SlideShare a Scribd company logo
Node-Level Trust Evaluation in Wireless Sensor Networks
ABSTRACT:
Traditional cryptographic methods do not cater to the limitations of Wireless
Sensor Networks WSNs primarily concerning code size, processing time, and
power consumption. The study in this paper enumerates the security primitives in
WSNs and accentuates the strength of trust evaluation as a security solution within
the WSN precincts. The paper proposes a trust evaluation methodology that
evaluates a node-level trust by using an internal resource of a node. It is completely
mediating technique which is independent of network topology and second-hand
information. The Challenge-Response model enables a node to evaluate trust for
itself; and with its peer-node/s with which it intends to interact using the proposed
Self-Scrutiny and Self-Attestation algorithms, respectively. The efficacy of the
proposed software-based methodology and the algorithms is demonstrated with the
actual implementation on sensor nodes. The ability to counter attack-scenarios
along with the analysis exhibit the merit of the proposed work. The average values
of the observed results illustrates the consistency and robust performance of the
proposedtrust evaluation algorithms.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : UBUNTU/Windows XP/7
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool
Command Language)
 Tool : Cygwin (To simulate in Windows
OS)
REFERENCE:
S Sundeep Desai and Manisha J Nene, “Node-Level Trust Evaluation in Wireless
Sensor Networks”, IEEE Transactions on Information Forensics and Security,
Volume: 14, Issue: 8, Aug. 2019.

More Related Content

PDF
Network Security IEEE 2015 Projects
DOCX
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
DOCX
A novel en route filtering scheme against false data injection attacks in cyb...
DOCX
Secure data aggregation technique for wireless
PDF
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOCX
Secure data aggregation technique for wireless sensor networks in the presenc...
Network Security IEEE 2015 Projects
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
Secure data aggregation technique for wireless sensor networks in the presenc...
A novel en route filtering scheme against false data injection attacks in cyb...
Secure data aggregation technique for wireless
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
Secure data aggregation technique for wireless sensor networks in the presenc...

What's hot (19)

DOCX
top-k query result completeness verification in tiered sensor networks
DOCX
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
The three tier security scheme in wireless
PDF
Modelling of A Trust and Reputation Model in Wireless Networks
PDF
Wormhole attack detection algorithms
DOCX
Adaptive distributed outlier detection for ws ns
DOCX
An efficient distributed trust model for wireless sensor networks
PDF
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
DOCX
Local area prediction based mobile target tracking in wireless sensor networks
DOCX
A secure scheme against power exhausting attacks in hierarchical wireless sen...
DOCX
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
PDF
The Use of K-mer Minimizers to Identify Bacterium Genomes in High Throughput ...
PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
PDF
A1803060110
PDF
Fault Diagonosis Approach for WSN using Normal Bias Technique
DOCX
Hop by hop message authentication chapter 1
PDF
Machine Learning Project
top-k query result completeness verification in tiered sensor networks
Privacy preserving and truthful detection of packet dropping attacks in wirel...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
The three tier security scheme in wireless
Modelling of A Trust and Reputation Model in Wireless Networks
Wormhole attack detection algorithms
Adaptive distributed outlier detection for ws ns
An efficient distributed trust model for wireless sensor networks
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
Local area prediction based mobile target tracking in wireless sensor networks
A secure scheme against power exhausting attacks in hierarchical wireless sen...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
The Use of K-mer Minimizers to Identify Bacterium Genomes in High Throughput ...
Wormhole attack detection algorithms in wireless network coding systems
Mahdieh zabihi imc45-Fuzzy Inference for Intrusion Detection of Web Robots in...
A1803060110
Fault Diagonosis Approach for WSN using Normal Bias Technique
Hop by hop message authentication chapter 1
Machine Learning Project
Ad

Similar to Node-Level Trust Evaluation in Wireless Sensor Networks (8)

PDF
An efficient distributed trust model for wireless sensor networks
DOCX
An efficient distributed trust model for wireless
PDF
Published Journal
PDF
Trust management scheme for ad hoc networks using a social network bas
PDF
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
PDF
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
PDF
Secure and Trustable Routing in WSN for End to End Communication
PDF
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless
Published Journal
Trust management scheme for ad hoc networks using a social network bas
Dynamic Trust Management of Unattended Wireless Sensor Networks for Cost Awar...
RISK ASSESSMENT ALGORITHM IN WIRELESS SENSOR NETWORKS USING BETA DISTRIBUTION
Secure and Trustable Routing in WSN for End to End Communication
OPTIMIZATION OF CLUSTER HEAD SELECTION APPROACH USING STATE TRANSITION AND GE...
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
PDF
Dot Net Final Year IEEE Project Titles.pdf
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
PDF
Python IEEE Project Titles 2023 - 2024.pdf
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
DOCX
Spammer detection and fake user Identification on Social Networks
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
DOCX
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks
Java Web Application Project Titles 2023-2024.pdf
Dot Net Final Year IEEE Project Titles.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Spammer detection and fake user Identification on Social Networks
Sentiment Classification using N-gram IDF and Automated Machine Learning
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Crop Yield Prediction and Efficient use of Fertilizers
Collaborative Filtering-based Electricity Plan Recommender System
Achieving Data Truthfulness and Privacy Preservation in Data Markets
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
Towards Fast and Reliable Multi-hop Routing in VANETs
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks

Recently uploaded (20)

PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Computing-Curriculum for Schools in Ghana
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
master seminar digital applications in india
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
RMMM.pdf make it easy to upload and study
102 student loan defaulters named and shamed – Is someone you know on the list?
O7-L3 Supply Chain Operations - ICLT Program
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Computing-Curriculum for Schools in Ghana
Supply Chain Operations Speaking Notes -ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Cell Types and Its function , kingdom of life
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Sports Quiz easy sports quiz sports quiz
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Microbial diseases, their pathogenesis and prophylaxis
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
STATICS OF THE RIGID BODIES Hibbelers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
master seminar digital applications in india
Anesthesia in Laparoscopic Surgery in India
RMMM.pdf make it easy to upload and study

Node-Level Trust Evaluation in Wireless Sensor Networks

  • 1. Node-Level Trust Evaluation in Wireless Sensor Networks ABSTRACT: Traditional cryptographic methods do not cater to the limitations of Wireless Sensor Networks WSNs primarily concerning code size, processing time, and power consumption. The study in this paper enumerates the security primitives in WSNs and accentuates the strength of trust evaluation as a security solution within the WSN precincts. The paper proposes a trust evaluation methodology that evaluates a node-level trust by using an internal resource of a node. It is completely mediating technique which is independent of network topology and second-hand information. The Challenge-Response model enables a node to evaluate trust for itself; and with its peer-node/s with which it intends to interact using the proposed Self-Scrutiny and Self-Attestation algorithms, respectively. The efficacy of the proposed software-based methodology and the algorithms is demonstrated with the actual implementation on sensor nodes. The ability to counter attack-scenarios along with the analysis exhibit the merit of the proposed work. The average values of the observed results illustrates the consistency and robust performance of the proposedtrust evaluation algorithms. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED
  • 2.  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : UBUNTU/Windows XP/7  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: S Sundeep Desai and Manisha J Nene, “Node-Level Trust Evaluation in Wireless Sensor Networks”, IEEE Transactions on Information Forensics and Security, Volume: 14, Issue: 8, Aug. 2019.