Multihop Trust Evaluation using Memory integrity in Wireless Sensor Networks

      

ABSTARCT :

Research efforts in trust evaluation has evolved to provide security in Wireless Sensor Networks (WSNs), while being dependent on external parameters and network topology. Existing node level trust evaluation in WSNs evaluate trust over 1-hop assuring trustworthiness of an immediate node. This paper proposes trust evaluation using the intrinsic property of a node memory over a multihop scenario which also evaluates the route. The work proposes a multihop trust evaluation protocol using TEAM and TEAP algorithms. Two proposed trust evaluation models each are proposed using normative and empirical methods in multihop algorithms. The proposed methodology establishes a trusted destination node along with trusted nodes in the route. The efficacy of the proposed work and its implementation is demonstrated using extensive experiments and the results illustrate consistency and resilience against node memory tampering.

EXISTING SYSTEM :

? WSNs are a collection of self-organised sensor nodes that form a temporary network. Neither pre-defined network infrastructure nor centralised network administration exists. ? This is because wireless networks have a significantly lower data transmission capacity compared to fixed-line data networks. ? In the following section a brief survey, introducing only the methodology used to formulate trust and how is it being updated, of existing research on trust in WSNs is presented in order to easily understand the concept of trust. ? The low cost of the sensor nodes of a WSN prohibits sophisticated measures to ensure data authentication.

DISADVANTAGE :

? The research on trust management technology in WSNs is a challenging direction. How to construct a trust model is a key issue. ? These schemes were suitable for addressing the distributed authorization issues, and they had the advantages of flexibility and scalability. ? In addition, the trust value can be taken as a tool to solve the security issues for routing protocol in WSNs, due to the lower computational overhead. ? In SNTUA, the reputations of nodes and their neighbors were further modified and comprehensively evaluated to improve the detection rate of malicious behaviors and reduce the impact of malicious nodes on WSN.

PROPOSED SYSTEM :

• A network voting algorithm called TrustVoting was also proposed to determine faulty sensor readings. • The authors of proposed the TIBFIT protocol to diagnose and mask arbitrary node failures in an event-driven wireless sensor network. • A few other systems related to trust in WSNs, have been proposed in the literature such as, which use one or more of the techniques mentioned before to calculate trust. • The proposed model in uses a single trust value for a whole group (cluster), assuming that sensor nodes mostly fulfil their responsibilities in a cooperative manner rather than individually.

ADVANTAGE :

? The performance of three different supervised classifiers in assigning sensitivity values was compared during the evaluation process. ? This scheme had higher security, when there were a small number of compromised nodes in the network; however, when more than a quarter of the nodes were compromised, the performance was unsatisfactory. ? ReTrust could not only effectively identify malicious behaviors and eliminate malicious/fault nodes but also significantly improve network performance. ? Meanwhile, in the designing process of trust management system, considering fully energy consumption and optimizing trust evaluation scheme are needed in order to improve the performance of the system.

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp