SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5428
RELIABLE DATA TRANSMISSION IN WIRELESS NETWORK USING
SECURE TRUST BASED ROUTING
Ms.M.Krishnaveni1 , Dr.G.Selvakumar2, Ms.S.Aruna Devi3
1P.G. Scholar Department of ECE, Muthayammal Engineering College, Tamilnadu, India.
2Professor, Department of ECE, Muthayammal Engineering College, Tamilnadu, India.
3Assistant Professor, Department of ECE, Muthayammal Engineering College, Tamilnadu,India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless networks are vulnerable to various
network attacks. To cope with these security issues, trust-
based routing schemes have emerged. Typically, trust
routing schemes are mainly focused on detection of packet
drop attacks, because this type of an attack is simple and
obviously a malicious behavior. However, there are more
advanced attacks, such as, false trust reporting or
compromised attacks, where trust-based routing to defend
these attacks is more difficult because of their ambiguous
behavior. In order to ensure data transmission reliability
even against such attacks, in this letter a Authenticated
Anonymous secure routing scheme is proposed for wireless
networks. Simulation results show that the AASR scheme
provides a better performance compared to the ATR and
SPR schemes. To protect these networks, security protocols
have been developed to protect routing and application
data. However, these protocols only protect routes or
communication, not both. Both secure routing and
communication security protocols must be implemented to
provide full protection.
Key Words: Trust Based Routing, Wireless Sensor
Networks, Secure Path Routing, Security Protocols,
Authenticated Anonymous Secure Routing.
1. INTRODUCTION
Wireless sensor networks (WSN) are collection of
nodes where each node has its own sensor,
processor, Transmitter and receiver. The sensors are
low cost devices that perform a specific type of
sensing event. Being of low cost such sensors are
deployed densely throughout the area to monitor
specific event. WSN are highly distributed networks
of small lightweight wireless nodes. Sensor nodes are
called as motes. It monitors the environment or
system by measuring physical parameters such as
temperature, pressure, humidity etc. Sensor
networks are widely applied in various filed such as
environment monitoring, military applications,
health care and home intelligence. The major issue in
WSN is security requirements. One of the main issues
is secure routing. Because of the wireless nature
routing has to be done in secure way to avoid the
information loss, and various attacks.
1.1 Related Work
conventional trust based routing schemes are
focused on being adaptive to packet drop attacks,
where these schemes are commonly based on
distributed trust routing structures and are highly
vulnerable to compromised attacks (e.g., good or
bad-mouthing attacks) because they do not have any
means to distinguish false trust information.
Meanwhile, the trust evaluation scheme GlobalTrust
was proposed to detect various network attacks
accurately, which shows a high performance in
malicious node detection. In this scheme, trust
information of all nodes in the network are collected
by the Trust Authority (TA), and the TA computes the
global view based on the reputation of each node.
However, this scheme deals only with the trust
calculation of the nodes, and does not deal with
routing metrics or methods. Therefore, in this letter a
centralized trust-based secure routing (CSR) scheme
is proposed that enables secure routing based on
routing path selection that avoids malicious node
selections to maximize the paths trust level while
supporting the required quality of service (QoS).
The pathradar is the component used for reputation
Ratings are kept about every node in the network
based on its routing activity and they are updated
periodically. Node select routes with the highest
average node rating. Thus, nodes can avoid
misbehaving nodes in their routes as a response. The
pathradar combines knowledge of misbehaving
nodes with link reliability data to select the route
most likely to be reliable. Specifically, each node
maintains a rating for every other node it knows
about in the network and calculates a path metric by
averaging the node ratings in the path, enabling thus
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5429
the selection of the shortest path in case reliability
information is unavailable. Negative path values
indicate the existence of one or more misbehaving
nodes in the path. If a node is marked as misbehaving
due to temporary malfunction or incorrect
accusation, a second –chance mechanism is
considered, by slowly increasing the ratings of nodes
that have negative values or setting them to anon-
