A Survey on Trust Based Techniques in Wireless Sensor Networks

Authors

  • Prof. Sidharth Bhalerao  Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India
  • Rakesh Kumar Yadav  Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India

Keywords:

Wireless Sensor Networks, Geographic Adaptive Fidelity, Spin, Location Based Protocols, Rumor Routing

Abstract

The remote sensor organize is a standout amongst the most well-known system advances for various applications. Various applications, for example, climate observing and geo-area following are executed utilizing the WSN innovation. Because of this these systems are used in basic circumstances. In this manner, the security in the imparted information is an essential part of the system as the execution of the system. Consequently, in this work the remote sensor organize security is examined and another safe directing system is proposed for securing the information transmitted over the system. For giving the security a Trust and Opinion construct approach is utilized with respect to organize. This report gives the formal review and the arrangement steps which are required to consolidate with the safe steering.

References

  1. PriyaMaidamwar and NekitaChavhan, "A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network", International Journal on Ad-Hoc Networking Systems (IJANS) Vol. 2, No. 4, October 2016
  2. Kia Xiang and ShyaamSundharRajamadam, "Attacks and Countermeasures in Sensor Networks: A Survey", pp 1-28, Springer, 2017.
  3. Anjali Potnis, and C S Rajeshwari, "Wireless Sensor Network: Challenges, Issues and Research", Proceedings of 2016 International Conference on Future Computational Technologies (ICFCT'2016), pp. 224-228, March 29-30, Singapore,2016.
  4. Al-Shurman, M. Yoo, S. Park, "Black hole attack in Mobile Ad Hoc Networks" ACM Southeast Regional Conference, 2017, pp. 96-97.
  5. Shiho Kumar Singh, M P Singh and D K Singh," Routing Protocol in Wireless Sensor Networks- A Survey " International Journal of ComputerScienceandEngineeringSurvey(IJCSES),vol.1,No.2.
  6. Shio Kumar Singh, M P Singh, D K Singh, "A Survey on Network Security and Attack Defence Mechanism for Wireless Sensor Networks", International Journal of Computer Trends and Technology-, May to June Issue 2016
  7. M. Yasir Malik, "An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations", Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management.
  8. Dr. Manoj Kumar Jain, "Wireless Sensor Networks: Security Issues and Challenges", IJCIT, vol. 2, issue 1, pp. 62-67, 2017
  9. Pooja, Manisha, Dr.Yudhvir Singh, "Security Issues and Sybil Attack in Wireless Sensor Networks", International Journal of P2P Network Trends and Technology, vol. 3, issue 1, pp. 7-13,2016.
  10. Mona Sharifnejad, Mohsen Sharifi, MansourehGhiasabadi, SarehBeheshti, "A Survey on Wireless Sensor Networks Security", SETIT 2015, 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, March 25- 29, 2017 – TUNISIA
  11. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, "A survey on balck hole attack in wireless mobile ad hoc network" (2011), Springer.
  12. BounpadithKannhavong and Hidehisa Nakayama, "A Survey of Routing Attacks in Mobile Ad Hoc Networks", IEEE Wireless Communications October 2007, University of Washington
  13. Fan-Hsun Tseng1, Li-Der Chou1and Han-Chieh Chao2, 3, 4" A survey of black hole attacks in wireless mobile ad-hoc networks".
  14. E. A. Mary Anita and V. Vasudevan," Black Hole Attack Prevention in multicast routingProtocols for MANETs Using Certificate Chaining", IJCA, Vol.1, No.12, pp.22–29,2010
  15. Dharmendra Mishra, Deepak Sukheja, Sunil Patel, "A Review on Grey Hole Attack in Wireless Sensor Network."
  16. Nishant Sitapara, Prof. Sandeep B. Vanjale,"Detection and Prevention of Black HoleAttack in Mobile Ad-Hoc Networks".
  17. Hongmei Deng, Wei Li, and Dharma P.Agrawal "Routing Security in Wireless AdHoc Network" IEEE Communications Magzine, vol. 40, PP.70-75, 2002
  18. Sanjay Ramaswamy, Huirong Fu, ManoharSreekantaradhya, John Dixon and KendallNygard "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks".
  19. Wei Gong, Zhiyang You1, Danning Chen, Xibin Zhao, Ming Gu, Kwok-Yan Lam, "Trust Based Malicious Nodes Detection in MANET", 2009 IEEE
  20. N. Bhalaji1, Dr. A. Shanmugam2," Defense Strategy Using Trust Based Model to Mitigate Active Attacks in DSR Based MANET". Journal of Advances in Information Technology, Vol. 2, No. 2, May2011.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Sidharth Bhalerao, Rakesh Kumar Yadav, " A Survey on Trust Based Techniques in Wireless Sensor Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.270-277, May-June-2018.