{"title":"一种新的基于信任的无线传感器网络恶意节点防范路由协议","authors":"B. Priayoheswari, K. Kulothungan, A. Kannan","doi":"10.1109/ICRTCCM.2017.35","DOIUrl":null,"url":null,"abstract":"In Wireless Sensor Networks, topology management guarantees energy efficiency and maintains the connection among the nodes.Most of the existing systems are not providing trust among the sensor nodes.Therefore,issues in security should also be considered in the management of topology in WSN.To overcome the above problem,in this paper,we propose (TBR) a TRust Based Routing with Topology management.Moreover this Topology Management uses RSSI values for constructing Topology in WSN and for maintaining the nodes in transmission range in the presence of malicious nodes.This model is used to perform secure routing in WSN. From the experiment conducted it is observed that the proposed method provides an efficient trust based routing in WSN compared to existing methods.","PeriodicalId":134897,"journal":{"name":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Novel Trust Based Routing Protocol to prevent the Malicious Nodes in Wireless Sensor Networks\",\"authors\":\"B. Priayoheswari, K. Kulothungan, A. Kannan\",\"doi\":\"10.1109/ICRTCCM.2017.35\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Wireless Sensor Networks, topology management guarantees energy efficiency and maintains the connection among the nodes.Most of the existing systems are not providing trust among the sensor nodes.Therefore,issues in security should also be considered in the management of topology in WSN.To overcome the above problem,in this paper,we propose (TBR) a TRust Based Routing with Topology management.Moreover this Topology Management uses RSSI values for constructing Topology in WSN and for maintaining the nodes in transmission range in the presence of malicious nodes.This model is used to perform secure routing in WSN. From the experiment conducted it is observed that the proposed method provides an efficient trust based routing in WSN compared to existing methods.\",\"PeriodicalId\":134897,\"journal\":{\"name\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTCCM.2017.35\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTCCM.2017.35","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Trust Based Routing Protocol to prevent the Malicious Nodes in Wireless Sensor Networks
In Wireless Sensor Networks, topology management guarantees energy efficiency and maintains the connection among the nodes.Most of the existing systems are not providing trust among the sensor nodes.Therefore,issues in security should also be considered in the management of topology in WSN.To overcome the above problem,in this paper,we propose (TBR) a TRust Based Routing with Topology management.Moreover this Topology Management uses RSSI values for constructing Topology in WSN and for maintaining the nodes in transmission range in the presence of malicious nodes.This model is used to perform secure routing in WSN. From the experiment conducted it is observed that the proposed method provides an efficient trust based routing in WSN compared to existing methods.