Skip to main content

Abstract

Wireless Sensor Networks are often deployed in unattended and hostile environments. These networks are susceptible to harsh physical conditions and attacks from adversaries. Sensor nodes have limited power, memory and computational ability and thus are vulnerable to capture. A few malicious adversaries can easily compromise sensor devices and inject false data to disrupt the integrity of the network. In this paper, we address this problem by proposing a three tiered architecture established upon a trust based framework which distinguishes illegal nodes from legal ones and filters out deceitful and forged data. Simulation results demonstrate that our trust based framework is an efficient approach to identify the trustworthiness of data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: a survey. Computer Networks Journal 38, 393–422 (2002)

    Article  Google Scholar 

  2. Gupta, P., Kumar, P.: The capacity of wireless networks. IEEE Transactions on Information Theory IT-46(2), 388–404 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  3. Johnson, D., Maltz, D., Broch, J.: DSR: The dynamic source routing protocol for multihop wireless ad hoc networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, pp. 139–172. Addison-Wesley (2001)

    Google Scholar 

  4. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy efficient Communication Protocol for Wireless Micro sensor Networks. In: Proceedings of Hawaii International Conference on System Science (HICSS), Maui, Hawaii, pp. 3005–3014 (2000)

    Google Scholar 

  5. Hussain, S., Mallinson, M., Drane, P.: Discrete radio power level consumption model in wireless sensor networks. In: Workshop Proceedings of the Fourth IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS (2007)

    Google Scholar 

  6. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  7. Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: IEEE Symp. Security and Privacy (May 2003)

    Google Scholar 

  8. Du, W., et al.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. 10th ACM Conf. Comp. and Commun. Security, pp. 42–51 (October 2003)

    Google Scholar 

  9. Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. 9th ACM Conf. Comp. and Commun. Security, pp. 41–47 (November 2002)

    Google Scholar 

  10. Atakli, I., Hu, H., Chen, Y., Ku, W., Su, Z.: Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation. In: The Symposium on Simulation of Systems Security (January 2008)

    Google Scholar 

  11. Hur, J., Lee, Y., Yoon, H., Choi, D., Jin, S.: The 7th International Conference on Advanced Communication Technology, ICAT 2005, pp. 491–496 (July 2005)

    Google Scholar 

  12. Zhang, W., Das, S., Liu, Y.: A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks. In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON (2006)

    Google Scholar 

  13. Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: empirical analysis of eBays reputation system. In: Baye, M.R. (ed.) Advances in Applied Microeconomics, vol. 11. Elsevier Science (2003)

    Google Scholar 

  14. Xiong, L., Liu, L.: A reputation-based trust model for peer-to-peer ecommerce communities. In: Proc. of IEEE Conference on Ecommerce 2003, p. 275 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chakrabarti, A., Parekh, V., Ruia, A. (2012). A Trust Based Routing Scheme for Wireless Sensor Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27299-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27298-1

  • Online ISBN: 978-3-642-27299-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics