Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 11919–11927 | Cite as

Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks

  • M. UdhayavaniEmail author
  • M. Chandrasekaran
Article
  • 112 Downloads

Abstract

A wireless sensor networks encompasses battery powered sensor nodes with extremely limited processing capabilities. One of the major challenges in WSN is to overcome the attacks like Sinkhole, Wormhole and Sybil, Dos attacks, Selective forwarding etc. which reduces the performance of the network, since the Cryptographic techniques are not much effective in solving this problem. So in order to protect wireless sensor networks from attacks and to perform improvement in some of the aspects we have implemented a low overhead trust aware routing with energy efficient network protocol. This protocol is designed by incorporating the trust aware routing frame work with adaptive periodic threshold sensitive energy efficient network protocol. By minimizing the attacks, the network provides a better QOS with trustworthy and energy efficient route which leads to increase the network life time.

Keywords

Wireless sensor network (WSN) Routing protocol TARF TAREEN Security 

References

  1. 1.
    Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Depend. Secure Comput. 9, 184–197 (2012)CrossRefGoogle Scholar
  2. 2.
    Zhao, F., Guibas, L.: Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann, Burlington (2004)Google Scholar
  3. 3.
    Wood, A.D., Stankovic, J.: Denial of service in sensor networks. Computer 35, 54–62 (2002)CrossRefGoogle Scholar
  4. 4.
    Jain, M., Kandwal, H.: A survey on complex wormhole attack in wireless ad hoc networks. In: Proceeding of International Conference Advances in Computing, Control, and Telecomm. Technologies (ACT ’09), pp. 555–558 (2009)Google Scholar
  5. 5.
    Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks; the intruder side. In: Proceedings of IEEE International Conference Wireless and Mobile Computing, Networking and Communication (WIMOB ’08), pp. 526–531 (2008)Google Scholar
  6. 6.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Proceedings Third International Conference Information Processing in Sensor Networks (IPSN ’04) (2004)Google Scholar
  7. 7.
    Bai, L., Ferrese, F., Ploskina, K., Biswas, S.: Performance analysis of mobile agent-based wireless sensor network. In: Proceeding Eighth International Conference Reliability, Maintainability and Safety (ICRMS ’09), pp. 16–19 (2009)Google Scholar
  8. 8.
    Zhang, L., Wang, Q., Shu, X.: A mobile-agent-based middleware for wireless sensor networks data fusion. In: Proceeding Instrumentation and Measurement Technology Conference (I2MTC ’09), pp. 378–383 (2009)Google Scholar
  9. 9.
    Xue, W., Aiguo, J., Sheng, W.: Mobile agent based moving target methods in wireless sensor networks. In: Proceedings IEEE International Symposium Communication and Information Technology (ISCIT ’05), vol. 1, pp. 22–26 (2005)Google Scholar
  10. 10.
    Jeong, H.-J., Nam, C.-S., Jeong, Y.-S., Shin, D.-R.: A mobile agent based leach in wireless sensor networks. In: Proceedings 10th International Conference Advanced Communication Technology (ICACT ’08), vol. 1, pp. 75–78 (2008)Google Scholar
  11. 11.
    Al-Karaki, J., Kamal, A.: Routing techniques in wireless sensor networks: a survey. Wirel. Commun. 11(6), 6–28 (2004)CrossRefGoogle Scholar
  12. 12.
    Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proceeding ACM International Conference Embedded Networked Sensor Systems (SenSys ’04) (2004)Google Scholar
  13. 13.
    Perrig, A., Szewczyk, R., Wen, W., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. Wirel. Netw. J. 8(5), 521–534 (2002)CrossRefzbMATHGoogle Scholar
  14. 14.
    Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 59–64 (2004)Google Scholar
  15. 15.
    Liu, A., Ning, P.: Tinyecc: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings Seventh International Conference Information Processing in Sensor Networks (IPSN ’08), pp. 245–256 (2008)Google Scholar
  16. 16.
    Safa, H., Artail, H., Tabet, D.: A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel. Netw. 16(4), 969–984 (2010)CrossRefGoogle Scholar
  17. 17.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRefGoogle Scholar
  18. 18.
    Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., Lam, K.: Trust based routing for misbehavior detection in ad hoc networks. J. Netw. 5(5), 551–558 (2010)Google Scholar
  19. 19.
    Yan, Z., Zhang, P., Virtanen, T.: Trust evaluation based security solution in ad hoc networks. In: Proceedings Seventh Nordic Workshop Secure IT Systems (2003)Google Scholar
  20. 20.
    Li, J.L.X., Lyu, M.R.: Taodv: A Trusted AODV routing protocol for mobile ad hoc networks. In: Proceedings of Aerospace Conference (2004)Google Scholar
  21. 21.
    Kavita, A.P.: Design and implementation of tarf for WSNs. Int. J. Sci. Res. (IJSR) 3, 1944–1947 (2012)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electronics and Communication EngineeringVivekanandha College of Engineering for WomenTiruchengodeIndia
  2. 2.Department of Electronics and Communication EngineeringGovernment College of EngineeringBargurIndia

Personalised recommendations