G.Venkata. Monika Miss., P. Sunitha, B. Swathi


Wireless sensor structures (WSNs) are more and more body deployed in freedom-critical applications. Because of their instinctive resource-constrained characteristics, they are ready to different insurance hurts, and an enraged hole hurt is a type of besiege that badly affects data assortment. To achieve that challenge, a keen uncovers ion-based care and protection routing proposal picked Active Trust is planned for WSNs. The most essential vicissitude of Active Trust is full avoids spotted holes over the enthusiastic production of offinding transmits to hurriedly disclose and procure nodal protection and thus progress the data line confidence. More essentially, the period and transport of finding lines require in the Active Trust scenario, whatever can amply use the potential in non-hotspots to start as many uncover ion lines as desired to produce the desired insurance and strength adaptability. Both sweeping imaginative search and developmental results imply that the show of the Active Trust blueprint is correct than that of preceding studies. Active Trust can kind of boost the data road prosperity feasibility and ingenuity in contrast to hostile hole besieges and can correct chain lifetime.


Black Hole Attack; Network Lifetime; Security; Trust; Wireless Sensor Networks;


. Y. Hu, M. Dong, K. Ota, et al. "Mobile Target Detection in Wireless Sensor Networks with Adjustable Sensing Frequency,"IEEE System Journal, Doi: 10.1109/JSYST.2014.2308391, 2014.

. M. Dong, K. Ota, A. Liu, et al. "Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks," IEEETransactions on Parallel and Distributed Systems, vol. 27, no. 1, pp. 225-236, 2016.

. S. He, J. Chen, F. Jiang, et al. "Energy provisioning in wireless rechargeable sensor networks," IEEE transactions on mobile computing, vol. 12, no. 10, pp. 1931-1942, 2013.

. X.Liu,M. Dong, K. Ota, P. Hung, A. Liu. "Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory," IEEE Transactions on Services Computing,vol. 9, no. 2, pp. 186-198, 2016.

. C. Zhu, H. Nicanfar, V. C. M. Leung, et al. "An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration," IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 118-131, 2015.

. A.Liu, M.Dong, K.Ota, et al."PHACK:An Efficient Scheme for Selective Forwarding Attack Detecting in WSNs," Sensors, vol. 15, no. 12, pp. 30942-30963, 2015.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.