Revisiting Trust Based Security Techniques in Wireless Network
Ritika Vishwakarma1, Praful Pardhi2

1Ritika Vishwakarma, Department of Computer Science, Ramdeobaba college of Engineering, India.

2Prof. Praful Pardhi, Department of Computer Science, Ramdeobaba college of Engineering, India.

Manuscript received on 09 June 2019 | Revised Manuscript received on 14 June 2019 | Manuscript Published on 08 July 2019 | PP: 538-544 | Volume-8 Issue-8S3 June 2019 | Retrieval Number: H11230688S319/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Trust establishment is a very critical issue in wireless networks. It demonstrates the use of various complex algorithms involved in creating a trust model, applying the model on each node of the network and verifying that the model is not attacked or compromised by trusted nodes. Various researchers have applied multiple algorithms to perform this task, each of the proposed algorithm has their own pros and cons when applied to a real time wireless network. This paper revisits some of the standard algorithms and tries to compare them in terms of efficiency and reliability, so that the readers of this text can get a sufficient level of understanding on which algorithms can be applied to which set of network parameters in order to improve the overall trust quality of the network. We also propose some interesting observations from our study to further enhance trust level of these systems.

Keywords: Trust level, attacks, model, verification, efficiency, reliability.
Scope of the Article: Network Protocols & Wireless Networks