A Noble Indirect Trust based Link State Routing Scheme using a Robust Route Trust Method for Wireless Sensor Networks

نویسندگان

  • Arnab Raha
  • Mrinal Kanti Naskar
  • Arpita Chakraborty
  • Omar Alfandi
  • Dieter Hogrefe
چکیده

Integration of trust in routing mechanisms already prevalent in Wireless Sensor Networks (WSN) has become an interesting research area of late. Several methods exist for the assignment of trust to the nodes present in a WSN. However the real challenge lies in proper integration of this trust to an existing routing protocol for the synthesis of a trust-aware routing algorithm. In this paper we try to take the help of Geometrical Mean based indirect trust evaluation mechanism for calculation of trust of individual nodes and thereby use the calculated trusts for determination of the different route trusts (RTs). We present a link state routing protocol based only on these indirect trusts which forms the routes and finds the best trustworthy route among them by comparing the values of all the calculated route trusts as for each route present in the network. We have developed three algorithms related to this and have shown their merits. Finally, we compare our work with similar trust integrated routing protocols and show its advantages over them. KeywordsWireless Sensor Network (WSN); Geometric Mean (GM); Direct Trust; Indirect Trust;Route Trust (RT); Base Station (BS); Homogeneous Nodes; Packet Latency; Packet Transmission Rate.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Path Using Trust Values for Wireless Sensor Networks

Traditional cryptography-based security mechanisms such as authentication and authorization are not effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)

The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth. It is not economic and feasible because, depending on the application, WSN nodes are high-volume in number (hence, l...

متن کامل

Energy Efficiency and Reliability in Underwater Wireless Sensor Networks Using Cuckoo Optimizer Algorithm

Energy efficiency and reliability are widely understood to be one of the dominant considerations for Underwater Wireless Sensor Networks (UWSNs). In this paper, in order to maintain energy efficiency and reliability in a UWSN, Cuckoo Optimization Algorithm (COA) is adopted that is a combination of three techniques of geo-routing, multi-path routing, and Duty-Cycle mechanism. In the proposed alg...

متن کامل

Trustworthy Route formation Algorithm for WSNs

This paper introduces a new algorithm for the formation of trustworthy route from source node to Base Station (BS) for secure routing of messages in Wireless Sensor Networks (WSNs). This algorithm process the information given by the Trust dependent Link State Routing Protocol which is improved version of our Routing Protocol presented in [1] Direct Trust dependent Link State Routing Protocol b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012