Full Paper View Go Back

Combining Trust with Authentication Information for Routing in Wireless Sensor Networks

Annlin Jeba S.V.1 , Gnana King D.R.2

Section:Research Paper, Product Type: Journal
Vol.6 , Issue.5 , pp.38-46, Oct-2018

Online published on Oct 31, 2018


Copyright © Annlin Jeba S.V., Gnana King D.R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Annlin Jeba S.V., Gnana King D.R., “Combining Trust with Authentication Information for Routing in Wireless Sensor Networks,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.5, pp.38-46, 2018.

MLA Style Citation: Annlin Jeba S.V., Gnana King D.R. "Combining Trust with Authentication Information for Routing in Wireless Sensor Networks." International Journal of Scientific Research in Network Security and Communication 6.5 (2018): 38-46.

APA Style Citation: Annlin Jeba S.V., Gnana King D.R., (2018). Combining Trust with Authentication Information for Routing in Wireless Sensor Networks. International Journal of Scientific Research in Network Security and Communication, 6(5), 38-46.

BibTex Style Citation:
@article{S.V._2018,
author = {Annlin Jeba S.V., Gnana King D.R.},
title = {Combining Trust with Authentication Information for Routing in Wireless Sensor Networks},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {10 2018},
volume = {6},
Issue = {5},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {38-46},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=347},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=347
TI - Combining Trust with Authentication Information for Routing in Wireless Sensor Networks
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Annlin Jeba S.V., Gnana King D.R.
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 38-46
IS - 5
VL - 6
SN - 2347-2693
ER -

1024 Views    363 Downloads    253 Downloads
  
  

Abstract :
Demand for Wireless sensor network (WSN) applications increases due to the peculiar features owned by the sensor nodes in connecting real world with virtual world. Mission-critical services such as health monitoring and military insist for reporting sensed event information to the required authorities. But WSNs deployed in harsh environment suffer from unexpected changes in the link quality which severely affect the information in transit. To cope with these issues, it is essential to have efficient secure and reliable communication mechanisms. This study proposes a routing mechanism based on link quality, residual energy and authentication information owned by nodes involved in communication. Forwarding nodes are selected based on the stability of the link between consecutive nodes and remaining energy of the nodes along the path. In addition, the proposed scheme support to achieve security and privacy in communication with the help of link level authentication information shared between nodes. The Trust degree of the sensor node is computed based on the combined effort of the routing metrics. The performance is evaluated in terms of packet delivery ratio, delay and energy consumption. It was observed that proposed scheme perform well in high traffic, limited bandwidth and routing attacks performed through malicious nodes.

Key-Words / Index Term :
residual energy, link quality, forwarding, authentication, trust, reliable

