Trust Based Voting Scheme and Optimal Multipath Routing for Intrusion Tolerance in Wireless Sensor Network

نویسندگان

  • P. PRIYADHARSHINI
  • C. ANOOR SELVI
چکیده

Wireless sensor networks (WSNs) deployed in unattended environment energy recharging is difficult. WSN satisfy application specific QoS requirements i.e., reliability, timeliness, security and minimize energy consumption to prolong system useful lifetime with limited resources. The drawbacks of existing work include redundancy management scheme that did not addresses heavy query traffic. Ambiguity in multi-path routing decision is due to higher level of intrusion tolerance rate. The proposed work presented Trust Based Neighbor Weighted Voting Scheme to strengthen intrusion detection in WSN. It evaluates the dynamic radio range of neighbor nodes. Weight threshold is evaluated for marking the sensor node as normal node and malicious node. It discards the communication of internal malicious node by identifying lower weight votes of corresponding sensor node. It governs the best WSN settings in terms of redundancy level used for outsource multipart routing number of weighted votes intrusion invocation interval. WSN lifetime is maximized with trust based weighted voting and handles concurrent higher query traffic. Keywords—Wireless Sensor Network; selective capture multipath routing; intrusion detection; lifetime maximization

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trustworthy and Energy-Saving Measures in Wireless Sensor Networks by using Multipath Routing

In a heterogeneous networks responsibility of tolerant topology control consisting of numerous reserve affluent super nodes in the wireless networks used for information dispatching and a huge number of vigour constrained wireless sensor nodes. In this paper we executed a performance trade-off analysis of energy consumption vs. Quality of Services gain in reliability, appropriateness, and secur...

متن کامل

Model Based Analysis for QoS Guarantee by Intrusion Detection System in Heterogeneous Wireless Sensor Networks

In this paper we propose a model based analysis to provide QoS Guarantee by using the Intrusion Detection System(IDS) in Heterogeneous wireless sensor networks(HWSN).The key concept of our model based analysis is to provide a multipath routing with redundancy management in which the query response probability is maximized and to increase the lifetime of network. In HWSN a voting based intrusion...

متن کامل

Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks

Multisource multipath data routing to a remote sink node is an effective way to cope with unreliable and/or malicious nodes in wireless sensor networks (WSNs). In this paper we analyze the optimal amount of redundancy in terms of the number of source sensors sensing the same physical phenomena and the number of paths through which data are routed to a remote sink node in the presence of unrelia...

متن کامل

Evaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks

Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014