2009
DOI: 10.3390/s90503958
|View full text |Cite
|
Sign up to set email alerts
|

Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks

Abstract: Security in wireless sensor networks is difficult to achieve because of the resource limitations of the sensor nodes. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad reputation feedback to the network. This approach has been extensively simulated, obtaining good results, even for unrealistically complex attack scenarios. Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 40 publications
(42 reference statements)
0
16
0
Order By: Relevance
“…(viii) Statistical Method-Based Method. Although certain method is not proposed in [38], authors refer to using localization information and route analysis for messages coming from the same area. Specifically, authors refer to use of statistical process of network data to detect wormholes.…”
Section: (Vii) Unsupervised Genetic Algorithm Based Methodmentioning
confidence: 99%
See 3 more Smart Citations
“…(viii) Statistical Method-Based Method. Although certain method is not proposed in [38], authors refer to using localization information and route analysis for messages coming from the same area. Specifically, authors refer to use of statistical process of network data to detect wormholes.…”
Section: (Vii) Unsupervised Genetic Algorithm Based Methodmentioning
confidence: 99%
“…(i) Greyhole/selective forwarding [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34] (ii) Wormhole [35][36][37][38][39][40][41][42][43] (iii) Sinkhole [26,[42][43][44][45][46][47][48][49][50] (iv) Sybil attacks [51][52][53][54][55][56][57][58][59] Since we did not find a significant number of articles for other attacks, we overview articles only for the abovementioned attacks.…”
Section: Proposed Trust Mechanisms To Secure Routingmentioning
confidence: 99%
See 2 more Smart Citations
“…However, a vast amount of techniques have been developed for WSNs, most of them based on trust and reputation, offering a high degree of security. The main contribution of this article consists in showing how these approaches can also be applied to WMNs, in particular the approach described in Moya et al (2009).…”
Section: Improving Security In Wmnsmentioning
confidence: 99%