Skip to main content
Erschienen in: Wireless Personal Communications 4/2019

13.02.2019

An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks

verfasst von: M. Selvi, K. Thangaramya, Sannasi Ganapathy, K. Kulothungan, H. Khannah Nehemiah, A. Kannan

Erschienen in: Wireless Personal Communications | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is an important phenomena for energy conservation in wireless sensor networks (WSN). Moreover, the management of trust in the WSN is a challenging task since trust is used when collaboration is critical to achieve reliable communication. In a military application using WSN, it is often necessary to communicate secret information such as military operation urgently. However, the existing routing algorithms do not consider security in the routing process. Moreover, since security is an important aspect in WSN, it is necessary to consider the security aspects in routing algorithms. Different approaches for providing security are trust management, intrusion detection, firewalls and key management are considered in the literature. Among them, trust management can provide enhanced security when it is compared with other security methods. Therefore, a new secure routing algorithm called energy aware trust based secure routing algorithm is proposed in this paper where the trust score evaluation is used to detect the malicious users effectively in WSN and spatio-temporal constraints are used with decision tree algorithm for selecting the best route. From the experiments conducted, it is proved that the proposed trust based routing algorithm achieves significant performance improvement over the existing schemes in terms of security, energy efficiency and packet delivery ratio.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, X., Liu, L., & Jinshu, S. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143.CrossRef Wang, X., Liu, L., & Jinshu, S. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143.CrossRef
2.
Zurück zum Zitat Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3(5), 1–6. Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3(5), 1–6.
3.
Zurück zum Zitat Kulothungan, K., Jothi, J. A. A., & Kannan, A. (2011). An adaptive fault tolerant routing protocol with error reporting scheme for wireless sensor networks. European Journal of Scientific Research, 16(1), 19–32. Kulothungan, K., Jothi, J. A. A., & Kannan, A. (2011). An adaptive fault tolerant routing protocol with error reporting scheme for wireless sensor networks. European Journal of Scientific Research, 16(1), 19–32.
4.
Zurück zum Zitat Kulothungan, K., Ganapathy, S., Indra Gandhi, S., Yogesh, P., & Kannan, A. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing, 6(5), 210–215.CrossRef Kulothungan, K., Ganapathy, S., Indra Gandhi, S., Yogesh, P., & Kannan, A. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing, 6(5), 210–215.CrossRef
5.
Zurück zum Zitat Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078–1093.CrossRef Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078–1093.CrossRef
6.
Zurück zum Zitat Selvi, M., & Nandhini, C., Thangaramya, K., Kulothungan, K., & Kannan, A. (2016). HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the eighth international conference on advanced computing (ICoAC) (pp. 89–92). Selvi, M., & Nandhini, C., Thangaramya, K., Kulothungan, K., & Kannan, A. (2016). HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the eighth international conference on advanced computing (ICoAC) (pp. 89–92).
7.
Zurück zum Zitat Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks theory and practice. Hoboken: Wiley. ISBN 978-0-470-99765-9.CrossRef Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks theory and practice. Hoboken: Wiley. ISBN 978-0-470-99765-9.CrossRef
8.
Zurück zum Zitat Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L.S., Khanna Nehemiah, H., & Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 1–5). ACM. Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L.S., Khanna Nehemiah, H., & Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 1–5). ACM.
9.
Zurück zum Zitat Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11, 6–28.CrossRef Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11, 6–28.CrossRef
10.
Zurück zum Zitat Akyildiz, I. F., & Vuran, M. C. (2010). Wireless sensor networks (pp. 131–141). Hoboken: Wiley.CrossRef Akyildiz, I. F., & Vuran, M. C. (2010). Wireless sensor networks (pp. 131–141). Hoboken: Wiley.CrossRef
11.
Zurück zum Zitat Kesavan, V. T., & Radhakrishnan, S. (2016). Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks. China Communication, Security Schemes and Solutions, 13(6), 178–194. Kesavan, V. T., & Radhakrishnan, S. (2016). Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks. China Communication, Security Schemes and Solutions, 13(6), 178–194.
12.
