CFP last date
20 January 2025
Reseach Article

An Improved Trustable Routing and Security in Wireless Sensor Network

by Manjeeta Damahe, Pankaj Soni, Manish Gurjar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 2
Year of Publication: 2017
Authors: Manjeeta Damahe, Pankaj Soni, Manish Gurjar
10.5120/ijca2017915498

Manjeeta Damahe, Pankaj Soni, Manish Gurjar . An Improved Trustable Routing and Security in Wireless Sensor Network. International Journal of Computer Applications. 175, 2 ( Oct 2017), 41-45. DOI=10.5120/ijca2017915498

@article{ 10.5120/ijca2017915498,
author = { Manjeeta Damahe, Pankaj Soni, Manish Gurjar },
title = { An Improved Trustable Routing and Security in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 175 },
number = { 2 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 41-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number2/28464-2017915498/ },
doi = { 10.5120/ijca2017915498 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:24:01.479323+05:30
%A Manjeeta Damahe
%A Pankaj Soni
%A Manish Gurjar
%T An Improved Trustable Routing and Security in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 2
%P 41-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks establish a specific type of wireless data communication networks. WSNs have acknowledged remarkable deliberation in current years due to probable applications in armed sensing, fitness care, wildlife tracking, traffic investigation, building constructions monitoring, atmosphere monitoring etc. The central of trust route deceits in gaining trust. Conversely, the present-day trust-based route approaches have some challenging concerns. Finding the trust of a sensor node is most difficult, and just how it can be completed is still uncertain. Routing rules of wireless sensor network naturally adjust themselves with the current environments which may vary with high mobility to low mobility in extremes along with high bandwidth. Detection of malicious node and information safety in a wireless sensor network is an essential work in any sensor network. To achieve availability, integrity and reliability routing rules should be robust against malevolent attacks. We proposed a secure trust value which helps authenticate the sensor node and similarly preserve and safe the sensor network from malicious nodes. We also proposed a novel approach to detect the black hole attack and also keep safe the network from malicious nodes. The network lifetime will improve and energy consumption reduced. Experimental outcomes demonstrate that our scheme is good for wireless sensor network security.

References
  1. Yuxin Liu, Mianxiong Dong, Kaoru Ota, and Anfeng Liu, ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks, IEEE Transactions on Information Forensics And Security, Vol. 11, No. 9, pp-2013-2018, September 2016,
  2. M. Dong, K. Ota, A. Liu, and M. Guo, “Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 225–236, Jan. 2016.
  3. X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu, “Service pricing decision in cyber-physical systems: Insights from game theory,” IEEE Trans.ServicesComput., vol. 9, no. 2, pp. 186–198, Mar./Apr. 2016.
  4. A. Liu, M. Dong, K. Ota, and J. Long, “PHACK: An efficient scheme for selective forwarding attack detection in WSNs,” Sensors, vol. 15, no. 12, pp. 30942–30963, 2015.
  5. P. Zhou, S. Jiang, A. Irissappane, J. Zhang, J. Zhou, and J. C. M. Teo, “Toward energy-efficient trust system through watchdog optimization for WSNs,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 613–625, Mar. 2015.
  6. Vittorio P. Illiano and Emil C. Lupu, Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks, IEEE Transactions 0n Network And Service Management, Vol. 12, No. 3, September 2015, pp-496-512
  7. Qiang Ma, Kebin Liu, Zhichao Cao, Tong Zhu, Yunhao Liu, Link Scanner: Faulty Link Detection for Wireless Sensor Networks, IEEE Transactions on Wireless Communications, Vol. 14, pp 4428-4438, Aug 2015
  8. W. Dong, Y. Liu, Y. He, T. Zhu, and C. Chen, “Measurement and analysis on the packet delivery performance in a large-scale sensor network,” IEEE/ACM Trans. Netw., vol. 22, no. 6, pp. 1952–1963, Dec. 2014.
  9. Q. Ma, K. Liu, T. Zhu, W. Gong, and Y. Liu, “BOND: Exploring hidden bottleneck nodes in large-scale wireless sensor networks,” in Proc. IEEE ICDCS, Madrid, Spain, 2014, pp. 399–408.
  10. X. Li, Q. Ma, Z. Cao, K. Liu, and Y. Liu, “Enhancing visibility of network performance in large-scale sensor networks,” in Proc. IEEE ICDCS, Madrid, Spain, 2014, pp. 409–418.
  11. Z. Li, Y. Liu, M. Li, J. Wang, and Z. Cao, “Exploiting ubiquitous data collection for mobile users in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 2, pp. 312–326, Feb. 2013.
  12. Q. Ma, K. Liu, X. Miao, and Y. Liu, “Sherlock is around: Detecting network failures with local evidence fusion,” in Proc. IEEE INFOCOM, Orlando, FL, USA, 2012, pp. 1430–1440.
  13. Y. Liu et al. Does wireless sensor network scale? A measurement study on greenorbs,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 873–881.
  14. H. Zhang, “Experimental analysis of link estimation methods in low power wireless networks,” Tsinghua Sci. Technol., vol. 16, no. 5, pp. 539–552, Oct. 2011.
  15. E. Magistretti, O. Gurewitz, and E. Knightly, “Inferring and mitigating a link’s hindering transmissions in managed 802.11 wireless networks,” in Proc. ACM MobiCom, Chicago, IL, USA, 2010, pp. 305–316.
  16. Y. Liu, K. Liu, and M. Li, “Passive diagnosis for wireless sensor networks,” IEEE/ACM Trans. Netw., vol. 18, no. 4, pp.1132–1144, Aug.2010.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Network Security Trust Value Routing Confidence value.