z-logo
open-access-imgOpen Access
Integrated signature and recommendation‐based trust evaluation protocol for wireless sensor networks
Author(s) -
Kaur Supreet,
Mahajan Rajiv
Publication year - 2017
Publication title -
the journal of engineering
Language(s) - English
Resource type - Journals
ISSN - 2051-3305
DOI - 10.1049/joe.2017.0270
Subject(s) - wireless sensor network , computer science , protocol (science) , computer network , key distribution in wireless sensor networks , signature (topology) , wormhole , wireless , mobile wireless sensor network , wireless network , distributed computing , computer security , telecommunications , medicine , alternative medicine , geometry , mathematics , physics , pathology , quantum mechanics
A wireless sensor network (WSN) is a wireless network containing of spatially distributed autonomous nodes utilising sensors to evaluate the physical or environmental circumstances. In several critical applications, an external user can directly monitor the real‐time information from sensor nodes. In this case, before providing access, authenticity of the user is required to be proved by a suitable technique. Thus, in critical WSNs based real‐time applications, authenticity of the users are very significant. Till now, many techniques have been developed to design a secure protocol for WSNs, to prevent unauthorised access. However, these techniques are vulnerable to wormhole attacks, which happen due to lesser synchronisation among the sensor nodes. Therefore, to handle this problem, an integrated modified‐signature and recommendation‐based trust evaluation protocol for WSNs is proposed. The extensive experiments have shown that the proposed technique outperforms over the available approaches.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here