Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks (original) (raw)
Related papers
A Trust-based Approach for Secure Packet Transfer in Wireless Sensor Networks
2011
Trust is an important factor in transferring data from the source to destination in wireless sensor networks. If any sensor node fails to transfer the data, the Dynamic Source Protocol calculates the alternate path. Currently, the Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path if the path has a malicious node. Intruder detection system can detect the malicious node. However, intruder detection system is very expensive for wireless sensor networks and there is no guarantee in detecting a malicious node. In the current research, a trust-based approach is recommended to minimize the overheads of intruder detection system and detect the abnormal behavior nodes. The proposed model uses the repeated games to detect faulty (malicious) nodes through the cooperative effort in the sensor network and judges the trust of successive nodes. Further, the research includes the trust model with reliable neighbors and query-based trust calculation. Sim...
Performance Analysis of Wireless Sensor Networks Based on Trust Mechanism
International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2021
Due to the characteristics like limited resources and dynamic topology, wireless sensor networks (WSNs) are facing two major problems such as security and energy consumption. To deal with various improper behaviors of nodes the trust-based solutions are possible but still exist a variety of attacks, high energy consumption, and communication congestion between nodes. Therefore, this paper proposes an advanced and efficient trust-based secure and energy-efficient routing protocol (TBSEER) to solve these network problems and to avoid malicious nodes. Efficient Adaptable Ant Colony Optimization Algorithm (EAACO) calculates the comprehensive trust value through adaptive direct trust value, indirect trust value, and energy trust value, which can be resistant to internal network attacks such as sinkhole, black hole, selective forwarding, and hello flood attacks. In addition, to fast identify the malicious nodes in the WSN, the adaptive penalty mechanism and volatilization factor are used. Moreover, the nodes only need to calculate the direct trust value, and the indirect trust value is obtained by the sink, so as to further reduce the energy consumption caused by iterative calculations. To actively avoid network attacks, the cluster heads find the safest multi-hop routes based on the comprehensive trust value. The simulation results show that the proposed EAACO reduces network energy consumption, speeds up the identification of malicious nodes, as well as resists all common attacks.
TRUST EVALUATION BASED SECURITY IN WIRELESS SENSOR NETWORK
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, that has been designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, This project provides trustworthy, time efficient and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both implementation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions.
An energy and trust-aware routing protocol for large wireless sensor networks
2009
Efficient defense against security attacks is a challenging task in the wireless sensor network environment. Although significant research effort has been spend on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. The situation is further aggravated as the next generation wireless sensor network will be larger and larger. To face this problem, we propose a secure routing protocol (Ambient Trust Sensor Routing, ATSR) which adopts the geographical routing principle to cope with the network dimensions and relies on a distributed trust model for the detection of malicious nodes. Both direct and indirect trust information is taken into account to evaluate the trustworthiness of each neighbour. An important feature of the proposed routing solution is that it takes into account the remaining energy of each neighbour, thus allowing for better load balancing and network lifetime extension. Based on computer simulation results we evaluate the additional energy consumption caused by the exchange of indirect trust information and the benefits stemming from the adoption of our algorithm
A Trust-Based Scheme for Increasing Security in Wireless Sensor Networks
Majlesi Journal of electrical engineering, 2017
Security is considered to be one of the most important challenges in wireless sensor networks (WSNs). Due to inherent resource constraints in WSNs, traditional security mechanisms may not be used in these networks. In recent years, trust and reputation management in distributed systems has been proposed as a novel and accurate way for handling security deficiencies. Such deficiencies are deemed to be inherent in WSNs. Detecting malicious nodes is an important role of Trust models in WSNs. In line with reducing the above-mentioned deficiencies, this paper proposes a trust-based scheme for increasing security (TSIS) model for WSNs. The proposed trust-based scheme divides the network to several clusters. Inside each cluster, a special node named supervisor node is responsible for calculating the trusted values of other nodes. When supervisor nodes calculate trust value of other nodes within a cluster, they do not distribute these values. The receiver node requests the sender node authentication from its own supervisor node. The proposed method was simulated in the NS-2 environment. The simulation results indicate that the proposed method has improved energy efficiency and packet delivery rate. Hence, it has better performance than the earlier works with respect to the above-mentioned parameters.
