Trust based Energy aware Reactive Routing Protocol for Wireless Sensor Networks
نویسنده
چکیده
Recently, Wireless Sensor Networks (WSNs) have drawn a lot of attention due to broad applications in military, civilian wildlife monitoring and disaster management. Sensor networks are composed of large number of densely deployed sensor nodes with limited energy and computation. Since these nodes operate in a physically insecure environment, they are susceptible to various types of attacks. These attacks infuse malevolent packets by compromising the nodes. Various secured reactive routing protocols have been developed with the help of cryptographic techniques in order to protect the network against the compromised nodes. However the routing protocols using encryption schemes require large memory for storing the keys and more computation. Further, these protocols have been developed without the consideration of energy aware algorithm. In this paper, trust based energy aware reactive routing protocol is developed for wireless sensor networks by appending trust based mechanism in the energy aware reactive routing protocol. The performance of the proposed protocol has been evaluated and analysed in terms of delivery ratio for different number of nodes.
منابع مشابه
EEQR: An Energy Efficient Query-Based Routing Protocol for Wireless Sensor Networks
Routing in Wireless Sensor Networks (WSNs) is a very challenging task due to the large number of nodes, their mobility and lack of proper infrastructure. Since the sensors are battery powered devices, energy efficiency is considered as one of the main factors in designing routing protocols in WSNs. Most of energy-aware routing protocols are mere energy savers that attempt to decrease the energy...
متن کاملEEQR: An Energy Efficient Query-Based Routing Protocol for Wireless Sensor Networks
Routing in Wireless Sensor Networks (WSNs) is a very challenging task due to the large number of nodes, their mobility and lack of proper infrastructure. Since the sensors are battery powered devices, energy efficiency is considered as one of the main factors in designing routing protocols in WSNs. Most of energy-aware routing protocols are mere energy savers that attempt to decrease the energy...
متن کاملImproving Energy Consumption by Using Cluster Based Routing Algorithm in Wireless Sensor Networks
Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distributetraffic, as well as considerate fault tolerance. In this paper, a new clustering based multi path routingprotocol namely ECRR (Energy efficient Cluster based Routing algorithm for improving Reliability) isproposed, which is a new routing algorithm and guarantees the achievement to required QoS ...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملA JOINT DUTY CYCLE SCHEDULING AND ENERGY AWARE ROUTING APPROACH BASED ON EVOLUTIONARY GAME FOR WIRELESS SENSOR NETWORKS
Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...
متن کاملTrust based Energy aware Reactive Routing Protocol for Wireless Sensor Networks
Recently, Wireless Sensor Networks (WSNs) have drawn a lot of attention due to broad applications in military, civilian wildlife monitoring and disaster management. Sensor networks are composed of large number of densely deployed sensor nodes with limited energy and computation. Since these nodes operate in a physically insecure environment, they are susceptible to various types of attacks. The...
متن کامل