We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Trustworthy Route formation Algorithm for WSNs

by Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 27 - Number 5
Year of Publication: 2011
Authors: Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar
10.5120/3294-4497

Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar . Trustworthy Route formation Algorithm for WSNs. International Journal of Computer Applications. 27, 5 ( August 2011), 35-39. DOI=10.5120/3294-4497

@article{ 10.5120/3294-4497,
author = { Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar },
title = { Trustworthy Route formation Algorithm for WSNs },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 27 },
number = { 5 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume27/number5/3294-4497/ },
doi = { 10.5120/3294-4497 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:13:00.995617+05:30
%A Shaik Sahil Babu
%A Arnab Raha
%A Mrinal Kanti Naskar
%T Trustworthy Route formation Algorithm for WSNs
%J International Journal of Computer Applications
%@ 0975-8887
%V 27
%N 5
%P 35-39
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces a new algorithm for the formation of trustworthy route from source node to Base Station (BS) for secure routing of messages in Wireless Sensor Networks (WSNs). This algorithm process the information given by the Trust dependent Link State Routing Protocol which is improved version of our Routing Protocol presented in [1] Direct Trust dependent Link State Routing Protocol based on Geometric Mean (GM) of the QoS characteristics which allows the trusted nodes only to participate in the routing. Execution of this algorithm at any node, gives different trusted routes to the BS with different route trusts by filtering the un-trusted nodes on the basis of trust metrics levels. The source node selects the best trustworthy route among many trusted routes given by the neighbor nodes based on neighbor nodes trust levels and the route trust levels of different routes given by them. The newly formed trustworthy route from source node to BS will be the best trustworthy route without considering the malicious/selfish nodes.

References
  1. Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, “A Direct Trust Dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)”, Scientific Research, an international journal on Wireless Sensor Network, 2011, 3, 125-134. doi:10.4236/wsn.2011.34015.
  2. M. Momani, “Bayesian Methods for Modeling and Management of Trust in Wireless Sensor Networks,” Ph.D. Thesis, University of Technology, Sydney, July, 2008.
  3. Y.C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks”, Proc. Eighth Ann. Int’l Conf. Mobile Computing and Networking (MobiCom), pp. 12-23.
  4. Theodore Zahariadis, Helen C. Leligou, Panagiotis Trakadas and Stamatis Voliotis, “Mobile Networks Trust Management in Wireless Sensor Networks”, European Transactions on Telecommunications, 2010; 21:386-395.
  5. Xiaoqi Li, Lyu, M.R., Jiangchuan Liu, “A Trust Model Based Routing Protocol for Secure Ad-hoc Networks”, IEEE Proceedings on Aerospace Conference, 2004, vol. 2.
  6. Asad Amir Pirzada and Chris McDonald, “Trusted Greedy Perimeter Stateless Routing”, IEEE, ICON 2007.
  7. Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victorwen and David E. Culler, “SPINS: Security Protocols for Sensor Networks”, ACM Journal of Wireless Networks, 8:5, September 2002, pp. 521 – 534.
  8. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad-hoc Networks”, in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), ACM Press, 2000, pp. 255 – 265.
  9. S. Buchegger and J. Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes – Fairness In Distributed Ad-hoc Networks”, in proceedings of the 3rd ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc), ACM Press, 2002, pp. 226-236.
  10. Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy, “Location-centric Isolation of Misbehavior and Trust routing in Energy-constrained Sensor Networks”, IEEE International Conference on Performance, Computing and communications, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) Geometric Mean (GM) Trust Metrics Base Station (BS)