negative values after a long-timeout. However,
misbehaving nodes still transmit their packets as
there is no punishment mechanism adopted here.
Moreover, no second hand information propagation
view is considered which limits the cooperativeness
among nodes.
Figure 1.1 Finding Trust Node
2. EXISTING SYSTEM
The existing systems are available for trust node
identification and secure routing are discussed. It
discuss with the different techniques to identify the
malicious node, and energy efficiency, overhead and
security features. That works didn’t completely
provide security features, energy efficient, less
overhead. And also they dint deals with routing
scheme. Wireless networks are vulnerable to various
network attacks.
To cope with these security issues, trust-based
routing schemes have emerged. Typically, trust
routing schemes are mainly focused on detection of
packet drop attacks, because this type of an attack is
simple and obviously a malicious behavior. However,
there are more advanced attacks, such as, false trust
reporting or compromised attacks, where trust-
based routing to defend these attacks is more
difficult because of their ambiguous behavior.
2.1 Drawbacks
 ATR performance degradation occurs when
the routing path’s hop count is large.
 SPR shows the weakest performance among
the three because most routes are blocked by
malicious nodes.
 trust-based routing to defend these attacks is
more difficult because of their ambiguous
behavior.
3. PROPOSED SYSTEM
In order to ensure data transmission reliability even
against such attacks, in this letter a centralized trust
based secure routing scheme is proposed for
wireless networks. AASR improves the routing
performance by avoiding malicious nodes and
effectively isolating false trust information offered by
malicious nodes through a weight function. In
addition, AASR considers nodal trust as well as
directional trust to formulate a more reliable routing
path.
A trust aware routing protocol is a routing protocol
in which a node incorporates in the routing decision
its opinion about the behaviour of a candidate router.
This opinion is quantified and called trust metric.
Trust metric should reflect how much a router is
expected to behave, for example, forward a packet
when it receives it from a previous node. Obtaining
the trust metric is a problem by itself since it
requires several operational tasks on observing
nodes behaviour, exchanging nodes experience as
well as modelling the acquired observations and
exchanged knowledge to reflect nodes trust values.
Trust aware routing in WSN is important for both
securing obtained information as well as protecting
the network performance from degradation and
network resources from un reasonable consumption.
Most WSN applications carry and deliver very critical
and secret information like military and health
application. A WSN network infected by misbehaving
nodes can misroute packets to wrong destinations
leading to misinformation or do not forward packets
to their destination leading to loss information .Such
application can be very sensitive to these attacks.
Having a trust aware routing protocol can protect
data exchange, secure information delivery and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5430
maintain and protect the value of the communicated
information.
Node misbehaviour can cause performance
degradation as well. For example, non-forwarding
attacks decrease the system throughput since
packets will be retransmitted many times and they
are not delivered. An infected WSN network can be
partitioned into different parts that cannot
communicate among each other due to non-
forwarding attacks. This leads to the demand
increasing the number of sensors or changing the
node deployment to the demand of increasing the
number of sensors changing the node deployment to
return network connectivity.
This is very expensive however, can be avoided if a
good secure routing solution is adopted. A trust
aware routing framework for WSNs called sTARF to
secure multi-hop routing in WSNs against intruders
exploiting the replay of routing information. This
approach identifies malicious nodes that misuse
“stolen” identities to misdirect packets by their low
trustworthiness, thus helping nodes circumvent
those attackers in their routing paths. It incorporates
the trustworthiness of nodes into routing decisions
allows a node to circumvent an adversary
misdirecting considerable traffic with a forged
identity attained through replaying. It significantly
reduces negative impacts from these attackers.
Advantages:
 improves the routing performance
 avoiding malicious nodes
 effectively isolating false trust information
offered by malicious nodes through a weight
function
 Directional trust to formulate a more reliable
routing path.
