Peer-to-Peer Networking and Applications

, Volume 12, Issue 1, pp 167–176 | Cite as

An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks

  • Abdulhamid ZahediEmail author
  • Faryad Parma


Rapid developments in the field of processors and radio technology have provided the context of small sensor nodes which are able to communicate in wireless sensor networks. But data security is restricted by these factors. An intelligent trust management plan needs to be applied for detection of the reliability of sensor nodes to distinguish between malicious nodes from other nodes. In this paper a trust-based energy-aware routing algorithm has been proposed. Considering direct and indirect trust of nodes and energy saving issue, the routing function metrics are optimized by Gravitational Search Approach. This routing method is called Energy-aware Trust-based Gravitational Search Approach (ETGSA). Simulation has been done by NS-2 and it is shown that the main characteristics such as reduction of computational overhead and increasing reliability against of attacks in the network are improved compared with other efficient algorithms in this field.


Gravitational search approach Network attacks Routing algorithm Trust-based decision Wireless sensor networks 


  1. 1.
    Xie, Ota K, Dong M, Pan F, Liu A (2017) Energy-efficient routing for mobile data collectors in wireless sensor networks with obstacles. Peer to-Peer Networking and Applications 10:472–483CrossRefGoogle Scholar
  2. 2.
    Abbasi AA, Younis M (2007) A survey on clustering algorithms for wireless sensor networks. Comput Commun 30:2826–2841CrossRefGoogle Scholar
  3. 3.
    Buch D, Jinwala D (2011) Detection of wormhole attacks in wireless sensor networks. IEEE Conference on Advances in Recent Technologies in Communication and Computing, pp. 7–14Google Scholar
  4. 4.
    Ahmed A, Ibrahim Channa M (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sensors J 15(12):6962–6972CrossRefGoogle Scholar
  5. 5.
    Cordasco J, Wetzel S (2008) Cryptographic versus trust-based methods for MANET routing security. Electron Notes Theor Theoretical Comput Sci 197(2):131–140CrossRefGoogle Scholar
  6. 6.
    Duan J, Yang D, Zhu H, Zhang S, Zhao J (2014) TSRF: A trust-aware secure routing framework in wireless sensor networks. Int J Distrib Sens Netw 2014:1–14 Art. ID 209436Google Scholar
  7. 7.
    Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2013) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Pers Commun 69(2):805–826CrossRefGoogle Scholar
  8. 8.
    Eissa T, Razak SA, Khokhar RH, Samian N (2013) Trust-based routing mechanism in MANET: Design and implementation. Mobile Netw Appl 18(5):666–677CrossRefGoogle Scholar
  9. 9.
    Chen S, Zhang Y, Liu Q, Feng J (2012) Dealing with dishonest recommendation: the trials in reputation management court. Ad Hoc Netw 10(8):1603–1618CrossRefGoogle Scholar
  10. 10.
    Cho J-H, Swami A, Chen I-R (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13(4):562–583CrossRefGoogle Scholar
  11. 11.
    Rashedi E, Nezamabadi H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179:2232–2248CrossRefGoogle Scholar
  12. 12.
    Zahariadis T, Leligou H, Karkazis P, Trakadas P, Papaefstathiou I, Vangelatos C, Besson L (2010) Design and implementation of atrust-aware routing protocol for Largewsns. International Journal of Network Security & Its Applications (IJNSA) 2(3)Google Scholar
  13. 13.
    Babu SS, Raha A, Naskar MK (2011) Trustworthy route formation algorithm for WSNs. Int J Comput Appl 27(5):0975–8887Google Scholar
  14. 14.
    Zhan G, Shi W, Senior Member, IEEE, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing 9(2)Google Scholar
  15. 15.
    Samundiswary P (2012) Trust based energy aware reactive routing protocol for wireless sensor networks. Int J Comput Appl 43(21):0975–8887Google Scholar
  16. 16.
    Shen S, Huang L, Fan E, Hu K (2016)Trust dynamics in WSNs: an evolutionary game-theoretic approach. J SensGoogle Scholar
  17. 17.
    Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6(2):77–83CrossRefGoogle Scholar
  18. 18.
    Liu Y, Dong M, Ota K, Liu A (2016) Active trust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027CrossRefGoogle Scholar
  19. 19.
    Chen H-C (2017) TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst J 11(2):449–459CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electrical EngineeringKermanshah University of TechnologyKermanshahIran
  2. 2.Department of Computer Engineering, Kermanshah BranchIslamic Azad UniversityKermanshahIran

Personalised recommendations