Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks

Author:

Xia Zhengxin12ORCID,Wei Zhe3ORCID,Zhang Huan3ORCID

Affiliation:

1. College of Continuing Education, Nanjing University of Posts and Telecommunications, Nanjing 210042, China

2. Engineering Research Center of Medicine Information, Nanjing University of Posts and Telecommunications, Nanjing 210042, China

3. School of Computer Science, Civil Aviation Flight University of China, Guanghan 618307, China

Abstract

The scale of wireless sensor networks changes depending on specific application tasks. How to design a relatively simple security mechanism that can extend with the expansion of network scale is an arduous task. As the wireless sensor network mostly adopts the decentralized organization form, once the network nodes are distributed adequately, it is difficult to find out the failure of any node. In addition, the node has weak resistance to physical damage, so any node in the network may potentially become a cause of security vulnerability. In this study, firstly, the security standards that wireless sensor networks should have and the current security challenges faced by the network are discussed in detail, and the importance of security issues in wireless sensor networks is pointed out. Secondly, this paper studies and analyzes the current situation of wireless sensor network security problems including the internal and external attacks and the active and passive attacks. Thirdly, this paper also discusses the significance, concept, and characteristics of reputation and trust, the division and composition of reputation and trust system, and the common applications of the reputation and trust mechanism in wireless sensor networks.

Funder

Civil Aviation Information Technology Research Center of CAFUC

Publisher

Hindawi Limited

Subject

General Mathematics,General Medicine,General Neuroscience,General Computer Science

Reference51 articles.

1. Analysis of security threats, requirement, technologies and standards in wireless sensor networks;J. Lopez,2009

2. TSTE: a time-variant stochastic trust evaluation model in social networks;J. Li;KSII Transactions on Internet and Information Systems,2017

3. Trust based monitoring approach for mobile ad hoc networks;N. Battat,2017

4. A robust and adaptive trust management system for guaranteeing the availability in the internet of things environments;X. Wu;KSII Transactions on Internet and Information Systems,2018

5. Big data security access control algorithm based on memory index acceleration in WSNs

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3