International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 180 - Issue 41 |
Published: May 2018 |
Authors: Komal Ligade, S. P. Pingat |
![]() |
Komal Ligade, S. P. Pingat . Efficient Trusted Model in WSN for Privacy Preserving. International Journal of Computer Applications. 180, 41 (May 2018), 1-5. DOI=10.5120/ijca2018917067
@article{ 10.5120/ijca2018917067, author = { Komal Ligade,S. P. Pingat }, title = { Efficient Trusted Model in WSN for Privacy Preserving }, journal = { International Journal of Computer Applications }, year = { 2018 }, volume = { 180 }, number = { 41 }, pages = { 1-5 }, doi = { 10.5120/ijca2018917067 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2018 %A Komal Ligade %A S. P. Pingat %T Efficient Trusted Model in WSN for Privacy Preserving%T %J International Journal of Computer Applications %V 180 %N 41 %P 1-5 %R 10.5120/ijca2018917067 %I Foundation of Computer Science (FCS), NY, USA
In wireless sensor networks (WSNs), many factors, for instance, mutual interference of wireless connections, battlefield applications and nodes presented to the environment without top physical safety, effects in the sensor nodes being extra powerless in against to the attacked compromised. For tackling the issues security, an effective appropriated trust model is proposed. They faces some issues, first is system was not focus on other trust metrics Trust is evaluated by the two ways direct and indirect trust on the basis of recommendation from third party. The third issue is offering the trust assessment on neighbour nodes become very essential. Fourth, trust relationship between sensor nodes frequently modified in wireless sensor networks because of the dynamic topology. For solving all these issues proposed the efficient distributed trust model for wireless sensor networks. This system can estimate dependability of sensor nodes more accurately and prevent the security breaches more considerably. Also for sending the data from subject node to object there are number of paths are generated, in this system we used Dijkastra algorithm for finding the shortest path. Also for the existing system faces the problem of security against the different attacks on network. For security purpose we used ECC algorithm. Experimental result shows that energy consumption for proposed system and existing system.