Approaches for Excluding Compromised Node by Evaluating Trust in Wireless Sensor Network |
( Volume 4 Issue 5,May 2017 ) OPEN ACCESS |
Author(s): |
Ravneet Kaur, Priyanka Mehta |
Abstract: |
This paper analyse the most important and significant advancements in wireless sensor network using AES key encryption sign for identification. Wireless Sensor Network (WSN) is a collection of sensor nodes that involve in gathering of happenings from a nodes' surrounding. Routing attacks are one of the most common attacks in which the attacker can make disorders in wireless sensor network communications. In order to confronting these attacks, encryption methods are not enough because compromised node, have access to the secret information and can go across the traditional methods. At this time, the most effective way to confront these attacks in WSNs is to use trust management systems. Different trust systems have been proposed to reduce the effect of routing attacks, but most of them could not determine the malicious node effectively and some of them suffer from the attacks on the system. In this paper, we propose a centralized trust management system using authorization and encryption and exclude compromised node by evaluating the trust factor in wireless sensor network, which is not only resistant against routing attacks but also against the trust system attacks. |
Paper Statistics: |
Cite this Article: |
Click here to get all Styles of Citation using DOI of the article. |