• A sensor node wirelessly sends messages to a base station via multi-hop path Fig: Wireless sensor network
• Security of WSNs• Trust Aware Shell : A robust trust aware routing framework for dynamic WSNs provides trustworthy and energy-efficient route effective against harmful attacks
• Hackers aggravate network conditions• A traditional techniques does not address the severe problems: tampering nodes create traffic collision drop or misdirect messages in routes jam the communication channel by creating radio interference
• Protect WSNs from the harmful attacks exploiting the replay of routing information• Centres on trustworthiness and energy efficiency• Allow existing routing protocols to incorporate our implementation• No tight time synchronization & known geographic information
• G. Zhan, W. Shi, and J. Deng, “Tarf: A trust-aware routing framework for wireless sensor networks,” in Proceeding of the 7th European Conference on Wireless Sensor Networks (EWSN’12), 2012.• F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann Publishers, 2004.• C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.• M. Jain and H. Kandwal, “A survey on complex wormhole attack in wireless ad hoc networks,” in Proceedings of International Con- ference on Advances in Computing, Control, and Telecommunication Technologies (ACT ’09), 28-29 2009
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.