A Review on Trust Management Approaches in Wireless Sensor Networks

Authors

  • Prof. Parikshit Tiwari  Rewa Institute of Technology, Rewa, Madhya Pradesh, India
  • Raj Kumari Kushwaha  Rewa Institute of Technology, Rewa, Madhya Pradesh, India

Keywords:

Wireless Sensor Networks, WSN technology, GAF, Gear, MAC, UDP, TCP, RREP, Grey-hole attacker, NHN, AODV

Abstract

The wireless sensor network is one of the most popular network technologies for different applications. A number of applications such as weather monitoring and geo-location tracking are implemented using the WSN technology. Due to this these networks are utilized in critical situations. Therefore, the security in the communicated data is a primary aspect of the network as the performance of the network. Therefore, in this work the wireless sensor network security is investigated and a new secure routing technique is proposed for securing the data transmitted over the network. For providing the security a Trust and Opinion based approach is employed on network. This document provides the formal overview and the solution steps which are required to incorporate with the secure routing.

References

  1. PriyaMaidamwar and NekitaChavhan,  "A  Survey  on  Security Issues to Detect Wormhole Attack in Wireless Sensor Network", International Journal on Ad-Hoc Networking Systems (IJANS) Vol. 2, No. 4, October 2014
  2. Kia Xiang and ShyaamSundharRajamadam, "Attacks and Countermeasures in Sensor Networks: A Survey", pp  1-28, Springer, 2015.
  3. Anjali Potnis, and C S Rajeshwari, "Wireless Sensor Network: Challenges, Issues and Research", Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015), pp. 224-228, March 29-30, Singapore,2015.
  4. Al-Shurman, M. Yoo, S. Park, "Black  hole attack  in  Mobile  Ad Hoc Networks" ACM Southeast Regional Conference, 2014, pp. 96-97.
  5. Shiho Kumar Singh, M P Singh and D K Singh," Routing Protocol  in Wireless Sensor Networks- A Survey " International Journal of ComputerScienceandEngineeringSurvey(IJCSES),vol.1,No.2.
  6. Shio Kumar Singh, M P Singh, D K Singh, "A Survey on Network Security and Attack Defence Mechanism for Wireless Sensor Networks", International Journal of Computer Trends and Technology-, May to June Issue 2015
  7. M. Yasir Malik, "An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations", Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management.
  8. Dr. Manoj Kumar Jain, "Wireless Sensor Networks: Security Issues and Challenges", IJCIT, vol. 2, issue 1, pp. 62-67, 2016
  9. Pooja, Manisha, Dr.Yudhvir Singh, "Security Issues and Sybil  Attack in Wireless Sensor Networks", International Journal of P2P Network Trends and Technology, vol. 3, issue 1, pp. 7-13,2013.
  10. Mona Sharifnejad, Mohsen Sharifi, MansourehGhiasabadi, SarehBeheshti, "A Survey on Wireless Sensor Networks Security", SETIT 2015, 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, March 25- 29, 2015 – TUNISIA
  11. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, "A survey on balck hole attack in wireless mobile ad hoc network" (2011), Springer.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Prof. Parikshit Tiwari, Raj Kumari Kushwaha, " A Review on Trust Management Approaches in Wireless Sensor Networks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.609-614, July-August-2017.