sensor networks. pp. 91-102. ACM. 2013.
  4. Pannetier, Benjamin, Jean Dezert, and Genevieve Sella. Multiple target tracking with wireless sensor network for ground battlefield surveillance. In Information Fusion (FUSION). 2014 17th International Conference on. pp. 1-8. IEEE. 2014.
  5. Lu, Huang, Jie Li, and Mohsen Guizani. Secure and efficient data transmission for cluster-based wireless sensor networks. Parallel and Distributed Systems. IEEE Transactions on 25 no. 3 750-761.2014
  6. Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. M.. A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless personal communications, 70(1) pp: 189-205 2013.
  7. Gago, M., Rodrigo Román, and Javier Lopez. A survey on the applicability of trust management systems for wireless sensor networks. Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on. IEEE 2007.
  8. Rana, Sohel, Ali Newaz Bahar, Nazrul Islam, and Johirul Islam. Fuzzy based Energy efficient multiple cluster head selection routing protocol for wireless sensor networks. International Journal of Computer Network and Information Security (IJCNIS) 7 no. 4 : 54-61 2015.
  9. Alzaid, Hani, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, and Alhanof Abuhaimed. Reputation-based trust systems for wireless sensor networks: A comprehensive review. In Trust Management VII,. Springer Berlin Heidelberg, pp. 66-82. 2013.
  10. Yao, Zhiying, Daeyoung Kim, and Yoonmee Doh. PLUS: Parameterized and localized trust management scheme for sensor networks security. In Mobile Adhoc and Sensor Systems (MASS) 2006 IEEE International Conference on pp. 437-446. IEEE, 2006.
  11. Govindan, Kannan, and Prasant Mohapatra. Trust computations and trust dynamics in mobile adhoc networks: a survey. Communications Surveys & Tutorials IEEE 14.2 pp: 279-298,2012.
  12. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems  (Volume:20 ,  Issue: 11 ) page 1698 – 1712, IEEE Computer Society, Nov. 2009
  13. Zhang, Bo, Zhenhua Huang, and Yang Xiang. A novel multiple-level trust management framework for wireless sensor networks. Computer Networks 72 pp: 45-61,2014.
  14. Li, Celia, Uyen Trang Nguyen, Hoang Lan Nguyen, and Nurul Huda. Efficient authentication for fast handover in wireless mesh networks. computers & security 37 pp: 124-142,2013.

Keywords

Belief, Reputation, Sensor, Trust