Secure and Energy Aware Shortest Path Routing Framework for WSN

  • Nikitha KukunuruEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 808)


Wireless Sensor Network is a network in which the sensor nodes are operated in a distributed and self-organizing fashion. Due to this nature the sensor nodes in this network are vulnerable to various malicious attacks. The sensor nodes are resource constrained, i.e., they have limited resources such as bandwidth, energy and memory. Along with Security and Energy Consumption, Delay also needs to be considered during the routing protocol design. This proposes a Trust and Energy Aware Routing Framework which provides resilience to various malicious attacks. The proposed framework helps in finding trusted nodes with maximum residual energy and routes the data through shorter paths. The experimental analysis with varying network parameters as varying the malicious nodes and varying packet size reveal the robustness of proposed approach. Total Throughput, Energy Consumption and End-to-End Delay are considered for experimental evaluation.


Malicious nodes Residual energy Throughput Trust Wireless sensor network 


  1. 1.
    Chen, S., Zhang, Y., Liu, Q., & Feng, J. (2012). Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks, 10(8), 1603–1618.CrossRefGoogle Scholar
  2. 2.
    Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 13(4), 562–583.CrossRefGoogle Scholar
  3. 3.
    Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust based methods for MANET routing security. Electronis Notes Theoretical Computer Science, 197(2), 131–140.CrossRefGoogle Scholar
  4. 4.
    Chang, J.-H., & Tassiulas, L. (2000). Energy conserving routing in wireless ad-hoc networks. In Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ’00), Vol. 1, IEEE, March 2000, pp. 22–31.Google Scholar
  5. 5.
    Ye, F., Chen, A., Lu, S., & Zhang, L. (2010). A scalable solution to minimum cost forwarding in large sensor networks. In Proceedings of the 10th International Conference on Computer Communications and Network, Scottsdale, Ariz, USA, 2010, pp. 304–309.Google Scholar
  6. 6.
    Ahmed, A., & Bakar, K. A. (2015). TERP: A trust and energy aware routing protocol for wireless sensor network. IEEE Transactions on Networking.Google Scholar
  7. 7.
    Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2012). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826.CrossRefGoogle Scholar
  8. 8.
    Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014(Article ID 209436), 1–14.Google Scholar
  9. 9.
    Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions Dependable and Secure Computing, 9(2), 184–197.CrossRefGoogle Scholar
  10. 10.
    Gong, P. (2015). ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks. Journal of Sensors.Google Scholar
  11. 11.
    Li, X., Jia, Z., Zhang, P., Zhang, R., & Wang, H. (2010). Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security, 4(4), 212–232.CrossRefGoogle Scholar
  12. 12.
    Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83.CrossRefGoogle Scholar
  13. 13.
    Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefGoogle Scholar
  14. 14.
    Ferng, H.-W,. & Rachmarini, D. (2012). A secure routing protocol for wireless sensor networks with consideration of energy efficiency. In Proceedings of the IEEE Network Operations and Management Symposium (NOMS ’12), Maui, Hawaii, USA, April 2012, pp. 105–112.Google Scholar
  15. 15.
    Sadek, A. K., Yu, W., & Liu, K. J. R. (2009). On the energy efficiency of cooperative communications in wireless sensor networks. ACM Transactions on Sensor Networks, 6(1).Google Scholar
  16. 16.
    Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 13(4), 562–583.CrossRefGoogle Scholar
  17. 17.
    Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. RFC, 3561.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Information Technology DepartmentM.V.S.R Engineering CollegeHyderabadIndia

Personalised recommendations