Review On: Approaches for Excluding Compromised Node by Evaluating Trust in Wireless Sensor Network |
( Volume 4 Issue 4,April 2017 ) OPEN ACCESS |
Author(s): |
Ravneet Kaur, Priyanka Mehta |
Abstract: |
This paper analyse the enhancements in excluding compromised nodes using AES key encryption sign for identification in wireless sensor network. The wireless sensor networks (WSN) are specialized transducers with spatially dispersed and dedicated autonomous sensor nodes for identifying, monitoring and recording the physical and environmental conditions at different locations. Different trust systems have been proposed to reduce the effect of routing attacks, but most of them could not determine the malicious node effectively and some of them suffer from the attacks on the system. In this paper, we propose a security of wireless sensor network by excluding the black node and compromised nodes.using authorization and encryption and exclude compromised node by evaluating the trust factor in wireless sensor network. The main Emphasis of our research is on to check the trust factor of node from centralized server i.e. Cluster head which control the whole network to prevent the problem of black node. |
Paper Statistics: |
Cite this Article: |
Click here to get all Styles of Citation using DOI of the article. |