Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks

  • 89 Accesses

  • 1 Citations

Abstract

In Wireless Sensor Network (WSN), the lifetime optimization based on minimal energy consumption and security are the crucial issues for the effective design of protocols to perform multi-hop secure routing. In order to address these issues, we propose a new routing protocol called Secured Quality of Service (QoS) aware Energy Efficient Routing Protocol in this paper which is designed based on trust and energy modelling for enhancing the security of WSN and also to optimize the energy utilization. In this proposed work, the trust modelling uses an authentication technique with a key based security mechanism for providing trust scores. Moreover, three types of trust scores namely direct, indirect and overall trust scores are calculated in this work for enhancing the security of communication. In addition, a cluster based secure routing algorithm is proposed in this work in which the cluster head has been selected based on QoS metrics and trust scores to perform cluster based secure routing. Finally, the final path has been selected based on path-trust, energy and hop count to efficiently carry out the secure routing process. The proposed work has been assessed by simulations carried out using NS2 simulator. The simulation results demonstrate that the proposed algorithm provides better performance in terms of increase in packet delivery ratio, network life time and security. Moreover, it provides reduction in delay and energy consumption when the proposed secure routing algorithm is compared to the other related secure routing algorithms.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

References

  1. 1.

    Munuswamy, S., Saravanakumar, J. M., Sannasi, G., Harichandran, K. N., & Arputharaj, K. (2018). Virtual force-based intelligent clustering for energy-efficient routing in mobile wireless sensor networks. Turkish Journal of Electrical Engineering & Computer Sciences,26(3), 1444–1452.

  2. 2.

    Ayyasamy, A., & Venkatachalapathy, K. (2015). Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs. Wireless Networks,21(2), 421–430.

  3. 3.

    Logambigai, R., & Kannan, A. (2014). QEER: QoS aware energy efficient routing protocol for wireless sensor networks. In IEEE 6th international conference on advanced computing (ICoAC) (pp. 57–60).

  4. 4.

    Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks. Wireless Networks. https://doi.org/10.1007/s11276-019-02073-9.

  5. 5.

    Baraa, A. A. (2011). Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks. Swarm and Evolutionary Computation,1(4), 195–203.

  6. 6.

    Villas, L. A., Boukerche, A., Ramos, H. S., de Oliveira, H. A. B. F., de Araujo, R. B., & Loureiro, A. A. F. (2013). DRINA: A lightweight and reliable routing approach for in-network aggregation in wireless sensor networks. IEEE Transactions on Computers,62(4), 676–689.

  7. 7.

    Nakamura, E. F., de Oliveira, H. A., Pontello, L. F., & Loureiro, A. A. F. (2006). On demand role assignment for event detection in sensor networks. In 11th IEEE symposium on computers and communications (ISCC’06), Sardinia, Italy (pp. 941–947).

  8. 8.

    Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2010). Energy-efficient communication protocol for wireless microsensor networks. In Annual Hawaii international conference, system sciences (p. 10).

  9. 9.

    Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing,3(4), 366–379.

  10. 10.

    Rahman, M. N., & Matin, M. A. (2011). Efficient algorithm for prolonging network lifetime of wireless sensor network. Tsinghua Science and Technology,16(6), 561–568.

  11. 11.

    Mathapati, B. S., Patil, S. R., & Mytri, V. D. (2012). A cluster based energy efficient reliable routing protocol for wireless sensor networks. In Proceedings on 1st international conference, ET2ECN (pp. 1–6).

  12. 12.

    Kuila, P., & Jana, P. K. (2014). Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Engineering Applications of Artificial Intelligence,33, 127–140.

  13. 13.

    Logambigai, R., & Kannan, A. (2015). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks,22, 1–13.

  14. 14.

    Wood, A., & Stankovic, J. (2002). Denial of service in sensor networks. Computer,35(10), 54–62.

  15. 15.

    Kulothungan, K., Ganapathy, S., Indra Gandhi, P., & Yogesh, P. (2011). Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. International Journal of Soft Computing,6(5), 210–215.

  16. 16.

    Ganapathy, S., Kulothungan, K., Muthuraj Kumar, S., & Vijayalakshmi, M. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP Journal on Wireless Communication and Networking,271(1), 1–16.

  17. 17.

    Kumar, S. V. N. S., & Palanichamy, Y. (2018). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks,24(4), 1343–1360.

  18. 18.

    Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing,9(2), 184–197.

  19. 19.

    Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications,105(4), 1475–1490.

  20. 20.

