Skip to main content
Log in

Security Provision in Wireless Sensor Networks on the Basis of the Trust Model

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This article considers security provision in wireless sensor networks on the basis of the trust model. The operating principles of sensor networks are analyzed, and the classification of routing techniques is composed. Typical threats are analyzed and existing attacks against Wireless Sensor Networks (WSNs) identified. A technique of protection against malicious nodes is elaborated using the trust model. The experimental assessment of the technique for efficiency is performed by modeling its work in a WSN simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.

Similar content being viewed by others

REFERENCES

  1. Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835–843.

    Article  Google Scholar 

  2. Amitoj, K., Gursimrat, S., and Jagroop, K., SPIN: A Data Centric Protocol For Wireless Sensor Networks. https://www.ijert.org/view-pdf/2701/spin-a-data-centric-protocol-for-wireless-sensor-networks. Accessed October 10, 2017.

  3. Idrees, S., Chee-Onn, C., Hiroshi, I., and Tanveer, A., Threat Models and Security Issues in Wireless Sensor Networks. https://www.ijcte.org/papers/806-Z1040.pdf. Accessed October 10, 2017.

  4. Aitmagambetov, A. and Postol’skii, S., Review of problem areas in the security of wireless sensor networks, attacks and their defense mechanisms. https://sibac.info/studconf/tech/xxxii/42203. Accessed October 10, 2017.

  5. Zahariadis, T., Leligou, H., and Karkazis, P., Design and implementation of a trust-aware routing protocol for large WSNs. https://www.ics.uci.edu/~dsm/ics280sensor/readings/networks/routing-survey.pdf. Accessed October 10, 2017.

Download references

ACKNOWLEDGMENTS

The results were attained using the computational capacities of the supercomputer center of Peter the Great St. Petersburg Polytechnic University (SCC Politekhnicheskii) (http://www.spbstu.ru).

This work was financially supported by the Ministry of Education and Science of the Russian Federation as part of the Federal Targeted Program “Research and Development in High-Priority Areas of Development in Russia’s Science and Technology Complex for 2014–2020,” agreement of October 3, 2016, no. 14.578.21.0224 with unique ID RFMEFI57816X0224.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to T. D. Ovasapyan or D. V. Ivanov.

Additional information

Translated by S. Kuznetsov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ovasapyan, T.D., Ivanov, D.V. Security Provision in Wireless Sensor Networks on the Basis of the Trust Model. Aut. Control Comp. Sci. 52, 1042–1048 (2018). https://doi.org/10.3103/S0146411618080205

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080205

Keywords:

Navigation