13.01.2013 Views

Calculating trust in sensor networks

Calculating trust in sensor networks

Calculating trust in sensor networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Name Direct- Indirect-<strong>trust</strong> Warn<strong>in</strong>g mechanism Monitored behaviour* Rout<strong>in</strong>g protocol<br />

Confidant X X X ? DSR<br />

CORE X X X (1,8) DSR<br />

SRP X X X 1 not specified<br />

TARP X X X 1 not specified<br />

T-GPSR X 1,2 GPSR<br />

TGRS X 1 not specified<br />

WSNodeRater X X X ? GESAR (GEAR)<br />

TLEACH X X ? LEACH<br />

Teihal X X 1,2,3,4,5,6,7 not specified<br />

* Monitored behaviour:<br />

1: Packet forward<strong>in</strong>g<br />

2: Network ACK<br />

3: Packet <strong>in</strong>tegrity<br />

4: Authentication<br />

5: Cryptography<br />

6: Corrent reputation shar<strong>in</strong>g<br />

7: Rema<strong>in</strong><strong>in</strong>g energy<br />

8: Rout<strong>in</strong>g functions<br />

36<br />

? : Not exactly specified <strong>in</strong> the article<br />

Figure 6: Comparison of different <strong>trust</strong>-based rout<strong>in</strong>g schemes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!