Trust-Based Secure And Energy Efficient Routing Framework For WSNS

International Journal of Computer Trends and Technology (IJCTT)          
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-1                           
Year of Publication : 2013
Authors :Dhanunjayudu.K , Mahesh.B


Dhanunjayudu.K , Mahesh.B"Trust-Based Secure And Energy Efficient Routing Framework For WSNS"International Journal of Computer Trends and Technology (IJCTT),V5(1):1-5 November Issue 2013 .ISSN Published by Seventh Sense Research Group.

Abstract:- Identity deception is while replying routing information is one of the security threats in Wireless Sensor Networks (WSNs). As the nodes WSN are resource constrained, many attacks are possible. For instance an adversary might exploit the vulnerabilities WSN and launch attacks which disrupt normal functionalities of routing protocols. The attacks launched are generally wormhole attacks, sinkhole attacks and Sybil attacks. The mobility nature of network and other network conditions may make the situation even worse. These attacks can’t be prevented with traditional cryptographic primitives as cannot be directly used with WSN. Therefore a special design for WSN is required in order to make it robust, trust-aware and secure. Recently Zhan, Shi and Deng proposed a trust – aware routing framework for WSNs. This framework energy efficient and trustworthy routing and avoid attacks on WSN. In his paper we implement such routing framework which is trust-aware and routes data securely. We built a prototype application to demonstrate the proof of concept. The empirical results revealed that he prototype is very effective in securing WSN from various attacks.


References -

[1] F. Zhao and L. Guibas, Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann Publishers, 2004.
[2] A. Wood and J. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no. 10, pp. 54–62, Oct 2002.
[3] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
[4] M. Jain and H. Kandwal, “A survey on complex wormhole attack in wireless ad hoc networks,” in Proceedings of International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT ’09), 28-29 2009, pp. 555 –558.
[5] I. Krontiris, T. Giannetsos, and T. Dimitriou, “Launching a sinkhole attack in wireless sensor networks; the intruder side,” in Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications(WIMOB ’08), 12-14 2008, pp. 526 –531.
[6] J. Hee-Jin, N. Choon-Sung, J. Yi-Seok, and S. Dong-Ryeol, “A mobile agent based leach in wireless sensor networks,” in Proceedings of the 10th International Conference on Advanced Communication Technology (ICACT 2008), vol. 1, 17-20 2008, pp. 75 –78.
[7] W. Xue, J. Aiguo, and W. Sheng, “Mobile agent based moving target methods in wireless sensor networks,” in IEEE International Symposium on Communications and Information Technology (ISCIT 2005), vol. 1, 12-14 2005, pp. 22 – 26.
[8] L. Zhang, Q. Wang, and X. Shu, “A mobile-agent-based middleware for wireless sensor networks data fusion,” in Proceedings of Instrumentation and Measurement Technology Conference (I2MTC ’09), 5-7 2009, pp. 378 –383.
[9] L. Bai, F. Ferrese, K. Ploskina, and S. Biswas, “Performance analysis of mobile agent-based wireless sensor network,”

Keywords :— WSN, secure routing, trust-aware