{"title":"基于信任的无线传感器网络地理路由协议性能分析","authors":"P. Vamsi, K. Kant","doi":"10.1109/PDGC.2014.7030763","DOIUrl":null,"url":null,"abstract":"Deploying Wireless Sensor Networks (WSNs) in hostile and remote environments are often lead to vulnerabilities and prone to various security attacks. These attacks can disrupt the regular network operations such that the dependable metrics of routing protocols can be seriously affected. Conventional cryptography techniques have proved their strength in communication security rather than the routing security. To achieve the routing security, numerous researchers have utilized a human behavior patten called trust. In this paper, the authors present a study on the performance of various trust based geographic routing protocols for WSNs. After studying the trust based routing protocols, the performance of these protocols are analyzed using NS-2 simulations. With the extensive simulations, it is noted that each protocol has their own advantages and limitations in discovering and isolating the malicious nodes from the routing process. Finally, with the observations from the simulations, the authors suggests extensions to the trust models to make them more robust against detecting malicious nodes.","PeriodicalId":311953,"journal":{"name":"2014 International Conference on Parallel, Distributed and Grid Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Performance analysis of trust based geographic routing protocols for Wireless Sensor Networks\",\"authors\":\"P. Vamsi, K. Kant\",\"doi\":\"10.1109/PDGC.2014.7030763\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deploying Wireless Sensor Networks (WSNs) in hostile and remote environments are often lead to vulnerabilities and prone to various security attacks. These attacks can disrupt the regular network operations such that the dependable metrics of routing protocols can be seriously affected. Conventional cryptography techniques have proved their strength in communication security rather than the routing security. To achieve the routing security, numerous researchers have utilized a human behavior patten called trust. In this paper, the authors present a study on the performance of various trust based geographic routing protocols for WSNs. After studying the trust based routing protocols, the performance of these protocols are analyzed using NS-2 simulations. With the extensive simulations, it is noted that each protocol has their own advantages and limitations in discovering and isolating the malicious nodes from the routing process. Finally, with the observations from the simulations, the authors suggests extensions to the trust models to make them more robust against detecting malicious nodes.\",\"PeriodicalId\":311953,\"journal\":{\"name\":\"2014 International Conference on Parallel, Distributed and Grid Computing\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Parallel, Distributed and Grid Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC.2014.7030763\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Parallel, Distributed and Grid Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC.2014.7030763","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance analysis of trust based geographic routing protocols for Wireless Sensor Networks
Deploying Wireless Sensor Networks (WSNs) in hostile and remote environments are often lead to vulnerabilities and prone to various security attacks. These attacks can disrupt the regular network operations such that the dependable metrics of routing protocols can be seriously affected. Conventional cryptography techniques have proved their strength in communication security rather than the routing security. To achieve the routing security, numerous researchers have utilized a human behavior patten called trust. In this paper, the authors present a study on the performance of various trust based geographic routing protocols for WSNs. After studying the trust based routing protocols, the performance of these protocols are analyzed using NS-2 simulations. With the extensive simulations, it is noted that each protocol has their own advantages and limitations in discovering and isolating the malicious nodes from the routing process. Finally, with the observations from the simulations, the authors suggests extensions to the trust models to make them more robust against detecting malicious nodes.