alexa Abstract | REPUTATION BASED ZONE TRUST DETECTION AND SWATT REVOCATION METHOD USING SPRT IN SENSOR NETWORKS
ISSN ONLINE(2319-8753)PRINT(2347-6710)

International Journal of Innovative Research in Science, Engineering and Technology
Open Access

Like us on: https://twitter.com/ijirset_r
OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access

Abstract

Wireless sensor networks can be used in several real world applications, including various critical applications such as military surveillance, infrastructure security monitoring and fault detection. Typically sensors are deployed in large number in environments that may not be safe or easily accessible to humans. An adversary or attacker can modify the sensor nodes that operate in the harsh environment and thus can insert faulty data to mislead the whole network. Hence in order to reduce the damage occurred to the compromised sensor nodes, it is extremely important to detect and revoke them as early as possible. The main idea is to propose zone based node compromise detection and revocation scheme for sensor networks. This is achieved using reputation based trust management scheme and software based attestation technique. Software attestation technique has been proposed to verify the integrity of the code without physical access. Whereas Reputation-based Framework for Sensor Networks maintain reputation for other nodes. This reputation is used to evaluate the trustworthiness of other nodes, which in turn establishes a web of trust in the network, which is then used as an inherent aspect in predicting the future behaviour of nodes in the network. Thus the proposed scheme provides effective and robust compromised sensor node detection and revocation capability with little overhead.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): Rakshith Upparige K R , Sateesh Kumar H C

Keywords

Node compromise detection, sequential analysis, Aerospace Engineering,Applied Electronics,Applied Sciences,Biochemistry,Botany,Fluid Dynamics.

Share This Page

Additional Info

Loading
Loading Please wait..
 
 
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords