Sociopsychological trust model for Wireless Sensor Networks

نویسندگان

  • Heena Rathore
  • Venkataramana Badarla
  • George K. J
چکیده

Trust plays a crucial role in establishing and retaining relationships. Sociopsychological analysis identifies three major constructs, such as ability, benevolence and integrity, uponwhich trust is being built up. On a similar note, in a Wireless Sensor Network (WSN), it is indispensable to have trust among nodes since nodes collectively sense physical parameters and send them to the base station. The nodes, however, can behave fraudulently and send bad information, mostly due to hardware and software faults. Taking inspiration from the sociopsychological account, the present paper introduces a novel model for computing trust of sensor nodes. Additionally, the immune inspired model is suggested for removing fraudulent nodes whose trust ratings fall below the threshold. Roles of the three factors, viz. ability, benevolence and integrity, are examined in WSN domain. The proposed model proves itself to be more advantageous than other methods that adopt machine learning and neural network models in performance metrics such as detection time, reliability, scalability, efficiency and complexity. Proposed work has been implemented on LabVIEW platform and the results substantiate the reliability of the proposed mathematical model. & 2015 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

A multiple criteria algorithm for planning the itinerary of mobile sink in wireless sensor networks

The mobile sink can increase the efficiency of wireless sensor networks. It moves in a monitored environment and collects the network nodes information. Thus, by the sink we can balance the power consumption and increases the network lifetime. Determining path of the sink's movement is usually modeled as an optimization problem where finding optimal solutions require collecting value of all the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 62  شماره 

صفحات  -

تاریخ انتشار 2016