A Review on Trust Management Approaches in Wireless Sensor Networks

Authors(2) :-Prof. Parikshit Tiwari, Raj Kumari Kushwaha

The wireless sensor network is one of the most popular network technologies for different applications. A number of applications such as weather monitoring and geo-location tracking are implemented using the WSN technology. Due to this these networks are utilized in critical situations. Therefore, the security in the communicated data is a primary aspect of the network as the performance of the network. Therefore, in this work the wireless sensor network security is investigated and a new secure routing technique is proposed for securing the data transmitted over the network. For providing the security a Trust and Opinion based approach is employed on network. This document provides the formal overview and the solution steps which are required to incorporate with the secure routing.

Authors and Affiliations

Prof. Parikshit Tiwari
Rewa Institute of Technology, Rewa, Madhya Pradesh, India
Raj Kumari Kushwaha
Rewa Institute of Technology, Rewa, Madhya Pradesh, India

Wireless Sensor Networks, WSN technology, GAF, Gear, MAC, UDP, TCP, RREP, Grey-hole attacker, NHN, AODV

  1. PriyaMaidamwar and NekitaChavhan, "A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network", International Journal on Ad-Hoc Networking Systems (IJANS) Vol. 2, No. 4, October 2014
  2. Kia Xiang and ShyaamSundharRajamadam, "Attacks and Countermeasures in Sensor Networks: A Survey", pp 1-28, Springer, 2015.
  3. Anjali Potnis, and C S Rajeshwari, "Wireless Sensor Network: Challenges, Issues and Research", Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015), pp. 224-228, March 29-30, Singapore,2015.
  4. Al-Shurman, M. Yoo, S. Park, "Black hole attack in Mobile Ad Hoc Networks" ACM Southeast Regional Conference, 2014, pp. 96-97.
  5. Shiho Kumar Singh, M P Singh and D K Singh," Routing Protocol in Wireless Sensor Networks- A Survey " International Journal of ComputerScienceandEngineeringSurvey(IJCSES),vol.1,No.2.
  6. Shio Kumar Singh, M P Singh, D K Singh, "A Survey on Network Security and Attack Defence Mechanism for Wireless Sensor Networks", International Journal of Computer Trends and Technology-, May to June Issue 2015
  7. M. Yasir Malik, "An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations", Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management.
  8. Dr. Manoj Kumar Jain, "Wireless Sensor Networks: Security Issues and Challenges", IJCIT, vol. 2, issue 1, pp. 62-67, 2016
  9. Pooja, Manisha, Dr.Yudhvir Singh, "Security Issues and Sybil Attack in Wireless Sensor Networks", International Journal of P2P Network Trends and Technology, vol. 3, issue 1, pp. 7-13,2013.
  10. Mona Sharifnejad, Mohsen Sharifi, MansourehGhiasabadi, SarehBeheshti, "A Survey on Wireless Sensor Networks Security", SETIT 2015, 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, March 25- 29, 2015 TUNISIA
  11. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, "A survey on balck hole attack in wireless mobile ad hoc network" (2011), Springer.

Publication Details

Published in : Volume 3 | Issue 5 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 609-614
Manuscript Number : IJSRSET1734151
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Prof. Parikshit Tiwari, Raj Kumari Kushwaha, " A Review on Trust Management Approaches in Wireless Sensor Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.609-614, July-August-2017.
Journal URL : http://ijsrset.com/IJSRSET1734151

Article Preview