3.1 Modules:
1. Topology formation
2. Public Key & Session Key Distribution
3. AASR with Onion Routing
4. AASR Routing with Onion Routing & Trust
1. Topology Formation:
Constructing Project design in NS2 should takes
place. Each node should send hello packets to its
neighbour node which are in its communication
range to update their topology.
2. Public Key & Session Key Distribution:
The key server is deployed. The predefined private
keys are generated by the key server and the keys
are distributed through the network between the
wireless nodes.
3. Onion Routing:
It is a mechanism to provide private communications
over a public network. The source node sets up the
core of an onion with a specific route message.
During a route request phase, each forwarding node
adds an encrypted layer to the route request
message. The source and destination nodes do not
necessarily know the ID of a forwarding node.
The destination node receives the onion and delivers
it along the route back to the source. The
intermediate node can verify its role by decrypting
and deleting the outer layer of the onion. Eventually
an anonymous route can be established.
4. AASR Routing & Trust Model:
• By using Trust model in authenticated
anonymous secure routing (AASR), Data will
be transmitted using Trusted Nodes.
• Untrusted nodes will not be considered
during routing. This will reduce the delay
occurred during RREQ and RREP phase of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5431
AASR and also increase the network
performance.
4. IMPLEMENTATION ENVIRONMENT
Network simulator2 is used as the simulation tool in
this project. NS was chosen as the simulator because
it has an open source code that can be modified and
extended.
Network simulator (NS) is an object–oriented,
discrete event simulator for networking research. NS
provides substantial support for simulation of TCP,
routing and multicast protocols over wired and
wireless networks. The simulator is a result of an
ongoing effort of research and developed. Even
though there is a considerable confidence in NS, it is
not a polished product yet and bugs are being
discovered and corrected continuously.
5. CONCLUSIONS
In this letter, the CSR centralized trust-based routing
scheme has been proposed to enhance reliable data
transmission over networks that experience
advanced attacks. CSR improves the routing
performance by avoiding malicious nodes and
effectively isolating false trust information offered by
malicious nodes through a weight function.
In addition, CSR considers nodal trust as well as
directional trust to formulate a more reliable routing
path. Simulation results show that the CSR scheme
provides an enhanced data routing performance for
the range of interest compared to the ATR and SPR
schemes in BHA and CBA attack scenarios.
REFERENCES
[1] S. Li, L. D. Xu, and S. Zhao, “The Internet of Things: A
survey,” Inf. Syst. Frontiers, vol. 17, no. 2, pp. 243-259, Apr.
2015.
[2] J.-H. Cho, A. Swami, and I.-R Chen, “A Survey on Trust
Management for Mobile Ad Hoc Networks,” IEEE Commun.
Surv. Tutor, vol. 14, no. 4, pp. 562-583, 2011.
[3] G. Zhan, W. Shi, and J. Deng, “Design and
implementation of TARF: A trust-aware routing
framework for WSNs,” IEEE Trans. Dependable Secure
Comput., vol. 9, no. 2, pp. 184-197, Mar./Apr. 2012.
[4] A. Ahmed, K. A. Bakar, M. I. Channa, K. Haseeb, and A.
W. Khan, “TERP: A Trust and Energy Aware Routing
Protocol for Wireless Sensor Network,” IEEE Sensors J. vol.
15, no. 12, pp. 6962-6972, Dec. 2015.
[5] Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: Secure
and Trustable Routing in Wireless Sensor Networks,” IEEE
Trans. Inf. Forensics Security., vol. 11, no. 9, pp. 2013-
2027, Sep. 2016.
[6] X. Chen, J.-H Cho, and S. Zhu, “GlobalTrust: An Attack-
Resilient Reputation System for Tactical Networks,” in
Proc. IEEE SECON 2014. Singapore, 2014, pp. 275-283.
[7] T. Shu, M. Krunz, and S. Liu, “Secure data collection in
wireless sensor networks using randomized dispersive
routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941-
954, Jul. 2010.
[8] M. Kurt and S. Peter, Algorithms and Data Structures:
The Basic Toolbox. Springer, 2008. pp. 198-199. [5] T. Shu,
M. Krunz, and S. Liu, “Secure data collection in wireless
sensor networks using randomized dispersive routes,”
IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941-954, Jul.
2010.
[9] S. Zhu and Z. Ding, “Distributed cooperative
localization of wireless sensor networks with convex
hull constraint,” IEEE Transactions on Wireless
Communications, vol. 10, no. 7, pp. 2150–2161, 2011
[10] S. Seo, J.-W. Kim, J.-D. Kim, and J.-M. Chung,
“Reconfiguration time and complexity minimized trust-
based clustering scheme for MANETs,” EURASIP J Wirel
Commun Netw, vol. 1, no. 155, pp. 1-7, 2017.

