2015
DOI: 10.3390/s150203299
|View full text |Cite
|
Sign up to set email alerts
|

CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks

Abstract: In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes' battery lives, the BS draws a global view of the network, calculates thr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 23 publications
0
13
0
Order By: Relevance
“…In that model, the node trust calculation, the fuzzy partition and the fusion are carried out successively through the trust factor, the fuzzy set and the D-S evidence theory [9][10][11], with information security improvement in this paper.…”
Section: Design Of Trust Evaluation Modelmentioning
confidence: 99%
“…In that model, the node trust calculation, the fuzzy partition and the fusion are carried out successively through the trust factor, the fuzzy set and the D-S evidence theory [9][10][11], with information security improvement in this paper.…”
Section: Design Of Trust Evaluation Modelmentioning
confidence: 99%
“…Data trust is a value which depends on the maliciousness, cooperation and competence of a node [15]. When a message is received by a node in the network, it is expected that the node will send the same unaltered message to other nodes in the network.…”
Section: Data Trustmentioning
confidence: 99%
“…At the Sink, it firstly verifies RDP and then calculates the total cost of the routing path by using (17). After the Sink receives a few routing discovery packets from node , it makes the routing decision by using (19). The path with the least cost is selected as the optimal path.…”
Section: Routing Algorithmmentioning
confidence: 99%
“…The nodes' trust value and the best routes are calculated for excluding the malicious nodes. Improving on the previous CENTER, CENTERA [19] includes an appropriate authentication scheme, and the base station gathers minimal neighbor trust information from the nodes. Although the base station can calculate and evaluate the trust value of the nodes by the global view of the network, the accuracy of trust metrics about the distributed nodes needs to be improved.…”
Section: Centralized Trust Modelmentioning
confidence: 99%
See 1 more Smart Citation