AN EFFORT TO DETERMINE CREDIBILITY AND STATUS OF SENSOR NODES
Abstract
Iterative filtering algorithms hold great promise for this type of purpose. Because of limited computational power and sources, aggregation of information from multiple sensor nodes done in the aggregating node is generally accomplished by simple methods for example averaging. Within this paper we show several existing iterative filtering algorithms, while considerably better quality against collusion attacks compared to simple averaging methods, are nonetheless susceptive to some novel sophisticated collusion attack we introduce. However such aggregation is proven to be highly susceptible to node compromising attacks. Because the performance of really low power processors dramatically improves, future aggregator nodes will manage to performing modern-day data aggregation algorithms, thus making WSN less vulnerable. Thus, ascertaining standing of data and status of sensor nodes is vital for WSN. Such algorithms concurrently aggregate data from multiple sources and supply trust assessment of those sources, usually in a kind of corresponding weight factors allotted to data supplied by each source. To deal with this security issue, we advise a noticeable difference for iterative filtering techniques by supplying a preliminary approximation for such algorithms causing them to be not just collusion robust, but additionally better and faster converging.
Keywords
References
H.-L. Shi, K. M. Hou, H. ying Zhou, and X. Liu, “Energy efficient and fault tolerant multicore wireless sensor network: E2MWSN,” in Proc. 7th Int. Conf. Wireless Commun., Netw. Mobile Comput., 2011, pp. 1–4.
L. Wasserman, All of Statistics : A Concise Course in Statistical Inference. New York, NY, USA: Springer,.
M. Li, D. Ganesan, and P. Shenoy, “PRESTO: Feedback-driven data management in sensor networks,” in Proc. 3rd Conf. Netw. Syst. Des. Implementation, vol.3, 2006, pp. 23–23.
C. T. Chou, A. Ignatovic, and W. Hu, “Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 8, pp. 1525–1534, Aug. 2013.
E. Ayday, H. Lee, and F. Fekri, “An iterative algorithm for trust and reputation management,” Proc. IEEE Int. Conf. Symp. Inf. Theory, vol. 3, 2009, pp. 2051–2055.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.