    Thippeswamy, B. M., Reshma, S., Tejaswi, V., Shaila, K., Venugopal, K. R., & Patnaik, L. M. (2015). STEAR: Secure trust-aware energy-efficient adaptive routing in wireless sensor networks. Journal of Advances in Computer Networks,3(2), 146–149.

  21. 21.

    Sethuraman, P., Tamizharasan, P. S., & Arputharaj, K. (2019). Fuzzy genetic elliptic curve Diffie Hellman algorithm for secured communication in networks. Wireless Personal Communications,105(3), 993–1007.

  22. 22.

    Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks,10, 1–14.

  23. 23.

    Gu, W., Dutta, N., Chellappan, S., & Bai, X. (2011). Providing end-to-end secure communications in wireless sensor networks. IEEE Transactions on Network and Service Management,8(3), 205–218.

  24. 24.

    Murthy, S., D’Souza, R. J., & Varaprasad, G. (2012). Digital signature-based secure node disjoint multipath routing protocol for wireless sensor networks. IEEE Transactions on Sensors Journal,12(10), 2941–2949.

  25. 25.

    Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. Journal of Communications and Networks,15(4), 422–429.

  26. 26.

    Mahmoud, M. M., Lin, X., & Shen, X. S. (2015). Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 1140–1153.

  27. 27.

    Li, S., Zhao, S., Wang, X., Zhang, K., & Li, L. (2014). Adaptive and secure load-balancing routing protocol for service-oriented wireless sensor networks. IEEE Systems Journal,8(3), 858–867.

  28. 28.

    Lee, S.-B., & Choi, Y.-H. (2006). A secure alternate path routing in sensor networks. Computer Communications,30(1), 153–165.

  29. 29.

    Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security,11(9), 2013–2027.

  30. 30.

    Xiong, H., & Qin, Z. (2015). Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Transactions on Information Forensics and Security,10(7), 1442–1455.

  31. 31.

    Kerrache, C. A., Calafate, C. T., Cano, J. C., Lagraa, N., & Manzoni, P. (2016). Trust management for vehicular networks: An adversary-oriented overview. IEEE Access,4, 9293–9307.

  32. 32.

    Hamdane, B., Boussada, R., Elhdhili, M. E., & El Fatmi, S. G. (2017). Hierarchical identity based cryptography for security and trust in named data networking. In 2017 IEEE 26th international conference on enabling technologies: Infrastructure for collaborative enterprises (pp. 226–231).

  33. 33.

    Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H. K., Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 117–122).

  34. 34.

    Selvi, M., Velvizhy, M., Ganapathy, S., Nehemiah, H. K., & Kannan, A. (2017). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing. https://doi.org/10.1007/s10586-017-1191-y.

  35. 35.

    Muthurajkumar, S., Ganapathy, S., Vijayalakshmi, M., & Kannan, A. (2017). An intelligent secured and energy efficient routing algorithm for MANETs. Wireless Personal Communications,96(2), 1753–1769.

  36. 36.

    Umar, I. A., Hanapi, Z. M., Sali, A., & Zulkarnain, Z. A. (2017). TruFiX: A configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access,5, 2550–2562.

  37. 37.

    Tang, D., Li, T., Ren, J., & Jie, W. (2015). Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,26(4), 960–973.

  38. 38.

    Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., Ganapathy, S., & Kannan, A. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Computer Networks,151, 211–223.

  39. 39.

    Mhemed, R., Aslam, N., Phillips, W., & Comeau, F. (2012). An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science,10, 255–262.

  40. 40.

    Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications,1(4), 660–670.

  41. 41.

    Guo, Q., Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Modeling and evaluation of trust in cloud computing environments. In IEEE 3rd international conference on advanced computer control (ICACC 2011) (pp. 112–116).

  42. 42.

    Xia, H., Jia, Z., Ju, L., Li, X., & Sha, E. H. (2013). Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. Computer Communications,36, 1078–1093.

  43. 43.

    Allen, J. F. (1983). Maintaining knowledge about temporal intervals. Communications of the ACM,26(11), 832–843.

Download references

Author information

Correspondence to Thangaramya Kalidoss or Arputharaj Kannan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Kalidoss, T., Rajasekaran, L., Kanagasabai, K. et al. QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks. Wireless Pers Commun 110, 1637–1658 (2020). https://doi.org/10.1007/s11277-019-06788-y

Download citation

Keywords

  • Trust score
  • Wireless sensor networks
  • Quality of Service
  • Security
  • Trust based routing
  • Energy efficiency