Loading

A Survey on Detecting Selfish Nodes in Wireless Sensor Networks Using Different Trust Methodologies
Christhu Raj M R1, Edwin Prem Kumar G2, Kartheek Kusampudi3
1Christhu raj M.R, PG Scholar, Department of Information Technology, Karunya University, Coimbatore, (Tamil Nadu), India.
2G. Edwin Prem Kumar, Assistant Professor, Karunya University,  Coimbatore, (Tamil Nadu), India.
3K. Kartheek, PG Scholar, Department of Information Technology, Karunya University, Coimbatore, (Tamil Nadu), India.
Manuscript received on January 20, 2013. | Revised Manuscript received on February 17, 2013. | Manuscript published on February 28, 2013. | PP: 197-200 | Volume-2 Issue-3, February 2013.  | Retrieval Number: C1055022313/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A Wireless Sensor Networks  Is A Network Used For Computing, Sensing. There Are Various Resource Constrains In Wsn Like Energy, Computational Power, Memory, Design Challenges. The Problem In The Sensor Nodes That Nodes May Get Compromised. The Trust Management Schemes Consist Of Effective Tools To Identify Unexpected Behavior Of Sensor Nodes In The Network. Trust Has Been Effective And Provides Secure Mechanism For Managing Each Sensor Node In Network. In This Paper We Investigated Some Trust Techniques And Present The Effective Methodologies To Calculate The Trust Of A Sensor Node To Eliminate The Selfish Or Compromised Nodes In The Network.
Keywords: Entropy, Reputation, Bayesian, Fuzzy model, Trust.