A Review on Trust Management Approaches in Wireless Sensor Networks
Keywords:
Wireless Sensor Networks, WSN technology, GAF, Gear, MAC, UDP, TCP, RREP, Grey-hole attacker, NHN, AODVAbstract
The wireless sensor network is one of the most popular network technologies for different applications. A number of applications such as weather monitoring and geo-location tracking are implemented using the WSN technology. Due to this these networks are utilized in critical situations. Therefore, the security in the communicated data is a primary aspect of the network as the performance of the network. Therefore, in this work the wireless sensor network security is investigated and a new secure routing technique is proposed for securing the data transmitted over the network. For providing the security a Trust and Opinion based approach is employed on network. This document provides the formal overview and the solution steps which are required to incorporate with the secure routing.
References
- PriyaMaidamwar and NekitaChavhan, "A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network", International Journal on Ad-Hoc Networking Systems (IJANS) Vol. 2, No. 4, October 2014
- Kia Xiang and ShyaamSundharRajamadam, "Attacks and Countermeasures in Sensor Networks: A Survey", pp 1-28, Springer, 2015.
- Anjali Potnis, and C S Rajeshwari, "Wireless Sensor Network: Challenges, Issues and Research", Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015), pp. 224-228, March 29-30, Singapore,2015.
- Al-Shurman, M. Yoo, S. Park, "Black hole attack in Mobile Ad Hoc Networks" ACM Southeast Regional Conference, 2014, pp. 96-97.
- Shiho Kumar Singh, M P Singh and D K Singh," Routing Protocol in Wireless Sensor Networks- A Survey " International Journal of ComputerScienceandEngineeringSurvey(IJCSES),vol.1,No.2.
- Shio Kumar Singh, M P Singh, D K Singh, "A Survey on Network Security and Attack Defence Mechanism for Wireless Sensor Networks", International Journal of Computer Trends and Technology-, May to June Issue 2015
- M. Yasir Malik, "An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations", Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management.
- Dr. Manoj Kumar Jain, "Wireless Sensor Networks: Security Issues and Challenges", IJCIT, vol. 2, issue 1, pp. 62-67, 2016
- Pooja, Manisha, Dr.Yudhvir Singh, "Security Issues and Sybil Attack in Wireless Sensor Networks", International Journal of P2P Network Trends and Technology, vol. 3, issue 1, pp. 7-13,2013.
- Mona Sharifnejad, Mohsen Sharifi, MansourehGhiasabadi, SarehBeheshti, "A Survey on Wireless Sensor Networks Security", SETIT 2015, 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, March 25- 29, 2015 – TUNISIA
- Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao, "A survey on balck hole attack in wireless mobile ad hoc network" (2011), Springer.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.