Abstract
The inducing popularity of Wireless Sensor Network (WSN) is more concern with security factors. Secure communication is essential for demanding applications of WSN. Authentication being the crucial service due to deployment of nodes in unattended environment, this paper focus on analysis of popular trust authentication protocols such Trust Aware Routing Framework (TARF), Trust Aware Secure Routing Framework (TSRF), Trust Based Routing Scheme (TRS), Trust Guaranteed Routing (TGR) and Pair Key Based Trust Authentication Protocol (PTAP). Their performance is measured in sample simulation environment. To ensure perfect security in terms of authentication service, analysis of attack scenarios are performed. To implement this, fake attacks are created and the remaining number of legitimate nodes is measured in presence of attacks such as Sybil, black hole, replication and tampering. The analysis results in showing how each protocol withstand with different attack scenarios.
Cite
CITATION STYLE
Analysis of Attack Scenarios in Trust Authentication Protocols. (2019). International Journal of Innovative Technology and Exploring Engineering, 9(2S2), 848–858. https://doi.org/10.35940/ijitee.b1132.1292s219
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.