9 research outputs found

    Trust models in wireless sensor networks: A survey

    Full text link
    This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads to the development of new trust models addressing the continuous data issue and also to combine the data trust and the communication trust to infer the total trust. © 2010 Springer-Verlag Berlin Heidelberg

    Swarm Intelligence-Optimized Energy Management for Prolonging the Lifetime of Wireless Sensor Networks

    Get PDF
     Recent technological and industrial progress has enabled the development of small, high-performing, energy-saving, affordable sensor nodes that possess the potential to adapt, be self-aware, and self-organize. These nodes are designed for versatile communications applications. Sensor networks for sustainable development focus on the ways in which sensor network technology can enhance social development and improve living standards without causing harm to the environment or depleting natural resources. Wireless sensor networks (WSNs) offer undeniable benefits in various fields, including the military, healthcare, traffic monitoring, and remote image sensing. Given the constraints of sensor networks, varying degrees of security are necessary for these critical applications, posing difficulties in the implementation of conventional algorithms. The issue of security has emerged as a primary concern in the context of IoT and smart city applications. Sensor networks are often regarded as the fundamental building blocks of IoTs and smart cities. The WSN encompasses a routing algorithm, network strength, packet loss, energy loss, and various other intricate considerations. The WSN also addresses intricate matters such as energy usage, a proficient approach for picking cluster heads, and various other concerns. The recent growth of Wireless Sensor Networks (WSNs) has made it increasingly difficult to ensure the trustworthiness and reliability of data due to the distinct features and limitations of nodes. Hostile nodes can easily damage the integrity of the network by inserting fake and malicious data, as well as launching internal attacks. Trust-based security is employed to detect and identify rogue nodes, providing a robust and adaptable protection mechanism. Trust evaluation models are crucial security-enhancement mechanisms that enhance the reliability and collaboration of sensor nodes in wireless sensor networks. This study recommends the use of DFA UTrust, a unique trust technique, to effectively satisfy the security requirements of WSNs

    A Survey of Provenance Leveraged Trust in Wireless Sensor Networks

    Get PDF
    A wireless sensor network is a collection of self-organized sensor nodes. WSNs have many challenges such as lack of a centralized network administration, absence of infrastructure, low data transmission capacity, low bandwidth, mobility, lack of connectivity, limited power supply and dynamic network topology. Due to this vulnerable nature, WSNs need a trust architecture to keep the quality of the network data high for a longer time. In this work, we aim to survey the proposed trust architectures for WSNs. Provenance can play a key role in assessing trust in these architectures. However not many research have leveraged provenance for trust in WSNs. We also aim to point out this gap in the field and encourage researchers to invest in this topic. To our knowledge our work is unique and provenance leveraged trust work in WSNs has not been surveyed before. Keywords:Provenance, Trust, Wireless Sensor Networks  

    On perimeter coverage in wireless sensor networks

    Get PDF
    Many sensor network applications require the tracking and the surveillance of target objects. However, in current research, many studies have assumed that a target object can be sufficiently monitored by a single sensor. This assumption is invalid in some situations, especially, when the target object is so large that a single sensor can only monitor a certain portion of it. In this case, several sensors are required to ensure a 360 coverage of the target. To minimize the amount of energy required to cover the target, the minimum set of sensors should be identified. Centralized algorithms are not suitable for sensor applications. In this paper, we describe our novel distributed algorithm for finding the minimum cover. Our algorithm requires fewer messages than earlier mechanisms and we provide a formal proof of correctness and time of convergence. We further demonstrate our performance improvement through extensive simulations. © 2006 IEEE.published_or_final_versio

    On perimeter coverage in wireless sensor networks with minimum cost

    Get PDF
    One of the major applications of sensor networks is tracking and surveillance. Very often, a single sensor is sufficient to monitor a single target. However, when the object is very large, several sensors have to work together to monitor the object continuously. In this paper, we study how to identify a set of sensors that can cover the perimeter of a large target with the minimum cost. We develop a novel distributed algorithm that requires fewer messages than existing mechanisms. Our algorithm can be extended to solve the problem when the sensor range is adjustable. We provide a formal proof of correctness and convergence time analysis of our algorithm. We further demonstrate the performance through extensive simulations. © 2011 Inderscience Enterprises Ltd.postprin

    A Trust-Based Geographical Routing Scheme in Sensor Networks

    No full text
    Abstract — Devices in a sensor network need to work in a hostile environment and they are usually powered by batteries. Yet the whole purpose of deploying a sensor network is to perform distributed collaborative computing, possibly in a massive scale. In a hostile computing environment, the sensor devices might be routinely tampered with. Together with the possibility of faulty devices due to extreme conditions or low power, the trustworthiness of a device varies. Specifically, a device should only communicate with another device which has a trust level above a certain threshold. However, setting up trusted communication channels among sensor devices remains a major challenge. In this paper, we propose a trust-based routing scheme in sensor networks for providing a high level of robustness in node selection based on packet trust requirement with lifetime consideration. Our protocol allows messages to be routed through malicious and faulty devices with the selection of trusted neighbors. On the other hand, the network lifetime can also be prolonged by selecting those with their sensing functions covered by some existing nodes. Simulation results show that our scheme is possible to prolong the lifetime of sensor networks and maintain certain satisfactory delivery ratio. I
    corecore