In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although, significant research effort has been spent on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. In order to enhance the security of routing information between the nodes, energy efficient and trust metric based routing protocol using collection tree protocol (CTP) for wireless sensor networks (WSN) has been proposed. Simulated results presented here indicate that the proposed protocol satisfactorily performs the routing and is strong against attacks by exploiting the replay of routing information.
Published in | International Journal of Sensors and Sensor Networks (Volume 1, Issue 5) |
DOI | 10.11648/j.ijssn.20130105.13 |
Page(s) | 61-68 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2013. Published by Science Publishing Group |
WSN, Trust Model Management, Energy Efficient Routing, Secure Routing, Routing in WSN Survey
[1] | G. Zhan, W. Shi, and J. Deng, "Design and implementation of tarf: a trust aware routing framework for wsns," IEEE Transaction on Dependable and Secure Computing, vol. 9, no. 2, pp.184-197, 2012. |
[2] | F. Zhao and L. Guibas, Wireless Sensor Networks: Information Processing Approach, Elsevier Morgan Kaufmann, Boston, 2004. |
[3] | S. Ganeriwal, L. Balzano, and M. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Trans. Sensor Networks, vol. 4, pp. 1-37, 2008. |
[4] | G. Zhan, W. Shi, and J. Deng, "Poster abstract: sensortrust—a resilient trust model for WSNs," Proc. Seventh Int’l Conf. Embedded Networked Sensor Systems (SenSys ’09), pp. 1-3, 2009. |
[5] | A. Woo, T. Tong, and D. Culler, "Taming the underlying challenges of reliable multihop routing in sensor networks," Proc. First ACM Int’l Conf. Embedded Networked Sensor Systems, pp. 14-27, 2003. |
[6] | C. Perkins and P. Bhagwat, "Highly dynamic destination- sequenced distance-vector routing (dsdv) for mobile computers," ACM SIGCOMM Computer Comm. Rev., vol. 24, no. 4, pp. 234-244, 1994. |
[7] | O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, "Collection tree protocol," Proc. Seventh ACM Conf. Embedded Networked Sensor Systems, pp. 1-14, 2009. |
[8] | L. Bai, F. Ferrese, K. Ploskina, and S. Biswas, "Performance analysis of mobile agent-based wireless sensor network," Proc. Eighth Int’l Conf. Reliability, Maintainability and Safety, pp. 16-19, 2009. |
[9] | L. Zhang, Q. Wang, and X. Shu, "A mobile-agent-based middleware for wireless sensor networks data fusion," Proc. Instrumentation and Measurement Technology Conf. (I2MTC ’09), pp. 378-383, 2009. |
[10] | W. Xue, J. Aiguo, and W. Sheng, "Mobile agent based moving target methods in wireless sensor networks," Proc. IEEE Int’l Symp. Comm. and Information Technology (ISCIT ’05), vol. 1, pp. 22- 26, 2005. |
[11] | A. Wood and J. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002. |
[12] | C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Proc. First IEEE Int’l Workshop Sensor Network Protocols and Applications, pp. 113-127, 2003. |
[13] | J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis and defences," Proc. Third Int’l Conf. Information Processing in Sensor Networks (IPSN ’04), pp. 259-268, 2004. |
[14] | G.Theodorakopoulos and J. S. Baras , " On trust models and trust evaluation metrics for ad-Hoc networks," IEEE Journal on Selected Areas in Communications (JSAC), vol. 24, no. 2, pp. 318-328, 2006. |
[15] | C. Liu, Y. Liu and Z. Zhang, "Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-11, 2013. |
[16] | I. Rijin, N. Sakthivel, and S. Subasree, "Development of an enhanced efficient secured multihop routing technique for wsns," International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 3, pp. 506-512, 2013. |
[17] | P. Deepa, A. Shalini, and J. Joshi, "Trust management for mobile ad hoc networks using recommendation exchange protocol," International Journal of Computer Trends and Technology, vol.1, no. 2, pp. 115-118, 2011. |
[18] | G. Crossby, L. Hester, and N. Pissinou, "Location-aware, trust-based detection and isolation of compromised nodes in wsns," International Journal of Network Security, vol. 12, no.2, pp. 107-117, 2011. |
[19] | H. Chen, "Task based trust management for wsns," International Journal of Security and its Applications, vol. 3, no. 2, pp. 22-26 2009. |
[20] | J. Al-Karaki and A. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communications, vol. 11, no.6, pp. 6–28, 2004. |
[21] | R. Perrig, Szewczyk, W. Wen, D. Culler, and J. Tygar, "Security protocols for sensor networks(SPINS)," Wireless Networks Journal (WINET), vol. 8, no.5, pp. 521–534, 2002. |
[22] | C. Karlof, N. Sastry, and D. Wagner, "Tinysec: link layer security architecture for wireless sensor networks," In. Proc. of ACM SenSys, pp.162-175, 2004. |
APA Style
Pooja Kalidas Shinde, Veeresh Gangappa Kasabegoudar. (2013). Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs. International Journal of Sensors and Sensor Networks, 1(5), 61-68. https://doi.org/10.11648/j.ijssn.20130105.13
ACS Style
Pooja Kalidas Shinde; Veeresh Gangappa Kasabegoudar. Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs. Int. J. Sens. Sens. Netw. 2013, 1(5), 61-68. doi: 10.11648/j.ijssn.20130105.13
@article{10.11648/j.ijssn.20130105.13, author = {Pooja Kalidas Shinde and Veeresh Gangappa Kasabegoudar}, title = {Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs}, journal = {International Journal of Sensors and Sensor Networks}, volume = {1}, number = {5}, pages = {61-68}, doi = {10.11648/j.ijssn.20130105.13}, url = {https://doi.org/10.11648/j.ijssn.20130105.13}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijssn.20130105.13}, abstract = {In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although, significant research effort has been spent on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. In order to enhance the security of routing information between the nodes, energy efficient and trust metric based routing protocol using collection tree protocol (CTP) for wireless sensor networks (WSN) has been proposed. Simulated results presented here indicate that the proposed protocol satisfactorily performs the routing and is strong against attacks by exploiting the replay of routing information.}, year = {2013} }
TY - JOUR T1 - Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs AU - Pooja Kalidas Shinde AU - Veeresh Gangappa Kasabegoudar Y1 - 2013/09/30 PY - 2013 N1 - https://doi.org/10.11648/j.ijssn.20130105.13 DO - 10.11648/j.ijssn.20130105.13 T2 - International Journal of Sensors and Sensor Networks JF - International Journal of Sensors and Sensor Networks JO - International Journal of Sensors and Sensor Networks SP - 61 EP - 68 PB - Science Publishing Group SN - 2329-1788 UR - https://doi.org/10.11648/j.ijssn.20130105.13 AB - In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although, significant research effort has been spent on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. In order to enhance the security of routing information between the nodes, energy efficient and trust metric based routing protocol using collection tree protocol (CTP) for wireless sensor networks (WSN) has been proposed. Simulated results presented here indicate that the proposed protocol satisfactorily performs the routing and is strong against attacks by exploiting the replay of routing information. VL - 1 IS - 5 ER -