Trust Based Routing in Wireless Sensor Network

  • Patil* D
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The nodes are often placed in a hostile or dangerous environment so WSN will be vulnerable to security attacks. Attacks can be active or passive. Passive attack involves unauthorized attackers who listen to the communication channel and monitor its activities. In active attack, the unauthorized attacker’s listens, monitors and alters the data passing through the communication channel. To address security concerns, cryptography approach has been adopted but this alone cannot cope with some of the routing attacks. As sensor devices are resource constrained, existing cryptography approach may not be applicable, due to the computational complexities that it involves [1] [3]. Hence, author present energy efficient trust based routing strategy, which is a viable alternative for WSN.

Cite

CITATION STYLE

APA

Patil*, Dr. M., & M.A, Dr. goutham. (2020). Trust Based Routing in Wireless Sensor Network. International Journal of Innovative Technology and Exploring Engineering, 9(6), 1292–1295. https://doi.org/10.35940/ijitee.f3888.049620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free