Loading…

A Novel Heuristic Approach Based Trust Worthy Architecture for Wireless Sensor Networks

A Wireless Sensor Networks (WSNs) consist of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. WSNs are more vulnerable to attacks and failures due to the involvement of many...

Full description

Saved in:
Bibliographic Details
Published in:Wireless personal communications 2013-05, Vol.70 (1), p.189-205
Main Authors: Dhulipala, V. R. Sarma, Karthik, N., Chandrasekaran, RM
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A Wireless Sensor Networks (WSNs) consist of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. WSNs are more vulnerable to attacks and failures due to the involvement of many numbers of tiny sensor nodes. As the technology is tremendously increasing in the recent past, the implementation of this for various time critical applications is quite interesting and challenging. Moreover, WSNs have no specific hierarchical structures, leads to security and maintenance problems. Trust in WSN is defined as the degree of belief or confidence about the nodes based on the past interactions and observations has which become a mandatory requirement for reliable communication in WSN under security constraints. In this paper, we propose a Heuristic Approach based Trust Worthy Architecture for WSN that considers the challenges of the system and focus on the collaborative mechanism for trust evaluation and maintenance. Our proposed Architecture could also be capable of fulfilling critical security, reliability, mobility and performance requirements for reliable communication while being readily adaptable to different applications. The simulation results of the proposed architecture outperformed the recent trust worthy architecture using the analysis of the performance requirements such as communication overhead, memory requirements and energy consumption.
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-012-0688-1