Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{144362,
        author = {V.Ringsly Maria Modesly and D. Jim Solomon Raja},
        title = {Enhanced Energy Efficiency and Trust based Data Dissemination in Wireless Sensor Networks},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {10},
        pages = {183-188},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144362},
        abstract = {Wireless  Sensor  Networks  (WSNs)  are  emerging  as  a promising  technology  because  of  their  wide  range  of applications  in  industrial,  environmental  monitoring, military  and  civilian  domains.  Due to economic considerations, the nodes are usually simple and low cost. They are often unattended, however, and are  hence likely  to  suffer from different types of novel attack .Wireless sensor  networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics,  they  are  prone  to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an  active  detection-based  security  and  trust  routing  scheme named  Active  Trust  is  proposed  for  WSNs.  The most important innovation of Active Trust is that it avoids black holes through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security.  In proposed process we add energy efficiency model by using Sleep Wake Scheduling technique in Active Trust method. We can achieve more energy consumption and high energy efficiency compared to previous Active Trust model.   More importantly,  the  generation  and  distribution  of  detection routes are given in the Active Trust scheme, which can fully use the energy in non-hotspots to create as many detection routes as needed to achieve the desired security and energy efficiency. },
        keywords = {black hole attack, network lifetime, security, trust, wireless sensor networks},
        month = {},
        }
                            
                            
                        Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry