TSIS: A Trust-Based Scheme for Increasing Security in Wireless Sensor Networks

سال انتشار: 1396
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 179

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_MJEE-11-4_006

تاریخ نمایه سازی: 15 اسفند 1401

چکیده مقاله:

Security is considered to be one of the most important challenges in wireless sensor networks (WSNs). Due to inherent resource constraints in WSNs, traditional security mechanisms may not be used in these networks. In recent years, trust and reputation management in distributed systems has been proposed as a novel and accurate way for handling security deficiencies. Such deficiencies are deemed to be inherent in WSNs. Detecting malicious nodes is an important role of Trust models in WSNs. In line with reducing the above-mentioned deficiencies, the present paper has proposed a trust-based scheme for increasing security (TSIS) model for WSNs. The proposed trust-based scheme divides the network into some clusters. Inside each cluster, a special node named supervisor node is responsible for calculating the trust values of other nodes. When supervisor nodes calculate trust values of other nodes in a cluster, they do not distribute these values. The receiver node requests the sender node authentication from its own supervisor node. The proposed method was simulated in the NS-۲ environment. The simulation results indicate that the proposed method has improved energy efficiency and packet delivery rate. Hence, it has better performance than the earlier works with respect to the above-mentioned parameters.

نویسندگان

Mahdi Dibaei

Department of Computer Engineering, Tabriz branch, Islamic Azad University, Tabriz, Iran

Ali Ghaffari

Department of Computer Engineering, Tabriz branch, Islamic Azad University, Tabriz, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • S. V. Vajdi, A. R. Hilal, S. A. Abeer, and ...
  • J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, "Trust ...
  • M. Azharuddin, P. Kuila, and P. K. Jana, "Energy efficient ...
  • I. Banerjee, P. Chanak, H. Rahaman, and T. Samanta, "Effective ...
  • J. Lee, K. Kapitanova, and S. H. Son, "The price ...
  • L. B. Oliveira, A. Ferreira, M. A. Vilaça, H. C. ...
  • J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network ...
  • A. A. Cardenas, T. Roosta, and S. Sastry, "Rethinking security ...
  • Y. Yu, K. Li, W. Zhou, and P. Li, "Trust ...
  • Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and ...
  • J. Duan, D. Gao, C. H. Foh, and H. Zhang, ...
  • G. Sharma, S. Bala, and A. K. Verma, "Security Frameworks ...
  • A. Boukerch, L. Xu, and K. El-Khatib, "Trust-based security for ...
  • H. Xia, Z. Jia, X. Li, L. Ju, and E. ...
  • G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. ...
  • S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based ...
  • R. Mitchell and I.-R. Chen, "A survey of intrusion detection ...
  • T. K. Kim and H. S. Seo, "A trust model ...
  • R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, ...
  • W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication ...
  • X. Anita, M. Bhagyaveni, and J. M. L. Manickam, "Collaborative ...
  • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: ...
  • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Wormhole attacks ...
  • E.-H. Ngai, J. Liu, and M. R. Lyu, "On the ...
  • K. Fall and K. Varadhan, "The ns Manual (formerly ns ...
  • M. U. s. Guide, "The mathworks," Inc., Natick, MA, vol. ...
  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ...
  • A. Wood and J. A. Stankovic, "Denial of service in ...
  • J. Zhao and R. Govindan, "Understanding packet delivery performance in ...
  • Ghaffari, Ali. "Congestion control mechanisms in wireless sensor networks: A ...
  • Ghaffari, Ali. "Real-time routing algorithm for mobile ad hoc networks ...
  • Masoudi, Rahim, and Ali Ghaffari. "Software defined networks: A survey." ...
  • Nikokheslat, Hossein Dabbagh, and Ali Ghaffari. "Protocol for Controlling Congestion ...
  • Ghebleh, Reza, and Ali Ghaffari. "A Multi-criteria Method for Resource ...
  • KeyKhosravi, Davood, Ali Ghaffari, Ali Hosseinalipour, and Batool Abadi Khasragi. ...
  • Azari, Leila, and Ali Ghaffari. "Proposing a novel method based ...
  • نمایش کامل مراجع