We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Performance Analysis of Trust Based AODV for Wireless Sensor Networks

by P.Dananjayan, P.Samundiswary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 12
Year of Publication: 2010
Authors: P.Dananjayan, P.Samundiswary
10.5120/879-1250

P.Dananjayan, P.Samundiswary . Performance Analysis of Trust Based AODV for Wireless Sensor Networks. International Journal of Computer Applications. 4, 12 ( August 2010), 6-13. DOI=10.5120/879-1250

@article{ 10.5120/879-1250,
author = { P.Dananjayan, P.Samundiswary },
title = { Performance Analysis of Trust Based AODV for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 4 },
number = { 12 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume4/number12/879-1250/ },
doi = { 10.5120/879-1250 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:52:52.759627+05:30
%A P.Dananjayan
%A P.Samundiswary
%T Performance Analysis of Trust Based AODV for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 4
%N 12
%P 6-13
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recent advances in wireless networks have prompted much research attention in the area of wireless sensor network (WSN). Sensor network consists of hundreds to thousands of low power multifunctioning sensor nodes operating in hostile environment with limited computational and sensing capabilities. These sensor devices are susceptible to various attacks such as selective forwarding or sinkhole attacks when operated in a wireless medium. Reactive routing protocols such as ad-hoc on demand distance vector routing (AODV) of sensor networks have been developed without considering security aspects against these attacks. In this paper, a secure routing protocol named secured ad hoc on demand distance vector routing (S-AODV) is proposed for mobile sensor networks by incorporating trust based mechanism in the existing AODV. Zigbee hardware prototype is also implemented and tested by increasing the sizes of data and distances in indoor and outdoor environment. Simulation results prove that S-AODV outperforms the AODV by reducing the overhead and improving the delivery ratio of the networks.

References
  1. Karlof, C. and Wagner,D. 2003. “Secure routing in wireless sensor networks: attacks & countermeasures”, Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols & Applications, Anchorage, AK, May.
  2. Carter,S. , Yasinac, A. and Hu, Y.C. 2002. “Secure position aided ad-hoc routing protocol”, Proceedings of the IASTED Conference on Communications & Computer Networks (CCN), Cambridge, MA, USA, pp.329-324, November.
  3. Hu,Y.C., Perrig, A. and Johnson,D.B.2002. “Ariadne: A secure on-demand routing protocol for ad-hoc networks”, Proceedings of the Eighth Annual International Conference on Mobile Computing & Networking (MobiCom), Atlanta, Georgia, USA, pp.12-23, September.
  4. Dahill, B., Levine, B.N., Royer, E. and Shields, C.2002. “A secure routing protocol for ad-hoc networks”, Proceedings of the IEEE International Conference on Network Protocols (ICNP), Paris, France, pp.78-87, November.
  5. Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler and Tygar, J.D. 2001. “SPINS: Security Protocols for Sensor Networks”, Proceedings of ACM Annual International Conference on Mobile Computing & Networking, Rome, Italy, July.
  6. Asad Amir Pirzada and Chris Mcdonald. 2004. “Secure pervasive computing without a trusted third party”, Proceedings of the IEEE/AC International Conference on Pervasive Services (ICPS’04),Beirut, Lebanon, July, 2004.
  7. Stallings,W. 2000. Network Security Essentials, Prentice Hall.
  8. Pirzada,A. and McDonald, C. 2005. “Circumventing sinkholes & wormholes in wireless sensor networks”, Proceedings of 2nd IEEE International Conference on Workshop on Wireless Ad-hoc Networking, Columbus, USA, June.
  9. Perkins,C. Royer,E and Das,S. 2003. “Ad hoc on-demand distance vector routing”, RFC-3651, IETF Network Working Group, July.
  10. Asar Ali and Zeeshan Akbar.2009. “ Evaluation of AODV and DSR Routing Protocols of Wireless Sensor Networks for Monitoring Applications, Thesis Report, Department of Electrical engineering with Telecommunication, Blekinge Institute of Technology, October.
  11. Pirzada,A. and Mc. Donald, C.2004. “Establishing trust in pure ad-hoc networks”, Proceedings of 27th Australasian Computer Science Conference(ACSC), Dunedin, New Zealand, vol. 26, no.1, pp.47-54, January.
  12. Kamal Deep Meka, Mohit Virendra and Shambhu Upadhyaya. 2006. “Trust Based Routing Decisions in Mobile Ad-hoc Networks”, Proceedings of 2nd Workshop on Secure Knowledge Management, Brooklyn, New York, September.
  13. Pinedo-Frausto, E.D.2008. “An experimental analysis of ZigBee networks”,Proceedings of 33rd IEEE international conference on Local Computer Networks (LCN), Montreal, Canada, pp.723–729, June.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless sensor networks Secured ad-hoc on demand distance vector routing Sink hole Route trust Node trust