Abstract
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption.
Highlights
There are various attacking threats in Wireless Sensor Networks (WSNs) [1], which can be classified into routing protocol loopholes related attack, such as Sybil attack, false routing information attack, selective forwarding attack, Sinkhole attack, Wormhole attacks and fraudulent confirmation attack; and broadcast authentication loopholes related attack, such as HELLO flood attack, DOS attack and DDOS attack
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks
The redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing
Summary
There are various attacking threats in Wireless Sensor Networks (WSNs) [1], which can be classified into routing protocol loopholes related attack, such as Sybil attack, false routing information attack, selective forwarding attack, Sinkhole attack, Wormhole attacks and fraudulent confirmation attack; and broadcast authentication loopholes related attack, such as HELLO flood attack, DOS attack and DDOS attack. Donggan Liu et al proposed μTESLA [2] and solved the broadcast authentication loopholes related attack in most application scenario The former type of attack, remains an open question for developing a generalized model for common applications. It is significant to develop a trust management system suitable for WSNs. which can resist attack from hostile nodes effectively, and save node energy and network bandwidth to ensure network existence time and effectiveness. It is a challenge to reach a moderate balance between 2) and 3) so as to design an applicable trust system in WSNs. 4) Security in WSNs. The designed system shall be able to resist malicious attack, identify attack behavior from hostile node and take effective resisting actions
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have