Skip to main content

Modified Trust Value Based Approach to Secure Wireless Sensor Networks

  • Conference paper
  • First Online:
Futuristic Trends in Network and Communication Technologies (FTNCT 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 958))

  • 618 Accesses

Abstract

The unattended nature of the WSN makes the nodes susceptible to various attacks. Among many of the possible attacks, ones that are focused on draining nodes’ energy are most dangerous since they leave the network dead. This paper proposes a scheme to detect the aggressive behavior of nodes by using the packet- forwarding behavior of the nodes. Trust value is lessened if in any case there is a difference between the number of packets forwarded by the sensor hub during data transmission is discovered abnormal. In this way, after a certain number of rounds, nodes which are acting as aggressive will be removed. For transmitting the information over the system effectively when the abnormal hub is to be expelled from existing path would require second way promptly accessible, to take care of this issue in this method two nearest neighboring hubs are chosen to shape two ways. The rendition of the system is analyzed on the basis of remaining energy, packet forwarding ratio, and throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002). https://doi.org/10.1109/MCOM.2002.1024422

    Article  Google Scholar 

  2. Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., Leung, C.M.: Body area networks: a survey. Mob. Netw. Appl. 16(2), 171–193 (2011). https://doi.org/10.1007/s11036-010-0260-8

    Article  Google Scholar 

  3. Garg, V.: Wireless Communication and Networking. Elsevier Inc., Amsterdam (2007)

    Google Scholar 

  4. Wu, M., Collier, M.: TSEP: a localised algorithm for extending the lifetime of sensor networks. In: Proceedings of the IEEE Wireless Advanced (WiAD), pp. 289–294 (2011). https://doi.org/10.1109/wiad.2011.5983271

  5. Lindsey, S., Raghavendra, C., Sivalingam, K.M.: Data gathering algorithms in sensor networks using energy metrics. IEEE Trans. Parallel Distrib. Syst. 13(9), 924–935 (2002). https://doi.org/10.1109/TPDS.2002.1036066

    Article  Google Scholar 

  6. Tian, D., Georganas, N.D.: Energy efficient routing with guaranteed delivery in wireless sensor networks. In: IEEE Wireless Communication Networking, WCN, vol. 3, pp. 1923–1929. IEEE (2003). https://doi.org/10.1109/wcnc.2003.1200681

  7. Saravanakumar, R., Susila, S.G., Raja, J.: An energy-efficient cluster based node scheduling protocol for wireless sensor networks. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), vol. 1–5, pp. 28–29, December 2010

    Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: IEEE International Workshop on Sensor Network Protocols and Applications (2003). http://10.0.4.85/SNPA.2003.1203362

  9. Nagarathna, K., Kiran, Y.B., Mallapur, J.D., Hiremath, S.: Trust-based secured routing in wireless multimedia sensor networks. In: International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN) (2012). https://doi.org/10.1109/cicsyn.2012.20

  10. Ahn, C.W., Ramakrishna, R.S.: A genetic algorithm for shortest path routing problem and the sizing of populations. IEEE Trans. Evol. Comput. 6(6), 566–579 (2002). https://doi.org/10.1109/tevc.2002.804323

    Article  Google Scholar 

  11. Lindsey, S., Raghavendra, C.S.: PEGASIS: power-efficient gathering in sensor information systems. In: IEEE Aerospace Conference, pp. 1125–1130. IEEE (2002). https://doi.org/10.1109/aero.2002.1035242

  12. Lee, J., Choi, B., Lee, J.: Energy efficient coverage of wireless sensor networks using Ant colony optimization with three types of pheromones. IEEE Trans. Ind. Inf. 7, 419–427 (2011). https://doi.org/10.1109/tii.2011.2158836

    Article  Google Scholar 

  13. Jain, A., Ramana Reddy, B.V.: A novel method of modeling wireless sensor network using fuzzy graph and energy efficient fuzzy based k-hop clustering algorithm. Wirel. Pers. Commun. 82(1), 157–181 (2015)

    Article  Google Scholar 

  14. Yadav, A., Singh, Y.N., Singh, R.: Cross-layer design for power control and link availability in mobile adhoc networks. Int. J. Comput. Netw. Commun. (IJCNC) 7(3), 127–143 (2015). https://doi.org/10.5121/ijcnc.2015.7310

    Article  Google Scholar 

  15. Gopal, D., Suriyakala, C.D.: Performance evaluation of hybrid energy efficient cluster based routing scheme for mobile sink based WSN. In: IEEE Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (2015). https://doi.org/10.1109/iccicct.2015.7475342

  16. Mohamed, E., Ahmed, M., Abderrazak, A., Elfouly, T.M.: Routing and flow rate assignment using multi-objective optimization in wireless sensor networks. In: IEEE Conference on Wireless Communications and Networking Conference (WCNC 2015), pp. 1368–1373 (2015). https://doi.org/10.1109/wcnc.2015.7127668

  17. Tarasia, N., Lenka, M., Swain, A.: Energy efficient extended coverage in wireless sensor networks. In: IEEE International Conference on Advanced Information Networking and Applications, AINA 2015, Gwangiu, pp. 247 – 254 (2015). https://doi.org/10.1109/aina.2015.192

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pardeep Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, P., Kad, S. (2019). Modified Trust Value Based Approach to Secure Wireless Sensor Networks. In: Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds) Futuristic Trends in Network and Communication Technologies. FTNCT 2018. Communications in Computer and Information Science, vol 958. Springer, Singapore. https://doi.org/10.1007/978-981-13-3804-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3804-5_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3803-8

  • Online ISBN: 978-981-13-3804-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics