International Journal of Recent Trends in Engineering & Research

online ISSN

To Prevent Internal Attack in Trust Model for Wireless Sensor Networks

Publication Date : 24/02/2016

Author(s) :

U. L. Prajapati , R.R. Sedamkar , K. A. Bhandari.

Volume/Issue :
Volume 2
Issue 2
(02 - 2016)

Abstract :

Security is the one of the main concern in Wireless Sensors Networks (WSNs), And they are likely to be affected by many security threats, and because of multiple factor like communication, computation and to put off until a later time of WSNs, traditional security mechanisms cannot be used. Trust models have been recently suggested as a tool to produce a decisive effect on security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. To calculate nodes trust value communicational behavior is taken into consideration by many researchers, which is not enough for trust evaluation due to the widely diffused malicious attacks on wireless sensor networks. Calculation of direct and recommendation trust are done by considering the numbers of packet received by sensor nodes. Firstly the direct trust is calculated by considering communication trust, data trust and energy trust. Trust reliability and intimacy are defined to improve the accuracy of recommendation trust. In this paper best energy route is selected, here at the time of route request it can estimate total possible route with least hop count and best energy. Attacker node can give fake energy, in these via fake energy message it can hack route and get all packets. Trust model is built to prevent hacker. Our work will enhance the security of previous implemented trust model do perform the same vampire attack is been proposed. Vampire attack who actually does not hack any packet but it will recommend taking long route and end-to-end delay rate is increased. For more security here we can use key sharing and grid pattern method to prevent hacker. The proposed Method can evaluate trustworthiness of sensor nodes more precise manner and prevent the security fortification more effectively.

No. of Downloads :