Featuring trust and reputation management systems for constrained hardware devices
Proceedings of the 1st international conference on Autonomic computing and communication systems
Trust management systems for wireless sensor networks: Best practices
Computer Communications
A survey on secure multipath routing protocols in WSNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
A dynamic TDMA based scheme for securing query processing in WSN
Wireless Networks
Multi-layer hybrid wired-cum-wireless sensor network design
International Journal of Communication Networks and Distributed Systems
Management and applications of trust in Wireless Sensor Networks: A survey
Journal of Computer and System Sciences
Hi-index | 0.00 |
The election of a malicious or compromised node as the cluster head is one of the most significant breaches in cluster-based wireless sensor networks. In light of this, we are introducing a distributed trust-based framework and a mechanism for the election of trustworthy cluster heads. Our proposed mechanism reduces the likelihood of compromised and or malicious nodes from being selected as cluster heads. Our premise is that while individual nodes may still be prone to attack, a significant vulnerability is addressed if we prevent the election of compromised cluster heads. We do not seek a 'cure for all solution' rather we introduce a framework and a mechanism to address a potentially significant security breach. We performed an evaluation of our approach and the power consumption of our model, by simulations. The results indicate clear advantages of our approach in preventing the election of untrustworthy cluster heads.