vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff0e91290000001a67010001000300 Many problems in WSN security are same as in the traditional network. However, some problems are different at all in computer network such as internet, because of characteristics of WSN self. Sensor nodes of WSN cannot use coding such as public key, complicated authorization and the firewall, because sensor nodes have limited energy and there are little hardware resources such as computation, memory and signal processing. So, recently, they have researched on secure routing and configuration of trust system and optimization of watching node alignment. In previous works, they referred the watching attack of WSN of which topology is routing, but they have not referred the watching attack of WSN of which topology is clustering. First, we configure trust system and propose the optimization of watching node’s position and watching period in clustering WSN in this paper. Second we compare and analyze the proposed method and the method in routing WSN by mathematical modeling.
Won Chol Jang, Jong Ae Choe, Du Ho Pak WonSan Jogunsil University of Technology, D.P.R. of Korea
WSN, Routing, Security, Trust System
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 9 , Issue: 4 , Pages: 1880-1884 )
Date of Publication :
Decemebr 2018
Page Views :
222
Full Text Views :
4
|