A Survey on Trust Based Mechanism in Wireless Sensor Network
WSNs are important to enemies and they get to be powerless to a few sorts of assaults since they are sent in open and unprotected situations. Because of the constrained assets of WSNs, it is trying to consolidate essential security components, for example, verification, key conveyance and protection in WSNs. In any case, trust administration that models the trust on the conduct of components of the system, can be particularly helpful for a sensor system environment to improve security. Trust administration plots that are focused at sensor systems should be lightweight regarding computational and correspondence prerequisites, yet effective as far as adaptability in overseeing trust between hubs of heterogeneous sending. This paper reviews different trust administration plans proposed for remote sensor system.
Energy-Efficient Trust and Quarantine-Based Secure Data Transmission in Wireless Sensor Networks
International Journal of Computer Networks and Applications (IJCNA), 2023
Wireless Sensor Networks (WSN) are comprised of a significant amount of sensors that are dispersed to acquire data regarding a certain region. The sensor nodes are self-contained and create an ad-hoc inter-communication topology with one another. On the other hand, sensors are limited by their limited resources for managing energy, storing data, communication, and computing power. The hacked nodes make the information more susceptible to security issues. The safety of an unreliable network is a source of concern for researchers. To reduce energy consumption and provide secure communication this research work aims to present an energy-efficient secure data transmission system for WSNs that use the trust concept to detect and prevent data compromise while providing high performance. The proposed method comprises two main steps: First, it presents a new data security scheme that includes data confidentiality and integrity. Second, use the trust concept for analyzing the quality of data links for secure transmission and quarantine nodes and edges based on the trust value. The outcomes of the simulation showed that the suggested protocol increases the effectiveness of network lifetime and energy usage.
Threats and Security using Trust Techniques in Wireless Sensor Networks
Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don't need human interference for its working so they can place where human cannot reach easily. As sensor nodes are placed in an open and insecure environment, they are prone to security attacks by adversaries. So, the security is an impo rtant issue in sensor networks. Traditional security mechanisms like cryptography, intruder detection, routing protocols were implemented to provide security in wireless sensor networks. These mechanisms are capable to detect and remove internal attacks but fail to detect compromised nodes in a network. Compromised node exposes all secrets of network to the adversary which in turn put all existing mechanisms at risk. To overcome this problem various trust and reputation mechanisms have been proposed. Trust can be calculated in two ways. First, it can directly calculate with the past behavior of nodes. Secondly, it can be indirectly combined with the reputation of a node from the recommenders. Recommenders are neighbors of a node. In this paper, various security threats to the network, traditional security techniques, and various reputation and trust mechanisms h ave been discussed.
Trust framework for a secured routing in wireless sensor network
Electronic Journal of Information Technology, 2015
Traditional techniques to eliminate insider attacks developed for wired and wireless ad hoc networks are not well suited for wireless sensors networks due to their resource constraints nature. In order to protect WSNs against malicious and selfish behavior, some trust-based systems have recently been modeled. The resource efficiency and dependability of a trust system are the most fundamental requirements for any wireless sensor network (WSN). In this paper, we propose a Trust Framework for a Secured Routing in Wireless Sensor Network (TSR) scheme, which works with clustered networks. This approach can effectively reduce the cost of trust evaluation and guarantee a better selection of safest paths that lead to the base station. Theoretical as well as simulation results show that our scheme requires less communication overheads and consumes less energy as compared to the current typical trust systems for WSNs. Moreover, it detects selfish and defective nodes and prevents us of inside...
A Trust Calculation Algorithm for Communicating Nodes in Wireless Sensor Networks
2021
In various areas of the communication system, work based on Wireless Sensor Network (WSN) is being used these days. It is observed that trust-based model for WSN as a controlled secure, confidential and robustness with a consistent communication troubleshoots a lot of problems in delivering. This makes a node in WSN, that is, ready to deal with and act on attacks caused by additional nodes in different communication networks. This is a highly challenging task due to the lack of a trust resource and the dynamics that this network institute brings. In this paper, we propose Trust Calculation Algorithm for communicating nodes in WSN. Trust calculation algorithm provide the trust-based routing table for every node. It serves as an important role in the communication process for nodes from clusters, nodes from nodes and clusters from clusters in WSN.