This website uses cookies to ensure you have the best experience. Learn more

Trust Based Misbehavior Detection In Wireless Sensor Networks

1749 words - 7 pages

III. Problem Statement

This paper focuses on modeling and calculating trust between nodes in WSNs, based on sensed continuous data to address security issues and deal with malicious and misbehavior nodes and for assisting the decision-making process. A new trust model and a reputation system for WSNs can be proposed. The trust model establishes the continuous version of the reputation system applied to binary events and presents a new trust and reputation system for sensor Networks. This approach for mixing of second hand information from neighboring nodes with directly observed information to calculate trust between nodes in WSNs. Trust metrics can be used to evaluate the trust value of each node in the clusters. Behaviors are monitored by monitoring node (MN). Monitoring node selected at the next higher level of CH, this can also be changed dynamically along with CH. The main focus of this paper is to develop a fuzzy theory based trust and reputation model for WSNs environment.

IV. System Model
A. Architecture
The architecture of our proposed system, consists of four major blocks namely,
i. Cluster Formation and CH selection
ii. Information Gathering
iii. Trust Evaluation and Propagation
iv. Misbehavior Detection
The detailed description about the architecture is as follows.

Fig. 2. Overall Architecture of the Proposed System

Fig.2. shows the overall architecture of the proposed work. In wireless sensor networks, the sensor nodes are densely deployed in the region. After deployment, the nodes are group together to form a clusters based on various criteria such as location and communication range. Cluster formation involves the establishment of cluster head, monitoring node and member nodes. In which the nodes are broadcast their energy and ID to base station. The node which has maximum energy that will be elected as Cluster Head (CH). Other nodes become members of clusters or local nodes. The nodes update their energy; accordingly the Cluster Head can change dynamically. The various type of trust factors are used to collect the information from the sensor nodes. The information can be gathered by direct observation and indirect observations. Trust evaluation involves the process of computation of the node’s trust value based on the trust model. The node’s trusts such as the node’s historical trust values and the node’s current trust values are computed. The node’s historical trust value is calculated by observing the node’s behavior. Based on the historical trust value, node’s capability level calculated, the node’s current trust is calculated by using the fuzzy rules prediction. This two trust value is of great importance and plays a major role in establishing trusted information to the monitoring node (MN). Based on that, trust value can be aggregated; if the threshold level is low then it will be identified as malicious node by base station. If the threshold level is high, then it will be used for communications. After that,...

Find Another Essay On Trust Based Misbehavior Detection in Wireless Sensor Networks

Transmission Power Control in Single-hop and Multi-hop Wireless Sensor Networks

2291 words - 9 pages 1 Transmission Power Control in Single-hop and Multi-hop Wireless Sensor Networks Abstract—A major challenge in wireless sensor network (WSN) deployment is to minimize sensor node’s energy consumption to prolong the lifetime of the finite-capacity batteries. Power control is one of the main techniques used to conserve energy in wireless sensor networks. In this paper we provide an efficient power control scheme for WSNs based on Telosb

Probabilistic Detection of the Flood Attackers in Disruption Tolerant Networks

2481 words - 10 pages Attacks in Sensor Networks’ IEEE Symposium on Security and Privacy, 2005. Feng Li, Avinash Srinivasan, and Jie Wu, ‘Thwarting Blackhole Attacks in Distruption-Tolerant Networks Using Encounter Tickets,’ Proceedings of IEEE INFOCOM, 2009. Jelena Mirkovic, Seven Dietrich, David Dittrich and Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall, 2005. Qinghua Li and Guohong Cao, ‘Mitigating Routing Misbehavior in

Biologically Inspired QoS Aware Routing Protocol to Optimize Lifetime in Sensor Networks

3126 words - 13 pages Journal of Recent Trends in Engineering, May 2009, Vol. 1, No. 1. [9] M. Keyur Rana, A. Mukesh Zaveri, “Techniques for efficient routing in wireless sensor network”, International Conference on Intelligent Systems and Data Processing (ICISD), 2011. [10] B. Shuang, L. Yang, L. Zhenbo, C. Jiapin, “An ant-based on-demand energy routing protocol for ad hoc wireless networks”, International Conference on Wireless Communications, Networking and Mobile

