Skip to main content
Erschienen in: Wireless Personal Communications 4/2020

01.10.2019

QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks

verfasst von: Thangaramya Kalidoss, Logambigai Rajasekaran, Kulothungan Kanagasabai, Ganapathy Sannasi, Arputharaj Kannan

Erschienen in: Wireless Personal Communications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Wireless Sensor Network (WSN), the lifetime optimization based on minimal energy consumption and security are the crucial issues for the effective design of protocols to perform multi-hop secure routing. In order to address these issues, we propose a new routing protocol called Secured Quality of Service (QoS) aware Energy Efficient Routing Protocol in this paper which is designed based on trust and energy modelling for enhancing the security of WSN and also to optimize the energy utilization. In this proposed work, the trust modelling uses an authentication technique with a key based security mechanism for providing trust scores. Moreover, three types of trust scores namely direct, indirect and overall trust scores are calculated in this work for enhancing the security of communication. In addition, a cluster based secure routing algorithm is proposed in this work in which the cluster head has been selected based on QoS metrics and trust scores to perform cluster based secure routing. Finally, the final path has been selected based on path-trust, energy and hop count to efficiently carry out the secure routing process. The proposed work has been assessed by simulations carried out using NS2 simulator. The simulation results demonstrate that the proposed algorithm provides better performance in terms of increase in packet delivery ratio, network life time and security. Moreover, it provides reduction in delay and energy consumption when the proposed secure routing algorithm is compared to the other related secure routing algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Munuswamy, S., Saravanakumar, J. M., Sannasi, G., Harichandran, K. N., & Arputharaj, K. (2018). Virtual force-based intelligent clustering for energy-efficient routing in mobile wireless sensor networks. Turkish Journal of Electrical Engineering & Computer Sciences,26(3), 1444–1452. Munuswamy, S., Saravanakumar, J. M., Sannasi, G., Harichandran, K. N., & Arputharaj, K. (2018). Virtual force-based intelligent clustering for energy-efficient routing in mobile wireless sensor networks. Turkish Journal of Electrical Engineering & Computer Sciences,26(3), 1444–1452.
2.
Zurück zum Zitat Ayyasamy, A., & Venkatachalapathy, K. (2015). Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wireless Networks,21(2), 421–430.CrossRef Ayyasamy, A., & Venkatachalapathy, K. (2015). Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wireless Networks,21(2), 421–430.CrossRef
3.
Zurück zum Zitat Logambigai, R., & Kannan, A. (2014). QEER: QoS aware energy efficient routing protocol for wireless sensor networks. In IEEE 6th international conference on advanced computing (ICoAC) (pp. 57–60). Logambigai, R., & Kannan, A. (2014). QEER: QoS aware energy efficient routing protocol for wireless sensor networks. In IEEE 6th international conference on advanced computing (ICoAC) (pp. 57–60).
5.
Zurück zum Zitat Baraa, A. A. (2011). Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks. Swarm and Evolutionary Computation,1(4), 195–203.CrossRef Baraa, A. A. (2011). Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks. Swarm and Evolutionary Computation,1(4), 195–203.CrossRef
6.
Zurück zum Zitat Villas, L. A., Boukerche, A., Ramos, H. S., de Oliveira, H. A. B. F., de Araujo, R. B., & Loureiro, A. A. F. (2013). DRINA: A lightweight and reliable routing approach for in-network aggregation in wireless sensor networks. IEEE Transactions on Computers,62(4), 676–689.CrossRefMathSciNetMATH Villas, L. A., Boukerche, A., Ramos, H. S., de Oliveira, H. A. B. F., de Araujo, R. B., & Loureiro, A. A. F. (2013). DRINA: A lightweight and reliable routing approach for in-network aggregation in wireless sensor networks. IEEE Transactions on Computers,62(4), 676–689.CrossRefMathSciNetMATH
7.
Zurück zum Zitat Nakamura, E. F., de Oliveira, H. A., Pontello, L. F., & Loureiro, A. A. F. (2006). On demand role assignment for event detection in sensor networks. In 11th IEEE symposium on computers and communications (ISCC’06), Sardinia, Italy (pp. 941–947). Nakamura, E. F., de Oliveira, H. A., Pontello, L. F., & Loureiro, A. A. F. (2006). On demand role assignment for event detection in sensor networks. In 11th IEEE symposium on computers and communications (ISCC’06), Sardinia, Italy (pp. 941–947).
8.
Zurück zum Zitat Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2010). Energy-efficient communication protocol for wireless microsensor networks. In Annual Hawaii international conference, system sciences (p. 10). Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2010). Energy-efficient communication protocol for wireless microsensor networks. In Annual Hawaii international conference, system sciences (p. 10).
9.
Zurück zum Zitat Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing,3(4), 366–379.CrossRef Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing,3(4), 366–379.CrossRef
