Abstract
Security is an important phenomena for energy conservation in wireless sensor networks (WSN). Moreover, the management of trust in the WSN is a challenging task since trust is used when collaboration is critical to achieve reliable communication. In a military application using WSN, it is often necessary to communicate secret information such as military operation urgently. However, the existing routing algorithms do not consider security in the routing process. Moreover, since security is an important aspect in WSN, it is necessary to consider the security aspects in routing algorithms. Different approaches for providing security are trust management, intrusion detection, firewalls and key management are considered in the literature. Among them, trust management can provide enhanced security when it is compared with other security methods. Therefore, a new secure routing algorithm called energy aware trust based secure routing algorithm is proposed in this paper where the trust score evaluation is used to detect the malicious users effectively in WSN and spatio-temporal constraints are used with decision tree algorithm for selecting the best route. From the experiments conducted, it is proved that the proposed trust based routing algorithm achieves significant performance improvement over the existing schemes in terms of security, energy efficiency and packet delivery ratio.
Similar content being viewed by others
References
Wang, X., Liu, L., & Jinshu, S. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143.
Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3(5), 1–6.
Kulothungan, K., Jothi, J. A. A., & Kannan, A. (2011). An adaptive fault tolerant routing protocol with error reporting scheme for wireless sensor networks. European Journal of Scientific Research, 16(1), 19–32.
Kulothungan, K., Ganapathy, S., Indra Gandhi, S., Yogesh, P., & Kannan, A. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing, 6(5), 210–215.
Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078–1093.
Selvi, M., & Nandhini, C., Thangaramya, K., Kulothungan, K., & Kannan, A. (2016). HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the eighth international conference on advanced computing (ICoAC) (pp. 89–92).
Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks theory and practice. Hoboken: Wiley. ISBN 978-0-470-99765-9.
Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L.S., Khanna Nehemiah, H., & Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 1–5). ACM.
Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11, 6–28.
Akyildiz, I. F., & Vuran, M. C. (2010). Wireless sensor networks (pp. 131–141). Hoboken: Wiley.
Kesavan, V. T., & Radhakrishnan, S. (2016). Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks. China Communication, Security Schemes and Solutions, 13(6), 178–194.
Ran, G., Zhang, H., & Gong, S. (2010). Improving on LEACH protocol of wireless sensor networks using fuzzy logic. Journal of Information & Computational Science, 7(3), 767–775.
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Younis, O., & Fahmy, S. (2004). HEED: A hybrid energy-efficient, distributed clustering approach for Ad Hoc sensor Networks. IEEE Transaction on Mobile Computing, 3, 366–379.
Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–319.
Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.
Li, F., & Wu, J. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1049.
Mohammed, N., Otrok, H., Wang, L., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Transactions on Dependable and Secure Computing, 8(1), 89–103.
Li, Z., Jia, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.
Wang, X., Ding, L., & Wang, S. (2011). Trust evaluation sensing for wireless sensor networks. IEEE Transactions on Instrumentation and Measurement, 60(6), 2088–2095.
Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823.
Serique, L. F. S., & de Sousa, R. T. (2012). Evaluating trust in ad hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332–1343.
Wang, Y., & Li, L. (2011). Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), 257–271.
Mahmood, B. A., & Manivannan, D. (2015). Position based and hybrid routing protocols for mobile ad hoc networks: A survey. Wireless Personal Communications, 83(2), 1009–1033.
Manivannan, D., Jyotiprada, A., & Sandhu, N. (2014). A survey of routing protocols for wireless sensor networks. International Journal of Next-Generation Computing, IJNGC, 5(2), 1–8.
Heinzelman, W. R., Chandrakasan, A., Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, IEEE (pp. 1–10).
Logambigai, R., & Kannan, A. (2016). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22, 945–957.
Rajeswari, L. P., & Kannan, A. (2008). An intrusion detection system based on multiple level hybrid classifier using enhanced C4.5. In IEEE international conference on signal processing, communications and networking (pp. 75–79).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Selvi, M., Thangaramya, K., Ganapathy, S. et al. An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks. Wireless Pers Commun 105, 1475–1490 (2019). https://doi.org/10.1007/s11277-019-06155-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06155-x