Optimized Energy Efficient Trust Aware System in Wireless Sensor Networks (original) (raw)
Related papers
Performance Analysis of Wireless Sensor Networks Based on Trust Mechanism
International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2021
Due to the characteristics like limited resources and dynamic topology, wireless sensor networks (WSNs) are facing two major problems such as security and energy consumption. To deal with various improper behaviors of nodes the trust-based solutions are possible but still exist a variety of attacks, high energy consumption, and communication congestion between nodes. Therefore, this paper proposes an advanced and efficient trust-based secure and energy-efficient routing protocol (TBSEER) to solve these network problems and to avoid malicious nodes. Efficient Adaptable Ant Colony Optimization Algorithm (EAACO) calculates the comprehensive trust value through adaptive direct trust value, indirect trust value, and energy trust value, which can be resistant to internal network attacks such as sinkhole, black hole, selective forwarding, and hello flood attacks. In addition, to fast identify the malicious nodes in the WSN, the adaptive penalty mechanism and volatilization factor are used. Moreover, the nodes only need to calculate the direct trust value, and the indirect trust value is obtained by the sink, so as to further reduce the energy consumption caused by iterative calculations. To actively avoid network attacks, the cluster heads find the safest multi-hop routes based on the comprehensive trust value. The simulation results show that the proposed EAACO reduces network energy consumption, speeds up the identification of malicious nodes, as well as resists all common attacks.
TRUST EVALUATION BASED SECURITY IN WIRELESS SENSOR NETWORK
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, that has been designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, This project provides trustworthy, time efficient and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both implementation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions.
In WSN, sensor nodes is the centre of interest which report the cognitive process to the sink by sensing the data, and this report will satisfies the report frequency necessary by the sink. Inside the domain of system security, system deciphers the idea of trust as a connection among entities that take part in different conventions. Trust relations are focused around confirmation made by the past connections of substances inside a convention. In wireless sensor network the resource efficiency and reliability of a trust system are the most basic supplies. Due to the low reliability and high overhead the developed existing trust systems for wireless sensor networks are unable of satisfying these supplies. Therefore there is need to propose a lightweight and reliable trust system which can efficiently decrease the networking consumption while malicious and faulty cluster heads and also exceeds the limitations of traditional weighting methods for trust factors in which weights are allocated subjectively and also insist less communication overhead and memory. In contribution if attack is found in CH then cluster members transfer data to the DCN. Also in this system introduced the method DCN share data with the clusters DCN in tree structure. If attack is found in Data Collection Node (DCN) then Base Station recovered the data from other DCN and prevents data loss. Also in proposed system we used ECH algorithm for clustering process. Due to this system can forward data securely and efficiently and improve the accuracy of the network and minimize the data loss.
Two Layers Trust-Based Intrusion Prevention System for Wireless Sensor Networks
2018
Security of a wireless sensor network is aimed at ensuring information confidentiality, authentication, integrity, availability and freshness is an important factor considering the criticality of the information being relayed. Hence, the need for an intrusion detection/prevention system. Conventional intrusion avoidance measures, such as encryption and authentication are not sufficient because they become useless in the event of a sensor node being compromised, hence, can only be seen as a first line of defence in the network after which intrusion detection schemes follow. In this paper, two layers trust-based intrusion detection scheme was developed for wireless sensor networks. A trust-based model is presented to detect intrusions to the network. Scenarios were created by using different set of weights. By injecting 2%, 5% and 10% malicious nodes from the 100 nodes considered, the results obtained were carefully observed. For scenario 2 (S2) with 2% and 5% malicious nodes injected,...
A Trust-based Approach for Secure Packet Transfer in Wireless Sensor Networks
2011
Trust is an important factor in transferring data from the source to destination in wireless sensor networks. If any sensor node fails to transfer the data, the Dynamic Source Protocol calculates the alternate path. Currently, the Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path if the path has a malicious node. Intruder detection system can detect the malicious node. However, intruder detection system is very expensive for wireless sensor networks and there is no guarantee in detecting a malicious node. In the current research, a trust-based approach is recommended to minimize the overheads of intruder detection system and detect the abnormal behavior nodes. The proposed model uses the repeated games to detect faulty (malicious) nodes through the cooperative effort in the sensor network and judges the trust of successive nodes. Further, the research includes the trust model with reliable neighbors and query-based trust calculation. Sim...
