Malicious Node Detection through Trust Aware Routing in Wireless Sensor Networks
نویسندگان
چکیده
Wireless sensor network are constituted by a large number of tiny size sensors and distributed randomly for gathering information. These types of networks have remarkable applications and demand worldwide. The wireless sensor network has been suffered with variety of attacks because of its design and deployment nature. The previous traditional approaches including cryptography, authentication cannot work properly against node misbehavior attacks. To solve this problem, we propose a Trust Aware Wireless Routing Protocol (TAWRP) for detection and isolation of malicious nodes in network. The main aim of TAWRP is to establish an optimal route with trusted nodes and effectively forward the packets from source to destination with minimum packet loss. The performance of TAWRP is evaluated in terms of packet delivery ratio and routing overhead. The results clearly showed that TAWRP can achieve high delivery ratio and efficient in routing overhead in the presence of malicious nodes.
منابع مشابه
IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملEvolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol
The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملTrust Based Node Replication Attack Detection Protocol for Wireless Sensor Networks
The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method R...
متن کامل