4.6 Article

Enhanced approach using trust based decision making for secured wireless streaming video sensor networks

期刊

MULTIMEDIA TOOLS AND APPLICATIONS
卷 79, 期 15-16, 页码 10157-10176

出版社

SPRINGER
DOI: 10.1007/s11042-019-7585-5

关键词

Cluster member; Cluster head; LEACH; Base station; Sinkhole; Black hole

向作者/读者索取更多资源

The advances in the expanse of image sensors have made it conceivable to make high-resolution picture sensors easily accessible. The amelioration of wireless interactive media sensor networks are found to be greatly increased due to the day to day usage of cameras, microphones and smart devices. A secured multi-hop routing mechanism is addressed in surveillance areas which could be incorporated to the multimedia sensors that are capable of peruse the detected data comprises of recorded images and videos. Also, malevolent sensor hubs could be interjected into the vigilance area in an untrusted environment. In this contemplated venture, a novel lightweight trust decision-making framework is accomplished for QoS clustering to give secure routing in both intercluster and intracluster communication. A quantifiable aberrant trust value is the variable determined by the Cluster Head (CH) for its Cluster Member (CM) inside the cluster. The LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is adopted for group formation and also for the exchange of the trust values among the master nodes, member nodes and Base station. In this way, the correspondence overhead, likelihood of dynamic assaults for example sinkhole and black hole assaults mount by eavesdroppers can be reduced by maintenance of trust values by cluster heads rather than cluster members. Besides, in wireless streaming video sensor networks this approach authorizes us to predict and counteract malicious untrusted and flawed nodes. Simulation results using NS-2 is examined and the suggested trust decision-making model escalates the dependability, elasticity and low memory aloft in comparison with the current trust models adopted for wireless video sensor network security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据