Research of Various Techniques for Evaluating Nodal Trust in Hierarchical WSN
Aarti K. Naryani1, Rachana Deshmukh2, Rashmi Deshmukh3

1Prof. Aarti K. Naryani, G. H. Raisoni University, (Madhya Pradesh), India.
2Prof. Rachana Deshmukh, G. H. Raisoni University, (Madhya Pradesh), India.
3Prof. Rashmi Deshmukh, Priyadarshini Indira Gandhi College of Engineering, (Maharashtra), India.
Manuscript received on 12 October 2019 | Revised Manuscript received on 21 October 2019 | Manuscript Published on 02 November 2019 | PP: 894-899 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B11470982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1147.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In today’s modern world the wireless sensor networks have become a crucial tool to serve various purposes. The applications falling in range of wireless sensor networks are vast and tend to conquer our everyday life. It was initially designed for surveillance and monitoring for defense related operations but then it also proved to be boon for the health, traffic, consumer and industrial areas. Also, it is one of the most popular technologies for smart cities. However, the wireless sensor networks are highly prone to security attacks, and due to the dynamic, collective and collaborative behavior of sensor networks a secure data transfer has become a challenging task. The deployed sensor nodes, especially in the multi hop environment can get compromised and can behave maliciously. Therefore it becomes necessary to assess the trust worthiness or reliance of the sensor node over the other present in the network. Several researches have investigated various techniques for determining the nodal trust in WSN. This paper discusses the major challenges in wireless sensor network, potential attacks occurring due to compromised nodes along with the different types of trust models. It also figures out some of the existing trust models which are used in evaluating nodal trust in wireless sensor networks.
Keywords: Wireless Sensor Networks, Trust Model, Compromised Nodes, Attacks.
Scope of the Article: WSN