10.
Zurück zum Zitat Rahman, M. N., & Matin, M. A. (2011). Efficient algorithm for prolonging network lifetime of wireless sensor network. Tsinghua Science and Technology,16(6), 561–568.CrossRef Rahman, M. N., & Matin, M. A. (2011). Efficient algorithm for prolonging network lifetime of wireless sensor network. Tsinghua Science and Technology,16(6), 561–568.CrossRef
11.
Zurück zum Zitat Mathapati, B. S., Patil, S. R., & Mytri, V. D. (2012). A cluster based energy efficient reliable routing protocol for wireless sensor networks. In Proceedings on 1st international conference, ET2ECN (pp. 1–6). Mathapati, B. S., Patil, S. R., & Mytri, V. D. (2012). A cluster based energy efficient reliable routing protocol for wireless sensor networks. In Proceedings on 1st international conference, ET2ECN (pp. 1–6).
12.
Zurück zum Zitat Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence,33, 127–140.CrossRef Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence,33, 127–140.CrossRef
13.
Zurück zum Zitat Logambigai, R., & Kannan, A. (2015). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks,22, 1–13.CrossRef Logambigai, R., & Kannan, A. (2015). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks,22, 1–13.CrossRef
14.
Zurück zum Zitat Wood, A., & Stankovic, J. (2002). Denial of service in sensor networks. Computer,35(10), 54–62.CrossRef Wood, A., & Stankovic, J. (2002). Denial of service in sensor networks. Computer,35(10), 54–62.CrossRef
15.
Zurück zum Zitat Kulothungan, K., Ganapathy, S., Indra Gandhi, P., & Yogesh, P. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing,6(5), 210–215.CrossRef Kulothungan, K., Ganapathy, S., Indra Gandhi, P., & Yogesh, P. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing,6(5), 210–215.CrossRef
16.
Zurück zum Zitat Ganapathy, S., Kulothungan, K., Muthuraj Kumar, S., & Vijayalakshmi, M. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP Journal on Wireless Communication and Networking,271(1), 1–16. Ganapathy, S., Kulothungan, K., Muthuraj Kumar, S., & Vijayalakshmi, M. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP Journal on Wireless Communication and Networking,271(1), 1–16.
17.
Zurück zum Zitat Kumar, S. V. N. S., & Palanichamy, Y. (2018). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks,24(4), 1343–1360.CrossRef Kumar, S. V. N. S., & Palanichamy, Y. (2018). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks,24(4), 1343–1360.CrossRef
18.
Zurück zum Zitat Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing,9(2), 184–197.CrossRef Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing,9(2), 184–197.CrossRef
19.
Zurück zum Zitat Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications,105(4), 1475–1490.CrossRef Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications,105(4), 1475–1490.CrossRef
20.
Zurück zum Zitat Thippeswamy, B. M., Reshma, S., Tejaswi, V., Shaila, K., Venugopal, K. R., & Patnaik, L. M. (2015). STEAR: Secure trust-aware energy-efficient adaptive routing in wireless sensor networks. Journal of Advances in Computer Networks,3(2), 146–149.CrossRef Thippeswamy, B. M., Reshma, S., Tejaswi, V., Shaila, K., Venugopal, K. R., & Patnaik, L. M. (2015). STEAR: Secure trust-aware energy-efficient adaptive routing in wireless sensor networks. Journal of Advances in Computer Networks,3(2), 146–149.CrossRef
21.
Zurück zum Zitat Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy genetic elliptic curve Diffie Hellman algorithm for secured communication in networks. Wireless Personal Communications,105(3), 993–1007.CrossRef Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy genetic elliptic curve Diffie Hellman algorithm for secured communication in networks. Wireless Personal Communications,105(3), 993–1007.CrossRef
22.
Zurück zum Zitat Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks,10, 1–14.CrossRef Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks,10, 1–14.CrossRef
23.
Zurück zum Zitat Gu, W., Dutta, N., Chellappan, S., & Bai, X. (2011). Providing end-to-end secure communications in wireless sensor networks. IEEE Transactions on Network and Service Management,8(3), 205–218.CrossRef Gu, W., Dutta, N., Chellappan, S., & Bai, X. (2011). Providing end-to-end secure communications in wireless sensor networks. IEEE Transactions on Network and Service Management,8(3), 205–218.CrossRef
24.
Zurück zum Zitat Murthy, S., D’Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Transactions on Sensors Journal,12(10), 2941–2949.CrossRef Murthy, S., D’Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Transactions on Sensors Journal,12(10), 2941–2949.CrossRef
25.
Zurück zum Zitat Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. Journal of Communications and Networks,15(4), 422–429.CrossRef Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. Journal of Communications and Networks,15(4), 422–429.CrossRef
26.
Zurück zum Zitat Mahmoud, M. M., Lin, X., & Shen, X. S. (2015). Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 1140–1153.CrossRef Mahmoud, M. M., Lin, X., & Shen, X. S. (2015). Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 1140–1153.CrossRef