More Related Content

What's hot

IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data TransmissionIRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data TransmissionIRJET Journal
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET Journal
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDr.Irshad Ahmed Sumra
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksIAEME Publication
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
 

What's hot (17)

Bi33349355
Bi33349355Bi33349355
Bi33349355
 
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data TransmissionIRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data Transmission
 
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
IRJET- Ideal Security Preserving Probabilistic Direction Finding for Wireless...
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networks
 
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYMOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY
 

Similar to IRJET- Reliable Data Transmission in Wireless Network using Secure Trust based Routing

Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Editor IJARCET
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 

Similar to IRJET- Reliable Data Transmission in Wireless Network using Secure Trust based Routing (20)

Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
[IJET-V2I2P1] Authors:Aravindan B1, Dhivakar A2, Shreehari V.V.
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
 
A017320105
A017320105A017320105
A017320105
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

IRJET- Reliable Data Transmission in Wireless Network using Secure Trust based Routing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5428 RELIABLE DATA TRANSMISSION IN WIRELESS NETWORK USING SECURE TRUST BASED ROUTING Ms.M.Krishnaveni1 , Dr.G.Selvakumar2, Ms.S.Aruna Devi3 1P.G. Scholar Department of ECE, Muthayammal Engineering College, Tamilnadu, India. 2Professor, Department of ECE, Muthayammal Engineering College, Tamilnadu, India. 3Assistant Professor, Department of ECE, Muthayammal Engineering College, Tamilnadu,India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Wireless networks are vulnerable to various network attacks. To cope with these security issues, trust- based routing schemes have emerged. Typically, trust routing schemes are mainly focused on detection of packet drop attacks, because this type of an attack is simple and obviously a malicious behavior. However, there are more advanced attacks, such as, false trust reporting or compromised attacks, where trust-based routing to defend these attacks is more difficult because of their ambiguous behavior. In order to ensure data transmission reliability even against such attacks, in this letter a Authenticated Anonymous secure routing scheme is proposed for wireless networks. Simulation results show that the AASR scheme provides a better performance compared to the ATR and SPR schemes. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect routes or communication, not both. Both secure routing and communication security protocols must be implemented to provide full protection. Key Words: Trust Based Routing, Wireless Sensor Networks, Secure Path Routing, Security Protocols, Authenticated Anonymous Secure Routing. 1. INTRODUCTION Wireless sensor networks (WSN) are collection of nodes where each node has its own sensor, processor, Transmitter and receiver. The sensors are low cost devices that perform a specific type of sensing event. Being of low cost such sensors are deployed densely throughout the area to monitor specific event. WSN are highly distributed networks of small lightweight wireless nodes. Sensor nodes are called as motes. It monitors the environment or system by measuring physical parameters such as temperature, pressure, humidity etc. Sensor networks are widely applied in various filed such as environment monitoring, military applications, health care and home intelligence. The major issue in WSN is security requirements. One of the main issues is secure routing. Because of the wireless nature routing has to be done in secure way to avoid the information loss, and various attacks. 1.1 Related Work conventional trust based routing schemes are focused on being adaptive to packet drop attacks, where these schemes are commonly based on distributed trust routing structures and are highly vulnerable to compromised attacks (e.g., good or bad-mouthing attacks) because they do not have any means to distinguish false trust information. Meanwhile, the trust evaluation scheme GlobalTrust was proposed to detect various network attacks accurately, which shows a high performance in malicious node detection. In this scheme, trust information of all nodes in the network are collected by the Trust Authority (TA), and the TA computes the global view based on the reputation of each node. However, this scheme deals only with the trust calculation of the nodes, and does not deal with routing metrics or methods. Therefore, in this letter a centralized trust-based secure routing (CSR) scheme is proposed that enables secure routing based on routing path selection that avoids malicious node selections to maximize the paths trust level while supporting the required quality of service (QoS). The pathradar is the component used for reputation Ratings are kept about every node in the network based on its routing activity and they are updated periodically. Node select routes with the highest average node rating. Thus, nodes can avoid misbehaving nodes in their routes as a response. The pathradar combines knowledge of misbehaving nodes with link reliability data to select the route most likely to be reliable. Specifically, each node maintains a rating for every other node it knows about in the network and calculates a path metric by averaging the node ratings in the path, enabling thus