Trust Based Multi Attack Intrusion Detection System for Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are vulnerable to a variety of attacks due to the constraint of limited computation power and battery. For the smooth working of network, any anomalous activity should be detected timely so that the impact of attack is minimized. This paper aims to protect sensor network from three attacks that is Hello flood, Wormhole, and Sybil. An intrusion detection system (IDS) based on calculating trust of the neighbouring node is proposed in which each node monitor neighbouring nodes trust level. Neighbouring nodes are declared as trustworthy, risky, or malicious based on these calculated trust values. The IDS based on trust value recommend trustworthy nodes for packet forwarding purposes to the forwarding engine. The simulation results confirm that the proposed IDS successfully detect the three attacks by analyzing the network statistics and malicious node behaviour.
Trust Based Approaches of Intrusion Detection Architecture for Wireless Sensor Networks: A Survey
IJARCCE
Wireless Sensor Networks (WSNs) consists of tiny sensor nodes deployed in various geographic conditions to gather the information about the environment. The Intrusion Detection Architecture (IDA) in Wireless Sensor Network is used to detect various attacks occurring on sensor nodes of WSNs that are placed in various hostile environments. In the last few years, many innovative and efficient approaches have emerged in this area, and we mainly focus our attention on Trust based approaches of Intrusion Detection Architecture. In this article, our focal point of consideration is on Intrusion Detection Architecture for Wireless Sensor Networks. In addition, we present the security attacks and comparison of various Intrusion Detection Architectures.
An energy and trust-aware routing protocol for large wireless sensor networks
2009
Efficient defense against security attacks is a challenging task in the wireless sensor network environment. Although significant research effort has been spend on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. The situation is further aggravated as the next generation wireless sensor network will be larger and larger. To face this problem, we propose a secure routing protocol (Ambient Trust Sensor Routing, ATSR) which adopts the geographical routing principle to cope with the network dimensions and relies on a distributed trust model for the detection of malicious nodes. Both direct and indirect trust information is taken into account to evaluate the trustworthiness of each neighbour. An important feature of the proposed routing solution is that it takes into account the remaining energy of each neighbour, thus allowing for better load balancing and network lifetime extension. Based on computer simulation results we evaluate the additional energy consumption caused by the exchange of indirect trust information and the benefits stemming from the adoption of our algorithm
MALICIOUS NODE DETECTION THROUGH TRUST AWARE ROUTING IN WIRELESS SENSOR NETWORKS
Journal of Theoretical and Applied Information Technology
Wireless sensor network are constituted by a large number of tiny size sensors and distributed randomly for gathering information. These types of networks have remarkable applications and demand worldwide. The wireless sensor network has been suffered with variety of attacks because of its design and deployment nature. The previous traditional approaches including cryptography, authentication cannot work properly against node misbehavior attacks. To solve this problem, we propose a Trust Aware Wireless Routing Protocol (TAWRP) for detection and isolation of malicious nodes in network. The main aim of TAWRP is to establish an optimal route with trusted nodes and effectively forward the packets from source to destination with minimum packet loss. The performance of TAWRP is evaluated in terms of packet delivery ratio and routing overhead. The results clearly showed that TAWRP can achieve high delivery ratio and efficient in routing overhead in the presence of malicious nodes.
Threats and Security using Trust Techniques in Wireless Sensor Networks
Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don't need human interference for its working so they can place where human cannot reach easily. As sensor nodes are placed in an open and insecure environment, they are prone to security attacks by adversaries. So, the security is an impo rtant issue in sensor networks. Traditional security mechanisms like cryptography, intruder detection, routing protocols were implemented to provide security in wireless sensor networks. These mechanisms are capable to detect and remove internal attacks but fail to detect compromised nodes in a network. Compromised node exposes all secrets of network to the adversary which in turn put all existing mechanisms at risk. To overcome this problem various trust and reputation mechanisms have been proposed. Trust can be calculated in two ways. First, it can directly calculate with the past behavior of nodes. Secondly, it can be indirectly combined with the reputation of a node from the recommenders. Recommenders are neighbors of a node. In this paper, various security threats to the network, traditional security techniques, and various reputation and trust mechanisms h ave been discussed.