CFP last date
22 April 2024
Reseach Article

Efficient Trusted Model in WSN for Privacy Preserving

by Komal Ligade, S. P. Pingat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 41
Year of Publication: 2018
Authors: Komal Ligade, S. P. Pingat
10.5120/ijca2018917067

Komal Ligade, S. P. Pingat . Efficient Trusted Model in WSN for Privacy Preserving. International Journal of Computer Applications. 180, 41 ( May 2018), 1-5. DOI=10.5120/ijca2018917067

@article{ 10.5120/ijca2018917067,
author = { Komal Ligade, S. P. Pingat },
title = { Efficient Trusted Model in WSN for Privacy Preserving },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 180 },
number = { 41 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number41/29400-2018917067/ },
doi = { 10.5120/ijca2018917067 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:03:15.765114+05:30
%A Komal Ligade
%A S. P. Pingat
%T Efficient Trusted Model in WSN for Privacy Preserving
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 41
%P 1-5
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In wireless sensor networks (WSNs), many factors, for instance, mutual interference of wireless connections, battlefield applications and nodes presented to the environment without top physical safety, effects in the sensor nodes being extra powerless in against to the attacked compromised. For tackling the issues security, an effective appropriated trust model is proposed. They faces some issues, first is system was not focus on other trust metrics Trust is evaluated by the two ways direct and indirect trust on the basis of recommendation from third party. The third issue is offering the trust assessment on neighbour nodes become very essential. Fourth, trust relationship between sensor nodes frequently modified in wireless sensor networks because of the dynamic topology. For solving all these issues proposed the efficient distributed trust model for wireless sensor networks. This system can estimate dependability of sensor nodes more accurately and prevent the security breaches more considerably. Also for sending the data from subject node to object there are number of paths are generated, in this system we used Dijkastra algorithm for finding the shortest path. Also for the existing system faces the problem of security against the different attacks on network. For security purpose we used ECC algorithm. Experimental result shows that energy consumption for proposed system and existing system.

References
  1. Feng Wang, and Guangjie Han, “An efficient distributed trust model for wireless sensor networks”, IEEE Transactions, Vol. 26, NO. 5,[May 2015].
  2. H. S. Lim, and E. Bertino, “Provenance based trustworthiness assessment in sensor networks,” 7th Int. Workshop Data Manage. Sens. Netw., 2010, pp. 2-7.
  3. P. Mohapatra and K. Govindan, “Trust Computations and Trust Dynamics in Mobile Dd Hoc Networks: A survey,” IEEE Commun, vol. 14, no. 2, pp. 279-298, .
  4. G. Han, and D. Wu, “Cross-Layer Pptimized Routing in WSN With Duty-Cycle and Energy Harvesting?, Wireless Commun. Mobile Comput., DOI: 10.1002/ wcm, .
  5. D. Veit, and T. Schulze, “Trustworthiness in Networks: A Simulation Approach for Approximating Local Trust and Distrust Values,” IEEE Commun., vol. 321, pp. 157- 171, .
  6. L. K. Balzano and M. B. Srivastava, “Reputation Based Framework for High Integrity Sensor Networks”, in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., pp. 66-77, .
  7. D. Kim, and Y. Doh, “PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security,” IEEE Int. Conf. Mobile Adhoc Sensor Syst., pp. 437- 446,.
  8. G. Ha and D.Wu, “Cross-layer optimized routing in WSN with duty-cycle and energy harvesting”, Wireless Commun. Mobile Comput., DOI: 10.1002/wcm.2468,
  9. S. Hailes and A. Abdul-Rahman and “Supporting Trust in Virtual Communities”, in The 33rd Hawaii International Conference on System Sciences, Maui, Hawaii, .
  10. R. Ismail, and A. Jsang “The Beta Reputation System”, in The 15th Bled Electronic Commerce Conference. Bled, Slovenia,[ 2002].
  11. G. V. Crosby, and N. Pissinou “A Framework for Trust-Based Cluster Head Election in Wireless Sensor Networks”, in The Second IEEEWorkshop on Dependability and Security in Sensor Networks and Systems, Columbia, Maryland, .
  12. N. Pissinou and G. V. Crosby, ”Cluster-Based Reputation and Trust for Wireless Sensor Networks”, in The 4th IEEE Consumer Communications and Networking Conference (CCNC’07) Las Vegas, Nivada, .
Index Terms

Computer Science
Information Sciences

Keywords

Trust management Security in Wireless Sensor Networks Direct Trust Indirect Trust Shortest Path Calculation.