Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN
Open Access
- 1 January 2014
- journal article
- Published by Scientific Research Publishing, Inc. in Wireless Sensor Network
- Vol. 06 (08), 157-172
- https://doi.org/10.4236/wsn.2014.68016
Abstract
In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink. Alternatively, trust management schemes are tools to evaluate the trust of a node and thereby choosing a node for routing, and also detecting their unexpected node behaviour (either faulty or malicious). In this paper, we propose TENCR: a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations. The proposed new technique detects the malicious and selfish nodes very efficiently than the arithmetic mean based methods, and allows trustworthy nodes in routing, thereby eliminating malicious/selfish nodes. Our proposed trust evaluation method is adaptive and energy efficient that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish. Hence, trustworthy nodes only be allowed in routing, and malicious/selfish nodes will be eliminated automatically.Keywords
This publication has 10 references indexed in Scilit:
- A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)Wireless Sensor Network, 2011
- Trust management systems for wireless sensor networks: Best practicesComputer Communications, 2010
- A novel flexible trust management system for heterogeneous wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Location verification and trust management for resilient geographic routingJournal of Parallel and Distributed Computing, 2007
- Monitoring civil structures with a wireless sensor networkIEEE Internet Computing, 2006
- Location-based compromise-tolerant security mechanisms for wireless sensor networksIEEE Journal on Selected Areas in Communications, 2006
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- Wireless sensor networks for habitat monitoringPublished by Association for Computing Machinery (ACM) ,2002
- Wireless sensor networks: a surveyComputer Networks, 2002
- SPINS: Security Protocols for Sensor NetworksWireless Networks, 2002