Advertisement

Modified Trust Value Based Approach to Secure Wireless Sensor Networks

  • Pardeep KaurEmail author
  • Sandeep Kad
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 958)

Abstract

The unattended nature of the WSN makes the nodes susceptible to various attacks. Among many of the possible attacks, ones that are focused on draining nodes’ energy are most dangerous since they leave the network dead. This paper proposes a scheme to detect the aggressive behavior of nodes by using the packet- forwarding behavior of the nodes. Trust value is lessened if in any case there is a difference between the number of packets forwarded by the sensor hub during data transmission is discovered abnormal. In this way, after a certain number of rounds, nodes which are acting as aggressive will be removed. For transmitting the information over the system effectively when the abnormal hub is to be expelled from existing path would require second way promptly accessible, to take care of this issue in this method two nearest neighboring hubs are chosen to shape two ways. The rendition of the system is analyzed on the basis of remaining energy, packet forwarding ratio, and throughput.

Keywords

Energy efficient routing Wireless Sensor Network PDORP Packet forwarding ratio DSR Trust value 

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002).  https://doi.org/10.1109/MCOM.2002.1024422CrossRefGoogle Scholar
  2. 2.
    Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., Leung, C.M.: Body area networks: a survey. Mob. Netw. Appl. 16(2), 171–193 (2011).  https://doi.org/10.1007/s11036-010-0260-8CrossRefGoogle Scholar
  3. 3.
    Garg, V.: Wireless Communication and Networking. Elsevier Inc., Amsterdam (2007)Google Scholar
  4. 4.
    Wu, M., Collier, M.: TSEP: a localised algorithm for extending the lifetime of sensor networks. In: Proceedings of the IEEE Wireless Advanced (WiAD), pp. 289–294 (2011).  https://doi.org/10.1109/wiad.2011.5983271
  5. 5.
    Lindsey, S., Raghavendra, C., Sivalingam, K.M.: Data gathering algorithms in sensor networks using energy metrics. IEEE Trans. Parallel Distrib. Syst. 13(9), 924–935 (2002).  https://doi.org/10.1109/TPDS.2002.1036066CrossRefGoogle Scholar
  6. 6.
    Tian, D., Georganas, N.D.: Energy efficient routing with guaranteed delivery in wireless sensor networks. In: IEEE Wireless Communication Networking, WCN, vol. 3, pp. 1923–1929. IEEE (2003).  https://doi.org/10.1109/wcnc.2003.1200681
  7. 7.
    Saravanakumar, R., Susila, S.G., Raja, J.: An energy-efficient cluster based node scheduling protocol for wireless sensor networks. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), vol. 1–5, pp. 28–29, December 2010Google Scholar
  8. 8.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: IEEE International Workshop on Sensor Network Protocols and Applications (2003). http://10.0.4.85/SNPA.2003.1203362
  9. 9.
    Nagarathna, K., Kiran, Y.B., Mallapur, J.D., Hiremath, S.: Trust-based secured routing in wireless multimedia sensor networks. In: International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN) (2012).  https://doi.org/10.1109/cicsyn.2012.20
  10. 10.
    Ahn, C.W., Ramakrishna, R.S.: A genetic algorithm for shortest path routing problem and the sizing of populations. IEEE Trans. Evol. Comput. 6(6), 566–579 (2002).  https://doi.org/10.1109/tevc.2002.804323CrossRefGoogle Scholar
  11. 11.
    Lindsey, S., Raghavendra, C.S.: PEGASIS: power-efficient gathering in sensor information systems. In: IEEE Aerospace Conference, pp. 1125–1130. IEEE (2002).  https://doi.org/10.1109/aero.2002.1035242
  12. 12.
    Lee, J., Choi, B., Lee, J.: Energy efficient coverage of wireless sensor networks using Ant colony optimization with three types of pheromones. IEEE Trans. Ind. Inf. 7, 419–427 (2011).  https://doi.org/10.1109/tii.2011.2158836CrossRefGoogle Scholar
  13. 13.
    Jain, A., Ramana Reddy, B.V.: A novel method of modeling wireless sensor network using fuzzy graph and energy efficient fuzzy based k-hop clustering algorithm. Wirel. Pers. Commun. 82(1), 157–181 (2015)CrossRefGoogle Scholar
  14. 14.
    Yadav, A., Singh, Y.N., Singh, R.: Cross-layer design for power control and link availability in mobile adhoc networks. Int. J. Comput. Netw. Commun. (IJCNC) 7(3), 127–143 (2015).  https://doi.org/10.5121/ijcnc.2015.7310CrossRefGoogle Scholar
  15. 15.
    Gopal, D., Suriyakala, C.D.: Performance evaluation of hybrid energy efficient cluster based routing scheme for mobile sink based WSN. In: IEEE Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (2015).  https://doi.org/10.1109/iccicct.2015.7475342
  16. 16.
    Mohamed, E., Ahmed, M., Abderrazak, A., Elfouly, T.M.: Routing and flow rate assignment using multi-objective optimization in wireless sensor networks. In: IEEE Conference on Wireless Communications and Networking Conference (WCNC 2015), pp. 1368–1373 (2015).  https://doi.org/10.1109/wcnc.2015.7127668
  17. 17.
    Tarasia, N., Lenka, M., Swain, A.: Energy efficient extended coverage in wireless sensor networks. In: IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangiu, pp. 247 – 254 (2015).  https://doi.org/10.1109/aina.2015.192

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAmritsar College of Engineering and TechnologyAmritsarIndia

Personalised recommendations