References :
[I] Nikolaos. A.Pantazis,"Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey", IEEE Communications Surveys and Tutorials. Vo.l5, No.2, 2013.
[2] Anfeng Liu, Zhongming Zheng, Chaozhang `Secure and Energy efficient disjoint Multipath Routing For WSNs`, IEEE Transations on Vehicular Technology ,Vol 61,No:7,pp. 3255-3265,2012.
[3] Junfeng XU,Keqiu Li ,Geyong Min,` Reliable and Energy­ Efficient Multipath Communications in underwater Sensor Networks`, IEEE Transactions on parallel and distributed systems, Vol. 23,No.7, pp. 1326-1335, 2012).
[4] Eliana Stavrou,Andreas pitsillides(201O), `A Survey on Secure Multipath routing Protocol in WSNs" Computer Networks Vo1.54 ,pp. 2215-2238.
[5] l.F.Akyildiz, W.Su,Y. Sankarasubramanian, E. Cayirci, "A survey on sensor networks" , IEEE Communication magazine, VoI.40,No.8 ,pp.102-114,2002.
[6] Jiming Chen,Ruizhong Lin,LQER: "A Link Quality Estimation based Routing for Wireless Sensor Networks" ,journal of Sensors, VoI.8,pp.1025-1 038, 2008.
[7] Jae-Hwan Chang, L.Trassiulas,"Maximum Lifetime Routing in Wireless Sensor Networks", IEEE Transaction on Networking, vo1.l2, No.4, pp.609-619, 2004.
[8] Pi-cheng Hsiu,Tei-wei Kuo,"A maximum-residual multicast protocol for large-scale mobile ad hoc networks"IEEE transactions on mobile computing, VoI.8,No.11,pp.1441-1453, 2009.
[9] S.V.Annlin Jeba, B. Paramasivan, "Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks", Computers and Electrical Engineering, Elsevier, vo1.39 issue 6,pp.1867-1879,2013
[10] H.C.Leligou, P.Trakadas, S.Maniatis,"Combining trust with location information for routing in wireless sensor networks", wireless communications and mobile computing,Vo1.l2, No.12, pp.1091-1103,2012
[11] Ninal Nasser: Yun feng Chen."SEEM: Secure and energy efficient multipath routing protocol for WSNS" Computer Comunications ,Elesivier 3 0(2007) 2401- 2412.
[12] Wenjing Lou, Kwan`s," SP READ: A Hybrid Multipath Scheme for Secure and Reliable data collections in WSNs" IEEE Transations on Vehicular Technology, vol 55,no.4, pp. 1320-13 3 0,2006.
[13] G. Zhan, Wei song Shi, " Design and Implementation of TARF:A Trust-Aware Routing Frameworks for WSNS",IEEE Transactions on Dependable and secure computing, Vo:9,issue:2,pp.184-197,20l2
[14] Imad S.Alshawi, Lianshan Van, Wei pan" Life time enhancement in wireless sensor networks using fuzzy approach and A-star algorithm", IEEE sensors journal, Vol.12,No.1 0,pp.30 I 0-3018,20 12.
[15] Xufei Mao, Shaojie Tang, Xiahua Xu. "Energy efficient opportunistic routing in wireless sensor networks". IEEE transaction on parallel and distributed systems, Vol. 22, No.ll, pp. 1934-1942, 2011.
[16] S.Young Moon, Tae Ho Cho, " Fuzzy Based Assignment Method of Filtering Nodes in Wireless Sensor Networks". Wireless Sensor Networks. Vol.4,No.2,pp.40-44, 2012.
[17] Prasenjit Bhavathankar, Subarna Chatterjee, Sudip Misra, ”IEEE Link-Quality Aware Path Selection in the Presence of Proactive Jamming in Fallible Wireless Sensor Networks”, IEEE transactions on communications, VOL. 66, NO. 4, pp.1689-1704, 2018.
[18] Sheng-Shih Wang and Ze-Ping Chen,” LCM: A Link-Aware Clustering Mechanism for Energy-Efficient Routing in Wireless Sensor Networks”, IEEE sensors journal, VOL. 13, NO. 2, pp.728-738, 2013.
[19] Korhan Cengiz and Tamer Dag,” Energy Aware Multi-Hop Routing Protocol for WSNs”, IEEE Access, V0L. 6, PP. 2622-2633.
[20] Hossein Shafieirad , Raviraj S. Adve and Shahram Shahbazpanahi, “Max-SNR Opportunistic Routing for Large-Scale Energy Harvesting Sensor Networks”, IEEE transactions on green communications and networking, VOL. 2, NO. 2, pp.506-516, 2018.
[21] Danyang qin, Songxiang yang, Shuang jia, Yan zhang, Jingya ma, and Qun ding,” Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network”, IEEE Access, volume 5, pp.9599-9606, 2017
[22] Xiaohan Lai, Xiaoyu Ji "Energy efficient link-delay aware routing in wireless sensor networks", IEEE sensors journal, vo1.18, issue 2, pp.837-848,2018.
[23] D.S. De Couto, D.Aguayo,”A high-throughput path metric for multi-hop wireless routing “, Wireless Networks, vol.11. PP. 419-434,2005.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation