Secure Packet Transfer in Wireless Sensor Networks
Secure data transfer with minimum overhead is essential. Currently, the secure data transfer in sensor networks uses cryptography, authentication, and probability based approaches. Recently, collaborative trust-based packet transfer technique was used in wireless sensor networks. Further, Sporas fo...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
IFSA Publishing, S.L.
2012-03-01
|
Series: | Sensors & Transducers |
Subjects: | |
Online Access: | http://www.sensorsportal.com/HTML/DIGEST/march_2012/SENSORCOMM/P_SI_217.pdf |
id |
doaj-bea44e6df99049a8a51faace8e62625a |
---|---|
record_format |
Article |
spelling |
doaj-bea44e6df99049a8a51faace8e62625a2020-11-25T00:09:28ZengIFSA Publishing, S.L.Sensors & Transducers2306-85151726-54792012-03-0114-2Special Issue308320Secure Packet Transfer in Wireless Sensor NetworksYenumula B. Reddy0Grambling State University Grambling, LA 71245, USA Secure data transfer with minimum overhead is essential. Currently, the secure data transfer in sensor networks uses cryptography, authentication, and probability based approaches. Recently, collaborative trust-based packet transfer technique was used in wireless sensor networks. Further, Sporas formula helps to update the node’s trust value in a repeated packet transfer. In the proposed research, the trust level of a node is recommended as the average value generated through Sporas formula and repeated trust calculations. If the trust value of a forwarding node is below the threshold (expected value), the node is suspected as malicious and communicates the status to its neighbor nodes. Further, the neighbor nodes calculate their own trust of a suspicious node using their trust value plus trust factor received from their neighbor. The cooperative and collaborative approach helps to eliminate the suspicious node from the communication path. The proposed technique was analyzed, and simulations were provided. http://www.sensorsportal.com/HTML/DIGEST/march_2012/SENSORCOMM/P_SI_217.pdfPacket transferWireless sensor networksCollaborative approachProtocolsTrust-based approachResource |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yenumula B. Reddy |
spellingShingle |
Yenumula B. Reddy Secure Packet Transfer in Wireless Sensor Networks Sensors & Transducers Packet transfer Wireless sensor networks Collaborative approach Protocols Trust-based approach Resource |
author_facet |
Yenumula B. Reddy |
author_sort |
Yenumula B. Reddy |
title |
Secure Packet Transfer in Wireless Sensor Networks |
title_short |
Secure Packet Transfer in Wireless Sensor Networks |
title_full |
Secure Packet Transfer in Wireless Sensor Networks |
title_fullStr |
Secure Packet Transfer in Wireless Sensor Networks |
title_full_unstemmed |
Secure Packet Transfer in Wireless Sensor Networks |
title_sort |
secure packet transfer in wireless sensor networks |
publisher |
IFSA Publishing, S.L. |
series |
Sensors & Transducers |
issn |
2306-8515 1726-5479 |
publishDate |
2012-03-01 |
description |
Secure data transfer with minimum overhead is essential. Currently, the secure data transfer in sensor networks uses cryptography, authentication, and probability based approaches. Recently, collaborative trust-based packet transfer technique was used in wireless sensor networks. Further, Sporas formula helps to update the node’s trust value in a repeated packet transfer. In the proposed research, the trust level of a node is recommended as the average value generated through Sporas formula and repeated trust calculations. If the trust value of a forwarding node is below the threshold (expected value), the node is suspected as malicious and communicates the status to its neighbor nodes. Further, the neighbor nodes calculate their own trust of a suspicious node using their trust value plus trust factor received from their neighbor. The cooperative and collaborative approach helps to eliminate the suspicious node from the communication path. The proposed technique was analyzed, and simulations were provided.
|
topic |
Packet transfer Wireless sensor networks Collaborative approach Protocols Trust-based approach Resource |
url |
http://www.sensorsportal.com/HTML/DIGEST/march_2012/SENSORCOMM/P_SI_217.pdf |
work_keys_str_mv |
AT yenumulabreddy securepackettransferinwirelesssensornetworks |
_version_ |
1725411765975515136 |