Abstract

Authentication mechanism is the basis of access control and data exchange. In wireless sensor networks, the
 vulnerability of network nodes and complexity of communication protocols pose a huge challenge for designing authentication mechanism in such environment. In this paper, we study the authentication mechanism in wireless sensor networks based on trust between nodes. We use the interaction history of nodes for recommendation trust computation, and the interaction history comes from the interactions between nodes. We design a penalty mechanism for hostile nodes based on the TCP congestion control protocol, and present a loyalty based trust recommendation evaluation algorithm. Massive experiments validate the efficiency and effectiveness of the proposed approach.

Highlights

  • @7FIAD= 3@6 ;@8AD?3F;A@ 3557EE @ E75F;A@ I7 BD7E7@F AGD BDABAE76 FDGEF 43E76 3GF:7@F;53F;A@ ?75:3@;E?

  • GF:7@F;53F;A@ ;E F:7 ?AEF ;?BADF3@F ;EEG7 ;@ @7FIAD= E75GD;FK3@6;F;@5>G67E7@F;FK3GF:7@F;53F;A@013@6?7E E3973GF:7@F;53F;A@01@F;FK3GF:7@F;53F;A@;EF:7BD;?3 DK BDA4>7?

  • ;@ 3557EE 5A@FDA> 3@6 ;F ;E F:7 8;DEF 43DD;7D A8 E75GD;FK;@I;D7>7EEE7@EAD@7FIAD=E55AD6;@9FA678;@; F;A@ A8 5DKBFA9D3B:K 7@F;FK 3GF:7@F;53F;A@ ;E F:7 ;67@F;FK 3GF:7@F;53F;A@ BDA57EE 8DA?

Read more

Summary

Introduction

@7FIAD= 3@6 ;@8AD?3F;A@ 3557EE @ E75F;A@ I7 BD7E7@F AGD BDABAE76 FDGEF 43E76 3GF:7@F;53F;A@ ?75:3@;E? GF:7@F;53F;A@ ;E F:7 ?AEF ;?BADF3@F ;EEG7 ;@ @7FIAD= E75GD;FK3@6;F;@5>G67E7@F;FK3GF:7@F;53F;A@013@6?7E E3973GF:7@F;53F;A@01@F;FK3GF:7@F;53F;A@;EF:7BD;?3 DK BDA4>7? ;@ 3557EE 5A@FDA> 3@6 ;F ;E F:7 8;DEF 43DD;7D A8 E75GD;FK;@I;D7>7EEE7@EAD@7FIAD=E55AD6;@9FA678;@; F;A@ A8 5DKBFA9D3B:K 7@F;FK 3GF:7@F;53F;A@ ;E F:7 ;67@F;FK 3GF:7@F;53F;A@ BDA57EE 8DA?

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.