Skip to main content

Advertisement

Log in

Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

A wireless sensor networks encompasses battery powered sensor nodes with extremely limited processing capabilities. One of the major challenges in WSN is to overcome the attacks like Sinkhole, Wormhole and Sybil, Dos attacks, Selective forwarding etc. which reduces the performance of the network, since the Cryptographic techniques are not much effective in solving this problem. So in order to protect wireless sensor networks from attacks and to perform improvement in some of the aspects we have implemented a low overhead trust aware routing with energy efficient network protocol. This protocol is designed by incorporating the trust aware routing frame work with adaptive periodic threshold sensitive energy efficient network protocol. By minimizing the attacks, the network provides a better QOS with trustworthy and energy efficient route which leads to increase the network life time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Depend. Secure Comput. 9, 184–197 (2012)

    Article  Google Scholar 

  2. Zhao, F., Guibas, L.: Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann, Burlington (2004)

    Google Scholar 

  3. Wood, A.D., Stankovic, J.: Denial of service in sensor networks. Computer 35, 54–62 (2002)

    Article  Google Scholar 

  4. Jain, M., Kandwal, H.: A survey on complex wormhole attack in wireless ad hoc networks. In: Proceeding of International Conference Advances in Computing, Control, and Telecomm. Technologies (ACT ’09), pp. 555–558 (2009)

  5. Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks; the intruder side. In: Proceedings of IEEE International Conference Wireless and Mobile Computing, Networking and Communication (WIMOB ’08), pp. 526–531 (2008)

  6. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Proceedings Third International Conference Information Processing in Sensor Networks (IPSN ’04) (2004)

  7. Bai, L., Ferrese, F., Ploskina, K., Biswas, S.: Performance analysis of mobile agent-based wireless sensor network. In: Proceeding Eighth International Conference Reliability, Maintainability and Safety (ICRMS ’09), pp. 16–19 (2009)

  8. Zhang, L., Wang, Q., Shu, X.: A mobile-agent-based middleware for wireless sensor networks data fusion. In: Proceeding Instrumentation and Measurement Technology Conference (I2MTC ’09), pp. 378–383 (2009)

  9. Xue, W., Aiguo, J., Sheng, W.: Mobile agent based moving target methods in wireless sensor networks. In: Proceedings IEEE International Symposium Communication and Information Technology (ISCIT ’05), vol. 1, pp. 22–26 (2005)

  10. Jeong, H.-J., Nam, C.-S., Jeong, Y.-S., Shin, D.-R.: A mobile agent based leach in wireless sensor networks. In: Proceedings 10th International Conference Advanced Communication Technology (ICACT ’08), vol. 1, pp. 75–78 (2008)

  11. Al-Karaki, J., Kamal, A.: Routing techniques in wireless sensor networks: a survey. Wirel. Commun. 11(6), 6–28 (2004)

    Article  Google Scholar 

  12. Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proceeding ACM International Conference Embedded Networked Sensor Systems (SenSys ’04) (2004)

  13. Perrig, A., Szewczyk, R., Wen, W., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. Wirel. Netw. J. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  14. Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 59–64 (2004)

  15. Liu, A., Ning, P.: Tinyecc: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings Seventh International Conference Information Processing in Sensor Networks (IPSN ’08), pp. 245–256 (2008)

  16. Safa, H., Artail, H., Tabet, D.: A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel. Netw. 16(4), 969–984 (2010)

    Article  Google Scholar 

  17. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  18. Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., Lam, K.: Trust based routing for misbehavior detection in ad hoc networks. J. Netw. 5(5), 551–558 (2010)

    Google Scholar 

  19. Yan, Z., Zhang, P., Virtanen, T.: Trust evaluation based security solution in ad hoc networks. In: Proceedings Seventh Nordic Workshop Secure IT Systems (2003)

  20. Li, J.L.X., Lyu, M.R.: Taodv: A Trusted AODV routing protocol for mobile ad hoc networks. In: Proceedings of Aerospace Conference (2004)

  21. Kavita, A.P.: Design and implementation of tarf for WSNs. Int. J. Sci. Res. (IJSR) 3, 1944–1947 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Udhayavani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Udhayavani, M., Chandrasekaran, M. Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks. Cluster Comput 22 (Suppl 5), 11919–11927 (2019). https://doi.org/10.1007/s10586-017-1512-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1512-1

Keywords

Navigation