audio Based Event Detection in Videos - A Survey

816 words - 4 pages is to find a mapping from the feature space to the target labels so as to reduce the prediction error. The general system components of the audio based video event detection is presented in Figure 1. The major components of the system are the audio data representation and learning methodologies. An audio signal can be represented by many number of features. Audio feature extraction is an important phase for any type of audio data. It is process

audio Based Event Detection in Videos - A Survey

698 words - 3 pages the maximum and minimum samples within non-overlapping frames. They are suitable for comparing waveform. Amplitude Descriptor (AD) are the ones that have been developed to recognize sounds of the animal. The descriptor is the one that separates the signal with low and high amplitude by an adaptive threshold. AD signifies the waveform in both quiet and loud segments. 3) Power Based Features: The energy of a signal is defined as the square of the

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1264 words - 6 pages : The wireless sensor networks in healthcare application are growing fast. As most devices and their applications are wireless in nature, security and privacy are among the major areas of concern [8]. People may not see wireless devices as safe for daily use because these wireless devices may be used for monitoring and tracking individuals by government agencies or other private organizations [8]. A passive attack may happen while a wireless

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1073 words - 5 pages on the Emergency Care: The Internet is an important part of modern life that allows hospital staff to access and share information and communicates to and within companies, hospitals and other institutions. As technology advances, the demand has increased for wired and wireless networks and computer users review these networks based on different perspectives. Specifically in the medical field, IT specialists should invest in wireless networks

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1140 words - 5 pages data, companies, banks, and government departments, for example, select network cables to access the Internet. However, when companies such as restaurants and coffee shops consider Internet speeds, they select Wi-Fi networks because they are more convenient. Each computer user must decide the direction they want to go: Wi-Fi or cables. While wired networks are currently superior in security, the popularity of wireless networks means wireless

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks - 926 words

926 words - 4 pages work more efficiently and provide better care to patients. A wireless internet protocol (IP) phone is a mobile phone that connects to wireless networks and functions include voice, fax, text and voice messaging. Nurses need to communicate with many different people in hospitals: doctors, radiologists, physical therapists and patients. Agarwal claims as nurses’ responsibilities increase, they need to quickly reach the right people at the right

Quantifying the End-to-End Delay Performance in Multihop Wireless Networks

3684 words - 15 pages This project uses a window based flow control and rate based scheduling algorithm for multihop wireless networks with fixed-route flows operated under a general interference model with interference degree. The proposed algorithm not only achieves a provable throughput guarantee, but also leads to explicit upper bounds on the end-to-end delay of every flow. The end-to-end delay and throughput bounds are in simple and closed forms, and they

Facial Features Detection in Colour Images Based on Skin Colour Segmentation

924 words - 4 pages modeling, expression analysis, control system, video games control and security purpose. During the last year many method were proposed for facial features detection. Face detection method should be classified three categories, Knowledge based method, Template machine method and Appearance based method. Knowledge base method discussed about the basic facial features [1]. In case of template matching method face recognition is parameterized by

Similar Essays

Wireless Sensor Networks Essay

1238 words - 5 pages A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Trust in networks may be defined as the degree of belief or confidence about the nodes on the past interactions and observations. So trust becomes a major issue for reliable communication in WSN under constraints. We propose a

Wireless Sensor Networks (Ws Ns) Essay

2677 words - 11 pages common application of wireless sensor networks, the WSN used to cover a region to monitor some phenomenon such as the geo-fencing of oil or gas lines, and enemy intrusion detection in military use. 3- Health Care monitoring: Body-area networks can provide data about an individual's health, long-term observing for patients with chronicle illnesses or the elderly or post-operative care by implant medical devices with WSN inside human body. 4

Innovative Field In Computer Science Research Is Wireless Sensor Networks

1688 words - 7 pages consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. Some of the available standards include 2.4 GHz radios based on either IEEE 802.15.4[low-rate wireless personal area networks (LR-WPANs)] or IEEE 802.11 [wireless local area network (WLAN)] standards or proprietary radios, which are usually 900 MHz. The emergence of wireless sensor networks in the recent years can be characterized

Literature Review On Underwater Wireless Sensor Networks

2272 words - 9 pages Summary Underwater wireless sensor networks are significantly different from terrestrial sensor networks in which sound is mainly used as the communication medium. This paper reviews the main challenges caused by the underwater environment for the development of efficient under water sensor networking solutions and introduces several novel medium access control (MAC) protocols with power control to increase efficiency and save on energy. I