Abstract
The unattended nature of the WSN makes the nodes susceptible to various attacks. Among many of the possible attacks, ones that are focused on draining nodes’ energy are most dangerous since they leave the network dead. This paper proposes a scheme to detect the aggressive behavior of nodes by using the packet- forwarding behavior of the nodes. Trust value is lessened if in any case there is a difference between the number of packets forwarded by the sensor hub during data transmission is discovered abnormal. In this way, after a certain number of rounds, nodes which are acting as aggressive will be removed. For transmitting the information over the system effectively when the abnormal hub is to be expelled from existing path would require second way promptly accessible, to take care of this issue in this method two nearest neighboring hubs are chosen to shape two ways. The rendition of the system is analyzed on the basis of remaining energy, packet forwarding ratio, and throughput.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002). https://doi.org/10.1109/MCOM.2002.1024422
Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., Leung, C.M.: Body area networks: a survey. Mob. Netw. Appl. 16(2), 171–193 (2011). https://doi.org/10.1007/s11036-010-0260-8
Garg, V.: Wireless Communication and Networking. Elsevier Inc., Amsterdam (2007)
Wu, M., Collier, M.: TSEP: a localised algorithm for extending the lifetime of sensor networks. In: Proceedings of the IEEE Wireless Advanced (WiAD), pp. 289–294 (2011). https://doi.org/10.1109/wiad.2011.5983271
Lindsey, S., Raghavendra, C., Sivalingam, K.M.: Data gathering algorithms in sensor networks using energy metrics. IEEE Trans. Parallel Distrib. Syst. 13(9), 924–935 (2002). https://doi.org/10.1109/TPDS.2002.1036066
Tian, D., Georganas, N.D.: Energy efficient routing with guaranteed delivery in wireless sensor networks. In: IEEE Wireless Communication Networking, WCN, vol. 3, pp. 1923–1929. IEEE (2003). https://doi.org/10.1109/wcnc.2003.1200681
Saravanakumar, R., Susila, S.G., Raja, J.: An energy-efficient cluster based node scheduling protocol for wireless sensor networks. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), vol. 1–5, pp. 28–29, December 2010
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: IEEE International Workshop on Sensor Network Protocols and Applications (2003). http://10.0.4.85/SNPA.2003.1203362
Nagarathna, K., Kiran, Y.B., Mallapur, J.D., Hiremath, S.: Trust-based secured routing in wireless multimedia sensor networks. In: International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN) (2012). https://doi.org/10.1109/cicsyn.2012.20
Ahn, C.W., Ramakrishna, R.S.: A genetic algorithm for shortest path routing problem and the sizing of populations. IEEE Trans. Evol. Comput. 6(6), 566–579 (2002). https://doi.org/10.1109/tevc.2002.804323
Lindsey, S., Raghavendra, C.S.: PEGASIS: power-efficient gathering in sensor information systems. In: IEEE Aerospace Conference, pp. 1125–1130. IEEE (2002). https://doi.org/10.1109/aero.2002.1035242
Lee, J., Choi, B., Lee, J.: Energy efficient coverage of wireless sensor networks using Ant colony optimization with three types of pheromones. IEEE Trans. Ind. Inf. 7, 419–427 (2011). https://doi.org/10.1109/tii.2011.2158836
Jain, A., Ramana Reddy, B.V.: A novel method of modeling wireless sensor network using fuzzy graph and energy efficient fuzzy based k-hop clustering algorithm. Wirel. Pers. Commun. 82(1), 157–181 (2015)
Yadav, A., Singh, Y.N., Singh, R.: Cross-layer design for power control and link availability in mobile adhoc networks. Int. J. Comput. Netw. Commun. (IJCNC) 7(3), 127–143 (2015). https://doi.org/10.5121/ijcnc.2015.7310
Gopal, D., Suriyakala, C.D.: Performance evaluation of hybrid energy efficient cluster based routing scheme for mobile sink based WSN. In: IEEE Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (2015). https://doi.org/10.1109/iccicct.2015.7475342
Mohamed, E., Ahmed, M., Abderrazak, A., Elfouly, T.M.: Routing and flow rate assignment using multi-objective optimization in wireless sensor networks. In: IEEE Conference on Wireless Communications and Networking Conference (WCNC 2015), pp. 1368–1373 (2015). https://doi.org/10.1109/wcnc.2015.7127668
Tarasia, N., Lenka, M., Swain, A.: Energy efficient extended coverage in wireless sensor networks. In: IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangiu, pp. 247 – 254 (2015). https://doi.org/10.1109/aina.2015.192
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kaur, P., Kad, S. (2019). Modified Trust Value Based Approach to Secure Wireless Sensor Networks. In: Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds) Futuristic Trends in Network and Communication Technologies. FTNCT 2018. Communications in Computer and Information Science, vol 958. Springer, Singapore. https://doi.org/10.1007/978-981-13-3804-5_30
Download citation
DOI: https://doi.org/10.1007/978-981-13-3804-5_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3803-8
Online ISBN: 978-981-13-3804-5
eBook Packages: Computer ScienceComputer Science (R0)