DYNAMIC CONVICTION PROTECTED AND TRUSTABLE DIRECTION-FINDING IN WIRELESS SENSOR NETWORKS

K.Ram Venkatesh, P.V.N.N Durga Prasad

Abstract


Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attackthat seriously affects data collection. To conquer that challenge, an energetic recognition-based security and trust routing plan named Dynamic Convictionis recommended for WSNs. The key factor innovation of Dynamic Conviction can it be avoiding black holes while using the active development of numerous recognition routes to quickly identify and obtain nodal trust and for that reason raise the data route security. Furthermore, the generation and distribution of recognition routes receive inside the Dynamic Convictiont plan, that could utilize the ability in non-hotspots to create as much recognition routes as needed to possess preferred security and efficiency.Wireless sensor systems (WSNs) are increasingly more being deployed in security-critical applications. Because of their natural resource-restricted characteristics, they will probably various security attacks, plus a black hole attack is a type of attack that seriously affects data collection.


Keywords


Network Lifetime; Dynamic Conviction; Wireless Sensor Networks;

References


. M. Dong, K. Ota, A. Liu, et al. "Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks," IEEETransactions on Parallel and Distributed Systems, vol. 27, no. 1, pp. 225-236, 2016.

. X.Liu,M. Dong, K. Ota, P. Hung, A. Liu. "Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory," IEEE Transactions on Services Computing,vol. 9, no. 2, pp. 186-198, 2016.

. C. Zhu, H. Nicanfar, V. C. M. Leung, et al. "An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration," IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 118-131, 2015.

. A. Liu, X. Jin, G.Cui, Z. Chen, "Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network,"InformationSciences,vol. 230, pp.197-226, 2013.

. Z. Zheng, A. Liu, L. Cai, et al."Energy and Memory Efficient Clone Detection in Wireless Sensor Networks,"IEEE Transactions on Mobile Computing.vol. 15, no. 5, pp.1130-1143,2016.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.