Skip to main content
Log in

An extended hierarchical trusted model for wireless sensor networks

  • Trusted Software
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Cryptography and authentication are traditional approach for providing network security. However, they are not sufficient for solving the problems which malicious nodes compromise whole wireless sensor network leading to invalid data transmission and wasting resource by using vicious behaviors. This paper puts forward an extended hierarchical trusted architecture for wireless sensor network, and establishes trusted congregations by three-tier framework. The method combines statistics, economics with encrypt mechanism for developing two trusted models which evaluate cluster head nodes and common sensor nodes respectively. The models form logical trusted-link from command node to common sensor nodes and guarantees the network can run in secure and reliable circumstance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Giordano S.Handbook of Wireless Networks and Mobile Computing [M]. Hoboken: John Wiley and Sons, 2002.

    Book  Google Scholar 

  2. Levente B, Jean P H. Report on a Working Session on Security in Wireless Ad Hoc Networks[J].ACM Mobile Computing and Communications Review. 2003,7(1):74–94.

    Article  Google Scholar 

  3. Amir P A, Datta A, McDonald C. Evolutionary Computation [J].CEC2004, 2004,2:1938–1943.

    Google Scholar 

  4. Tanachaiwiwat S, Dave P, Bhindwale R,et al. Performance Computing, and Communications [C] //IEEE International Conference on 2004. New York: IEEE Press, 2004:463–469.

    Book  Google Scholar 

  5. Gupta G, Younis M. Performance Evaluation of Load-Balanced Clustering of Wireless Sensor Networks [C]//IEEE International conference on communications (ICC 2003). Anchorage. Alaska, May, 2003,33:6–381.

    Google Scholar 

  6. Marti S, Giuli T, Lai K,et al. Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks [C]//The 6th ACM International Conference on Mobile Computing and Networking. New York: ACM Press, 2000:255–265.

    Google Scholar 

  7. Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures [C].First IEEE International Workshop on Sensor Network Protocols and Applications. New York: IEEE Press, 2003:113–127.

    Google Scholar 

  8. Chen J, Luo H Q. Faults Detection and Correction of Nodes' Data in Wireless Sensor Network [J].Journal of Chengdu University of Information Technology, 2004,19(4):309–312 (Ch).

    Google Scholar 

  9. Karlof C, Li Y P, Polastre J.ARRIVE: Algorithm for Robust Routing in Volatile Environments [R]. Berkeley: Computer Science Division University of California Berkeley, May, 2002.

    Google Scholar 

  10. Parkes D C.Iterative Combinatorial Auctions: Achieving Economic and Computational Efficiency [D]. Philadelphia: Department of Computer and Information Science, University of Pennsylvania, May 2001.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Du Ruiying.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60373087, 60473023, 90104005)

Biography: DU Ruiying (1964-), female, Associate professor, research direction: wirless sensor network.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ruiying, D., Mingdi, X. & Huanguo, Z. An extended hierarchical trusted model for wireless sensor networks. Wuhan Univ. J. Nat. Sci. 11, 1489–1492 (2006). https://doi.org/10.1007/BF02831804

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831804

Key words

CLC number

Navigation