Zurück zum Zitat Ran, G., Zhang, H., & Gong, S. (2010). Improving on LEACH protocol of wireless sensor networks using fuzzy logic. Journal of Information & Computational Science, 7(3), 767–775. Ran, G., Zhang, H., & Gong, S. (2010). Improving on LEACH protocol of wireless sensor networks using fuzzy logic. Journal of Information & Computational Science, 7(3), 767–775.
13.
Zurück zum Zitat Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.CrossRef Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.CrossRef
14.
Zurück zum Zitat Younis, O., & Fahmy, S. (2004). HEED: A hybrid energy-efficient, distributed clustering approach for Ad Hoc sensor Networks. IEEE Transaction on Mobile Computing, 3, 366–379.CrossRef Younis, O., & Fahmy, S. (2004). HEED: A hybrid energy-efficient, distributed clustering approach for Ad Hoc sensor Networks. IEEE Transaction on Mobile Computing, 3, 366–379.CrossRef
15.
Zurück zum Zitat Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–319.CrossRef Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–319.CrossRef
16.
Zurück zum Zitat Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.CrossRef Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.CrossRef
17.
Zurück zum Zitat Li, F., & Wu, J. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1049.CrossRef Li, F., & Wu, J. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1049.CrossRef
18.
Zurück zum Zitat Mohammed, N., Otrok, H., Wang, L., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Transactions on Dependable and Secure Computing, 8(1), 89–103.CrossRef Mohammed, N., Otrok, H., Wang, L., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Transactions on Dependable and Secure Computing, 8(1), 89–103.CrossRef
19.
Zurück zum Zitat Li, Z., Jia, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRef Li, Z., Jia, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRef
20.
Zurück zum Zitat Wang, X., Ding, L., & Wang, S. (2011). Trust evaluation sensing for wireless sensor networks. IEEE Transactions on Instrumentation and Measurement, 60(6), 2088–2095.CrossRef Wang, X., Ding, L., & Wang, S. (2011). Trust evaluation sensing for wireless sensor networks. IEEE Transactions on Instrumentation and Measurement, 60(6), 2088–2095.CrossRef
21.
Zurück zum Zitat Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823.CrossRef Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823.CrossRef
22.
Zurück zum Zitat Serique, L. F. S., & de Sousa, R. T. (2012). Evaluating trust in ad hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332–1343.CrossRef Serique, L. F. S., & de Sousa, R. T. (2012). Evaluating trust in ad hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332–1343.CrossRef
23.
Zurück zum Zitat Wang, Y., & Li, L. (2011). Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), 257–271.CrossRef Wang, Y., & Li, L. (2011). Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), 257–271.CrossRef
24.
Zurück zum Zitat Mahmood, B. A., & Manivannan, D. (2015). Position based and hybrid routing protocols for mobile ad hoc networks: A survey. Wireless Personal Communications, 83(2), 1009–1033.CrossRef Mahmood, B. A., & Manivannan, D. (2015). Position based and hybrid routing protocols for mobile ad hoc networks: A survey. Wireless Personal Communications, 83(2), 1009–1033.CrossRef
25.
Zurück zum Zitat Manivannan, D., Jyotiprada, A., & Sandhu, N. (2014). A survey of routing protocols for wireless sensor networks. International Journal of Next-Generation Computing, IJNGC, 5(2), 1–8. Manivannan, D., Jyotiprada, A., & Sandhu, N. (2014). A survey of routing protocols for wireless sensor networks. International Journal of Next-Generation Computing, IJNGC, 5(2), 1–8.
26.
Zurück zum Zitat Heinzelman, W. R., Chandrakasan, A., Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, IEEE (pp. 1–10). Heinzelman, W. R., Chandrakasan, A., Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, IEEE (pp. 1–10).
27.
Zurück zum Zitat Logambigai, R., & Kannan, A. (2016). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22, 945–957.CrossRef Logambigai, R., & Kannan, A. (2016). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22, 945–957.CrossRef
28.
Zurück zum Zitat Rajeswari, L. P., & Kannan, A. (2008). An intrusion detection system based on multiple level hybrid classifier using enhanced C4.5. In IEEE international conference on signal processing, communications and networking (pp. 75–79). Rajeswari, L. P., & Kannan, A. (2008). An intrusion detection system based on multiple level hybrid classifier using enhanced C4.5. In IEEE international conference on signal processing, communications and networking (pp. 75–79).
Metadaten
Titel
An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks
verfasst von
M. Selvi
K. Thangaramya
Sannasi Ganapathy
K. Kulothungan
H. Khannah Nehemiah
A. Kannan
Publikationsdatum
13.02.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06155-x

Weitere Artikel der Ausgabe 4/2019

Wireless Personal Communications 4/2019 Zur Ausgabe

Neuer Inhalt