Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security is an important phenomena for energy conservation in wireless sensor networks (WSN). Moreover, the management of trust in the WSN is a challenging task since trust is used when collaboration is critical to achieve reliable communication. In a military application using WSN, it is often necessary to communicate secret information such as military operation urgently. However, the existing routing algorithms do not consider security in the routing process. Moreover, since security is an important aspect in WSN, it is necessary to consider the security aspects in routing algorithms. Different approaches for providing security are trust management, intrusion detection, firewalls and key management are considered in the literature. Among them, trust management can provide enhanced security when it is compared with other security methods. Therefore, a new secure routing algorithm called energy aware trust based secure routing algorithm is proposed in this paper where the trust score evaluation is used to detect the malicious users effectively in WSN and spatio-temporal constraints are used with decision tree algorithm for selecting the best route. From the experiments conducted, it is proved that the proposed trust based routing algorithm achieves significant performance improvement over the existing schemes in terms of security, energy efficiency and packet delivery ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Wang, X., Liu, L., & Jinshu, S. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143.

    Article  Google Scholar 

  2. Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3(5), 1–6.

    Google Scholar 

  3. Kulothungan, K., Jothi, J. A. A., & Kannan, A. (2011). An adaptive fault tolerant routing protocol with error reporting scheme for wireless sensor networks. European Journal of Scientific Research, 16(1), 19–32.

    Google Scholar 

  4. Kulothungan, K., Ganapathy, S., Indra Gandhi, S., Yogesh, P., & Kannan, A. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing, 6(5), 210–215.

    Article  Google Scholar 

  5. Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078–1093.

    Article  Google Scholar 

  6. Selvi, M., & Nandhini, C., Thangaramya, K., Kulothungan, K., & Kannan, A. (2016). HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the eighth international conference on advanced computing (ICoAC) (pp. 89–92).

  7. Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks theory and practice. Hoboken: Wiley. ISBN 978-0-470-99765-9.

    Book  Google Scholar 

  8. Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L.S., Khanna Nehemiah, H., & Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 1–5). ACM.

  9. Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11, 6–28.

    Article  Google Scholar 

  10. Akyildiz, I. F., & Vuran, M. C. (2010). Wireless sensor networks (pp. 131–141). Hoboken: Wiley.

    Book  Google Scholar 

  11. Kesavan, V. T., & Radhakrishnan, S. (2016). Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks. China Communication, Security Schemes and Solutions, 13(6), 178–194.

    Google Scholar 

  12. Ran, G., Zhang, H., & Gong, S. (2010). Improving on LEACH protocol of wireless sensor networks using fuzzy logic. Journal of Information & Computational Science, 7(3), 767–775.

    Google Scholar 

  13. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Article  Google Scholar 

  14. Younis, O., & Fahmy, S. (2004). HEED: A hybrid energy-efficient, distributed clustering approach for Ad Hoc sensor Networks. IEEE Transaction on Mobile Computing, 3, 366–379.

    Article  Google Scholar 

  15. Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–319.

    Article  Google Scholar 

  16. Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.

    Article  Google Scholar 

  17. Li, F., & Wu, J. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1049.

    Article  Google Scholar 

  18. Mohammed, N., Otrok, H., Wang, L., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Transactions on Dependable and Secure Computing, 8(1), 89–103.

    Article  Google Scholar 

  19. Li, Z., Jia, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.

    Article  Google Scholar 

  20. Wang, X., Ding, L., & Wang, S. (2011). Trust evaluation sensing for wireless sensor networks. IEEE Transactions on Instrumentation and Measurement, 60(6), 2088–2095.

    Article  Google Scholar 

  21. Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823.

    Article  Google Scholar 

  22. Serique, L. F. S., & de Sousa, R. T. (2012). Evaluating trust in ad hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332–1343.

    Article  Google Scholar 

  23. Wang, Y., & Li, L. (2011). Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), 257–271.

    Article  Google Scholar 

  24. Mahmood, B. A., & Manivannan, D. (2015). Position based and hybrid routing protocols for mobile ad hoc networks: A survey. Wireless Personal Communications, 83(2), 1009–1033.

    Article  Google Scholar 

  25. Manivannan, D., Jyotiprada, A., & Sandhu, N. (2014). A survey of routing protocols for wireless sensor networks. International Journal of Next-Generation Computing, IJNGC, 5(2), 1–8.

    Google Scholar 

  26. Heinzelman, W. R., Chandrakasan, A., Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, IEEE (pp. 1–10).

  27. Logambigai, R., & Kannan, A. (2016). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22, 945–957.

    Article  Google Scholar 

  28. Rajeswari, L. P., & Kannan, A. (2008). An intrusion detection system based on multiple level hybrid classifier using enhanced C4.5. In IEEE international conference on signal processing, communications and networking (pp. 75–79).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Selvi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Selvi, M., Thangaramya, K., Ganapathy, S. et al. An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks. Wireless Pers Commun 105, 1475–1490 (2019). https://doi.org/10.1007/s11277-019-06155-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06155-x

Keywords

Navigation