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5429 the selection of the shortest path in case reliability information is unavailable. Negative path values indicate the existence of one or more misbehaving nodes in the path. If a node is marked as misbehaving due to temporary malfunction or incorrect accusation, a second –chance mechanism is considered, by slowly increasing the ratings of nodes that have negative values or setting them to anon- negative values after a long-timeout. However, misbehaving nodes still transmit their packets as there is no punishment mechanism adopted here. Moreover, no second hand information propagation view is considered which limits the cooperativeness among nodes. Figure 1.1 Finding Trust Node 2. EXISTING SYSTEM The existing systems are available for trust node identification and secure routing are discussed. It discuss with the different techniques to identify the malicious node, and energy efficiency, overhead and security features. That works didn’t completely provide security features, energy efficient, less overhead. And also they dint deals with routing scheme. Wireless networks are vulnerable to various network attacks. To cope with these security issues, trust-based routing schemes have emerged. Typically, trust routing schemes are mainly focused on detection of packet drop attacks, because this type of an attack is simple and obviously a malicious behavior. However, there are more advanced attacks, such as, false trust reporting or compromised attacks, where trust- based routing to defend these attacks is more difficult because of their ambiguous behavior. 2.1 Drawbacks  ATR performance degradation occurs when the routing path’s hop count is large.  SPR shows the weakest performance among the three because most routes are blocked by malicious nodes.  trust-based routing to defend these attacks is more difficult because of their ambiguous behavior. 3. PROPOSED SYSTEM In order to ensure data transmission reliability even against such attacks, in this letter a centralized trust based secure routing scheme is proposed for wireless networks. AASR improves the routing performance by avoiding malicious nodes and effectively isolating false trust information offered by malicious nodes through a weight function. In addition, AASR considers nodal trust as well as directional trust to formulate a more reliable routing path. A trust aware routing protocol is a routing protocol in which a node incorporates in the routing decision its opinion about the behaviour of a candidate router. This opinion is quantified and called trust metric. Trust metric should reflect how much a router is expected to behave, for example, forward a packet when it receives it from a previous node. Obtaining the trust metric is a problem by itself since it requires several operational tasks on observing nodes behaviour, exchanging nodes experience as well as modelling the acquired observations and exchanged knowledge to reflect nodes trust values. Trust aware routing in WSN is important for both securing obtained information as well as protecting the network performance from degradation and network resources from un reasonable consumption. Most WSN applications carry and deliver very critical and secret information like military and health application. A WSN network infected by misbehaving nodes can misroute packets to wrong destinations leading to misinformation or do not forward packets to their destination leading to loss information .Such application can be very sensitive to these attacks. Having a trust aware routing protocol can protect data exchange, secure information delivery and
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5430 maintain and protect the value of the communicated information. Node misbehaviour can cause performance degradation as well. For example, non-forwarding attacks decrease the system throughput since packets will be retransmitted many times and they are not delivered. An infected WSN network can be partitioned into different parts that cannot communicate among each other due to non- forwarding attacks. This leads to the demand increasing the number of sensors or changing the node deployment to the demand of increasing the number of sensors changing the node deployment to return network connectivity. This is very expensive however, can be avoided if a good secure routing solution is adopted. A trust aware routing framework for WSNs called sTARF to secure multi-hop routing in WSNs against intruders