27.
Zurück zum Zitat Li, S., Zhao, S., Wang, X., Zhang, K., & Li, L. (2014). Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Systems Journal,8(3), 858–867.CrossRef Li, S., Zhao, S., Wang, X., Zhang, K., & Li, L. (2014). Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Systems Journal,8(3), 858–867.CrossRef
28.
Zurück zum Zitat Lee, S.-B., & Choi, Y.-H. (2006). A secure alternate path routing in sensor networks. Computer Communications,30(1), 153–165.CrossRef Lee, S.-B., & Choi, Y.-H. (2006). A secure alternate path routing in sensor networks. Computer Communications,30(1), 153–165.CrossRef
29.
Zurück zum Zitat Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security,11(9), 2013–2027.CrossRef Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security,11(9), 2013–2027.CrossRef
30.
Zurück zum Zitat Xiong, H., & Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security,10(7), 1442–1455.CrossRef Xiong, H., & Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security,10(7), 1442–1455.CrossRef
31.
Zurück zum Zitat Kerrache, C. A., Calafate, C. T., Cano, J. C., Lagraa, N., & Manzoni, P. (2016). Trust management for vehicular networks: An adversary-oriented overview. IEEE Access,4, 9293–9307.CrossRef Kerrache, C. A., Calafate, C. T., Cano, J. C., Lagraa, N., & Manzoni, P. (2016). Trust management for vehicular networks: An adversary-oriented overview. IEEE Access,4, 9293–9307.CrossRef
32.
Zurück zum Zitat Hamdane, B., Boussada, R., Elhdhili, M. E., & El Fatmi, S. G. (2017). Hierarchical identity based cryptography for security and trust in named data networking. In 2017 IEEE 26th international conference on enabling technologies: Infrastructure for collaborative enterprises (pp. 226–231). Hamdane, B., Boussada, R., Elhdhili, M. E., & El Fatmi, S. G. (2017). Hierarchical identity based cryptography for security and trust in named data networking. In 2017 IEEE 26th international conference on enabling technologies: Infrastructure for collaborative enterprises (pp. 226–231).
33.
Zurück zum Zitat Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H. K., Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 117–122). Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H. K., Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 117–122).
35.
Zurück zum Zitat Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications,96(2), 1753–1769.CrossRef Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications,96(2), 1753–1769.CrossRef
36.
Zurück zum Zitat Umar, I. A., Hanapi, Z. M., Sali, A., & Zulkarnain, Z. A. (2017). TruFiX: A configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access,5, 2550–2562.CrossRef Umar, I. A., Hanapi, Z. M., Sali, A., & Zulkarnain, Z. A. (2017). TruFiX: A configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access,5, 2550–2562.CrossRef
37.
Zurück zum Zitat Tang, D., Li, T., Ren, J., & Jie, W. (2015). Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 960–973.CrossRef Tang, D., Li, T., Ren, J., & Jie, W. (2015). Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 960–973.CrossRef
38.
Zurück zum Zitat Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., & Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Computer Networks,151, 211–223.CrossRef Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., & Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Computer Networks,151, 211–223.CrossRef
39.
Zurück zum Zitat Mhemed, R., Aslam, N., Phillips, W., & Comeau, F. (2012). An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science,10, 255–262.CrossRef Mhemed, R., Aslam, N., Phillips, W., & Comeau, F. (2012). An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science,10, 255–262.CrossRef
40.
Zurück zum Zitat Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications,1(4), 660–670.CrossRef Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications,1(4), 660–670.CrossRef
41.
Zurück zum Zitat Guo, Q., Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Modeling and evaluation of trust in cloud computing environments. In IEEE 3rd international conference on advanced computer control (ICACC 2011) (pp. 112–116). Guo, Q., Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Modeling and evaluation of trust in cloud computing environments. In IEEE 3rd international conference on advanced computer control (ICACC 2011) (pp. 112–116).
42.
Zurück zum Zitat Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications,36, 1078–1093.CrossRef Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications,36, 1078–1093.CrossRef
43.
Zurück zum Zitat Allen, J. F. (1983). Maintaining knowledge about temporal intervals. Communications of the ACM,26(11), 832–843.CrossRefMATH Allen, J. F. (1983). Maintaining knowledge about temporal intervals. Communications of the ACM,26(11), 832–843.CrossRefMATH
Metadaten
Titel
QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks
verfasst von
Thangaramya Kalidoss
Logambigai Rajasekaran
Kulothungan Kanagasabai
Ganapathy Sannasi
Arputharaj Kannan
Publikationsdatum
01.10.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06788-y

Weitere Artikel der Ausgabe 4/2020

Wireless Personal Communications 4/2020 Zur Ausgabe

Neuer Inhalt