CFP last date
20 January 2025
Reseach Article

Implementing Truthful Routing Path Generation in WSN through TARF

by Premakshi B. Dohe, Rajesh Shukla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 99 - Number 15
Year of Publication: 2014
Authors: Premakshi B. Dohe, Rajesh Shukla
10.5120/17453-8416

Premakshi B. Dohe, Rajesh Shukla . Implementing Truthful Routing Path Generation in WSN through TARF. International Journal of Computer Applications. 99, 15 ( August 2014), 51-58. DOI=10.5120/17453-8416

@article{ 10.5120/17453-8416,
author = { Premakshi B. Dohe, Rajesh Shukla },
title = { Implementing Truthful Routing Path Generation in WSN through TARF },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 99 },
number = { 15 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 51-58 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume99/number15/17453-8416/ },
doi = { 10.5120/17453-8416 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:28:20.067728+05:30
%A Premakshi B. Dohe
%A Rajesh Shukla
%T Implementing Truthful Routing Path Generation in WSN through TARF
%J International Journal of Computer Applications
%@ 0975-8887
%V 99
%N 15
%P 51-58
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless device networks are susceptible to a good set of security attacks, together with those targeting the routing protocol practicality. The multi-hop routing in wireless device networks (WSNs) offers very little protection against identity deception through replaying routing data. Associate in Nursing opposer will exploit this defect to launch numerous harmful or perhaps devastating attacks against the routing protocols, together with sink attacks, hollow attacks and Sybil attacks. To face this downside, we tend to propose a truthful routing protocol that adopts the routing principle to address the network dimensions, and depends on a distributed trust model for the detection and dodging of malicious neighbors. true is any aggravated by mobile and harsh network conditions. ancient cryptographical techniques or efforts at developing trust-aware routing protocols don't effectively address this severe downside. Further, we've enforced allow-overhead TARF module in TinyOS; as incontestable , this implementation may be incorporated into existing routing protocols with the smallest amount effort. supported TARF, we tend to additionally incontestable a proof-of-concept mobile target detection application that functions well against Associate in Nursing anti-detection mechanism. To secure the WSNs against adversaries misdirecting the multi-hop routing, we've designed and enforced TARF, a strong trust-aware routing framework for dynamic WSNs.

References
  1. J. Newsome, E. Shi, D. Song, and A. Perrig, Apr 2004 "The sybil attack in sensor networks: Analysis and defenses," in Proc. of the 3rdInternational Conference on Information Processing in Sensor Networks (IPSN'04).
  2. L. Bai, F. Ferrese, K. Ploskina, and S. Biswas,2009 "Performance analysis of mobile agent-based wireless sensor network," 8th International Conference on Reliability, Maintainability andSafety (ICRMS 2009), pp. 16 –19.
  3. L. Zhang, Q. Wang, and X. Shu, 5-7 2009 "A mobile-agent-based middleware for wireless sensor networks data fusion," Instrumentation and Measurement Technology Conference (I2MTC'09), pp. 378 –383.
  4. W. Xue, J. Aiguo, and W. Sheng,12-14 2005 "Mobile agent based moving target methods in wireless sensor networks," , IEEE International Symposium on Communications and Information Technology (ISCIT2005), vol. 1, pp. 22 – 26.
  5. J. Hee-Jin, N. Choon-Sung, J. Yi-Seok, and S. Dong-Ryeol,2008 "Amobile agent based leach in wireless sensor networks," 10th International Conference on Advanced CommunicationTechnology (ICACT 2008), vol. 1, 17-20 , pp. 75 –78.
  6. J. Al-Karaki and A. Kamal,Dec 2004 "Routing techniques in wireless sensornetworks: a survey," Wireless Communications, vol. 11, no. 6, pp. 6–28.
  7. G. Zhan, W. Shi, and J. Deng, 2010"TARF: A trust-aware routing framework for wireless sensor networks," 7th European Conference on Wireless Sensor Networks (EWSN'10).
  8. F. Zhao and L. Guibas, "Wireless Sensor Networks: An Information Processing Approach"2004, Morgan Kaufmann Publishers.
  9. A. Wood and J. Stankovic,Oct 2002 "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54–62.
  10. C. Karlof and D. Wagner,2003 "Secure routing in wireless sensor networks: attacks and countermeasures" 1st IEEE International Workshop on Sensor Network Protocols and Applications.
  11. M. Jain and H. Kandwal,2009 "A survey on complex wormhole attack in wireless ad hoc networks," International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT '09), pp. 555 –558.
  12. I. Krontiris, T. Giannetsos, and T. Dimitriou, "Launching a sinkhole attack in wireless sensor networks; the intruder side," IEEE International Conference on Wireless and Mobile Computing, Network.
Index Terms

Computer Science
Information Sciences

Keywords

control overhead dropping ratio delay energy efficient routing jitter secure routing sensor energy simulation throughput trust-aware routing WSN