exploiting the replay of routing information. This approach identifies malicious nodes that misuse “stolen” identities to misdirect packets by their low trustworthiness, thus helping nodes circumvent those attackers in their routing paths. It incorporates the trustworthiness of nodes into routing decisions allows a node to circumvent an adversary misdirecting considerable traffic with a forged identity attained through replaying. It significantly reduces negative impacts from these attackers. Advantages:  improves the routing performance  avoiding malicious nodes  effectively isolating false trust information offered by malicious nodes through a weight function  Directional trust to formulate a more reliable routing path. 3.1 Modules: 1. Topology formation 2. Public Key & Session Key Distribution 3. AASR with Onion Routing 4. AASR Routing with Onion Routing & Trust 1. Topology Formation: Constructing Project design in NS2 should takes place. Each node should send hello packets to its neighbour node which are in its communication range to update their topology. 2. Public Key & Session Key Distribution: The key server is deployed. The predefined private keys are generated by the key server and the keys are distributed through the network between the wireless nodes. 3. Onion Routing: It is a mechanism to provide private communications over a public network. The source node sets up the core of an onion with a specific route message. During a route request phase, each forwarding node adds an encrypted layer to the route request message. The source and destination nodes do not necessarily know the ID of a forwarding node. The destination node receives the onion and delivers it along the route back to the source. The intermediate node can verify its role by decrypting and deleting the outer layer of the onion. Eventually an anonymous route can be established. 4. AASR Routing & Trust Model: • By using Trust model in authenticated anonymous secure routing (AASR), Data will be transmitted using Trusted Nodes. • Untrusted nodes will not be considered during routing. This will reduce the delay occurred during RREQ and RREP phase of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5431 AASR and also increase the network performance. 4. IMPLEMENTATION ENVIRONMENT Network simulator2 is used as the simulation tool in this project. NS was chosen as the simulator because it has an open source code that can be modified and extended. Network simulator (NS) is an object–oriented, discrete event simulator for networking research. NS provides substantial support for simulation of TCP, routing and multicast protocols over wired and wireless networks. The simulator is a result of an ongoing effort of research and developed. Even though there is a considerable confidence in NS, it is not a polished product yet and bugs are being discovered and corrected continuously. 5. CONCLUSIONS In this letter, the CSR centralized trust-based routing scheme has been proposed to enhance reliable data transmission over networks that experience advanced attacks. CSR improves the routing performance by avoiding malicious nodes and effectively isolating false trust information offered by malicious nodes through a weight function. In addition, CSR considers nodal trust as well as directional trust to formulate a more reliable routing path. Simulation results show that the CSR scheme provides an enhanced data routing performance for the range of interest compared to the ATR and SPR schemes in BHA and CBA attack scenarios. REFERENCES [1] S. Li, L. D. Xu, and S. Zhao, “The Internet of Things: A survey,” Inf. Syst. Frontiers, vol. 17, no. 2, pp. 243-259, Apr. 2015. [2] J.-H. Cho, A. Swami, and I.-R Chen, “A Survey on Trust Management for Mobile Ad Hoc Networks,” IEEE Commun. Surv. Tutor, vol. 14, no. 4, pp. 562-583, 2011. [3] G. Zhan, W. Shi, and J. Deng, “Design and implementation of TARF: A trust-aware routing framework for WSNs,” IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 184-197, Mar./Apr. 2012. [4] A. Ahmed, K. A. Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, “TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network,” IEEE Sensors J. vol. 15, no. 12, pp. 6962-6972, Dec. 2015. [5] Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks,” IEEE Trans. Inf. Forensics Security., vol. 11, no. 9, pp. 2013- 2027, Sep. 2016. [6] X. Chen, J.-H Cho, and S. Zhu, “GlobalTrust: An Attack- Resilient Reputation System for Tactical Networks,” in Proc. IEEE SECON 2014. Singapore, 2014, pp. 275-283. [7] T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941- 954, Jul. 2010. [8] M. Kurt and S. Peter, Algorithms and Data Structures: The Basic Toolbox. Springer, 2008. pp. 198-199. [5] T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941-954, Jul. 2010. [9] S. Zhu and Z. Ding, “Distributed cooperative localization of wireless sensor networks with convex hull constraint,” IEEE Transactions on Wireless Communications, vol. 10, no. 7, pp. 2150–2161, 2011 [10] S. Seo, J.-W. Kim, J.-D. Kim, and J.-M. Chung, “Reconfiguration time and complexity minimized trust- based clustering scheme for MANETs,” EURASIP J Wirel Commun Netw, vol. 1, no. 155, pp. 1-7, 2017.