An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks

  • M. SelviEmail author
  • K. Thangaramya
  • Sannasi Ganapathy
  • K. Kulothungan
  • H. Khannah Nehemiah
  • A. Kannan


Security is an important phenomena for energy conservation in wireless sensor networks (WSN). Moreover, the management of trust in the WSN is a challenging task since trust is used when collaboration is critical to achieve reliable communication. In a military application using WSN, it is often necessary to communicate secret information such as military operation urgently. However, the existing routing algorithms do not consider security in the routing process. Moreover, since security is an important aspect in WSN, it is necessary to consider the security aspects in routing algorithms. Different approaches for providing security are trust management, intrusion detection, firewalls and key management are considered in the literature. Among them, trust management can provide enhanced security when it is compared with other security methods. Therefore, a new secure routing algorithm called energy aware trust based secure routing algorithm is proposed in this paper where the trust score evaluation is used to detect the malicious users effectively in WSN and spatio-temporal constraints are used with decision tree algorithm for selecting the best route. From the experiments conducted, it is proved that the proposed trust based routing algorithm achieves significant performance improvement over the existing schemes in terms of security, energy efficiency and packet delivery ratio.


Intrusion detection Wireless sensor networks Trust score Secure routing Malicious nodes EATSRA 



  1. 1.
    Wang, X., Liu, L., & Jinshu, S. (2012). RLM: A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 5(1), 131–143.CrossRefGoogle Scholar
  2. 2.
    Jerusha, S., Kulothungan, K., & Kannan, A. (2012). Location aware cluster based routing in wireless sensor networks. International Journal of Computer & Communication Technology, 3(5), 1–6.Google Scholar
  3. 3.
    Kulothungan, K., Jothi, J. A. A., & Kannan, A. (2011). An adaptive fault tolerant routing protocol with error reporting scheme for wireless sensor networks. European Journal of Scientific Research, 16(1), 19–32.Google Scholar
  4. 4.
    Kulothungan, K., Ganapathy, S., Indra Gandhi, S., Yogesh, P., & Kannan, A. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing, 6(5), 210–215.CrossRefGoogle Scholar
  5. 5.
    Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H.-M. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications, 36, 1078–1093.CrossRefGoogle Scholar
  6. 6.
    Selvi, M., & Nandhini, C., Thangaramya, K., Kulothungan, K., & Kannan, A. (2016). HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the eighth international conference on advanced computing (ICoAC) (pp. 89–92).Google Scholar
  7. 7.
    Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks theory and practice. Hoboken: Wiley. ISBN 978-0-470-99765-9.CrossRefGoogle Scholar
  8. 8.
    Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L.S., Khanna Nehemiah, H., & Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 1–5). ACM.Google Scholar
  9. 9.
    Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11, 6–28.CrossRefGoogle Scholar
  10. 10.
    Akyildiz, I. F., & Vuran, M. C. (2010). Wireless sensor networks (pp. 131–141). Hoboken: Wiley.CrossRefGoogle Scholar
  11. 11.
    Kesavan, V. T., & Radhakrishnan, S. (2016). Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks. China Communication, Security Schemes and Solutions, 13(6), 178–194.Google Scholar
  12. 12.
    Ran, G., Zhang, H., & Gong, S. (2010). Improving on LEACH protocol of wireless sensor networks using fuzzy logic. Journal of Information & Computational Science, 7(3), 767–775.Google Scholar
  13. 13.
    Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.CrossRefGoogle Scholar
  14. 14.
    Younis, O., & Fahmy, S. (2004). HEED: A hybrid energy-efficient, distributed clustering approach for Ad Hoc sensor Networks. IEEE Transaction on Mobile Computing, 3, 366–379.CrossRefGoogle Scholar
  15. 15.
    Sun, Y. L., Yu, W., Han, Z., & Liu, K. J. R. (2006). Information theoretic framework of trust modeling evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 305–319.CrossRefGoogle Scholar
  16. 16.
    Das, A., & Islam, M. M. (2012). Secured trust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.CrossRefGoogle Scholar
  17. 17.
    Li, F., & Wu, J. (2010). Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing, 9(7), 1035–1049.CrossRefGoogle Scholar
  18. 18.
    Mohammed, N., Otrok, H., Wang, L., Debbabi, M., & Bhattacharya, P. (2011). Mechanism design-based secure leader election model for intrusion detection in MANET. IEEE Transactions on Dependable and Secure Computing, 8(1), 89–103.CrossRefGoogle Scholar
  19. 19.
    Li, Z., Jia, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRefGoogle Scholar
  20. 20.
    Wang, X., Ding, L., & Wang, S. (2011). Trust evaluation sensing for wireless sensor networks. IEEE Transactions on Instrumentation and Measurement, 60(6), 2088–2095.CrossRefGoogle Scholar
  21. 21.
    Yan, Z., & Prehofer, C. (2011). Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 8(6), 810–823.CrossRefGoogle Scholar
  22. 22.
    Serique, L. F. S., & de Sousa, R. T. (2012). Evaluating trust in ad hoc network routing by induction of decision trees. IEEE Latin America Transactions, 10(1), 1332–1343.CrossRefGoogle Scholar
  23. 23.
    Wang, Y., & Li, L. (2011). Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 4(4), 257–271.CrossRefGoogle Scholar
  24. 24.
    Mahmood, B. A., & Manivannan, D. (2015). Position based and hybrid routing protocols for mobile ad hoc networks: A survey. Wireless Personal Communications, 83(2), 1009–1033.CrossRefGoogle Scholar
  25. 25.
    Manivannan, D., Jyotiprada, A., & Sandhu, N. (2014). A survey of routing protocols for wireless sensor networks. International Journal of Next-Generation Computing, IJNGC, 5(2), 1–8.Google Scholar
  26. 26.
    Heinzelman, W. R., Chandrakasan, A., Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, IEEE (pp. 1–10).Google Scholar
  27. 27.
    Logambigai, R., & Kannan, A. (2016). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22, 945–957.CrossRefGoogle Scholar
  28. 28.
    Rajeswari, L. P., & Kannan, A. (2008). An intrusion detection system based on multiple level hybrid classifier using enhanced C4.5. In IEEE international conference on signal processing, communications and networking (pp. 75–79).Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information Science and Technology, CEG CampusAnna UniversityChennaiIndia
  2. 2.School of Computing Science and EngineeringVIT UniversityChennaiIndia

Personalised recommendations