In Wireless Sensor Networks (WSNs), all the nodes selected for packet routing must be trustworthy, and at the same time energetic too. Smooth conservation of nodes energies and the trust levels, are an important issues in WSN because they directly affects the life span and reliability of the nodes as well as the entire network. The energy utilization at every node must be very smooth and at the same time, packets should be forwarded via trusted nodes only. In this paper, we propose an Energy Efficient Link State Routing Protocol (EELSRP) using the potential nodes selected by applying the fuzzy logic on the trust and residual energy levels. This routing protocol finds the best route by balancing the nodesresidual energies and trust levels, and protects the WSN against routing attacks by eliminating the untrusted nodes before the creation of route.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
Security in mobile adhoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. The major difficulty in adhoc network occurs when a new node join network but not having any trusts relation with other node of network. We have proposed a new mechanism that provides trust conscious and secure data communication between the nodes. In this mechanism we will dynamically increase the trust from (Low to High) between the mobile nodes using proxy node. When mobile node needs secure data communication, it will generate a dynamic secret session key with the desired destination mobile node directly or via proxy mobile node. These dynamic secret session keys are generated using message digest and Diffie-Hellmann protocol.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
Security in mobile adhoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. The major difficulty in adhoc network occurs when a new node join network but not having any trusts relation with other node of network. We have proposed a new mechanism that provides trust conscious and secure data communication between the nodes. In this mechanism we will dynamically increase the trust from (Low to High) between the mobile nodes using proxy node. When mobile node needs secure data communication, it will generate a dynamic secret session key with the desired destination mobile node directly or via proxy mobile node. These dynamic secret session keys are generated using message digest and Diffie-Hellmann protocol.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have
a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring
down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating
malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using
trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective
trust determination algorithm. This paper presents the performance analysis of a recently developed trust
determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The
performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The
simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and
isolating any maliciously behaving node(s) in a timely manner.
Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
Improving Network Security in MANETS using IEEACKijsrd.com
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes.
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
Mobile adhoc networks eliminate the need for pre-existing infrastructure by relying on the
nodes to carry all network activities.
The mobile ad hoc networks are more prone to suffer from malicious behaviors than the
traditional wired networks. Therefore, there is a need to pay more attention to the security issues in
the mobile ad hoc networks. Clustered Manets is a very promising area of research due to its
infrastructure less capability. They have many advantages such as improved bandwidth, power
consumption and QoS of the network but one disadvantage is security. This paper has been prepared
keeping in mind that it needs to prove itself to be a valuable resource dealing with both the important
core and the specialized security issues in this area.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So we proposed a new scheme which is significantly different from others available schemes to provide security during routing in mobile ad hoc networks. In this paper, our proposed scheme, Secure Multipoint Relay based Routing in MANET (SMRR) provides routing based on trust, which is an integer value that helps to select Multipoint Relay (administrator) inside the network for routing. We have also implemented the message confidentiality and integrity in our proposed scheme. Our simulation results show the robustness, reliability and trustworthiness of our scheme.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN IJNSA Journal
Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocols for routing organization have been proposed in much research for increasing system throughput, decreasing system delay and saving energy. Even these algorithms have proposed some levels of security, but because of their dynamic nature of communication, most of their security solutions are not suitable. In this paper we focus on how to achieve the highest possible level of security by applying new keymanagement technique that can be used during wireless sensor networks communications. For our proposal to be more effective and applicable to a large number of wireless sensor networks applications, we work on a special kind of architecture that have been proposed to cluster hierarchy of wireless sensor networks and we pick one of the most interesting protocols that have been proposed for this kind of architecture, which is LEACH. This proposal is a module of a complete solution that we are developing to cover all the aspects of wireless sensor networks communication which is labeled Secure Object Oriented Architecture for Wireless Sensor Networks (SOOAWSN) .
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have
a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring
down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating
malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using
trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective
trust determination algorithm. This paper presents the performance analysis of a recently developed trust
determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The
performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The
simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and
isolating any maliciously behaving node(s) in a timely manner.
Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
Improving Network Security in MANETS using IEEACKijsrd.com
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes.
Defending against collaborative attacks byranjith kumar
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
Get the latest IEEE ns2 projects in JP INFOTECH; we are having following category wise projects like Industrial Informatics, Vehicular Technology, Networking, WSN and Manet.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/ns2-projects/
Mobile adhoc networks eliminate the need for pre-existing infrastructure by relying on the
nodes to carry all network activities.
The mobile ad hoc networks are more prone to suffer from malicious behaviors than the
traditional wired networks. Therefore, there is a need to pay more attention to the security issues in
the mobile ad hoc networks. Clustered Manets is a very promising area of research due to its
infrastructure less capability. They have many advantages such as improved bandwidth, power
consumption and QoS of the network but one disadvantage is security. This paper has been prepared
keeping in mind that it needs to prove itself to be a valuable resource dealing with both the important
core and the specialized security issues in this area.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So we proposed a new scheme which is significantly different from others available schemes to provide security during routing in mobile ad hoc networks. In this paper, our proposed scheme, Secure Multipoint Relay based Routing in MANET (SMRR) provides routing based on trust, which is an integer value that helps to select Multipoint Relay (administrator) inside the network for routing. We have also implemented the message confidentiality and integrity in our proposed scheme. Our simulation results show the robustness, reliability and trustworthiness of our scheme.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Security in Wireless Sensor Networks: Key Management Module in SOOAWSN IJNSA Journal
Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocols for routing organization have been proposed in much research for increasing system throughput, decreasing system delay and saving energy. Even these algorithms have proposed some levels of security, but because of their dynamic nature of communication, most of their security solutions are not suitable. In this paper we focus on how to achieve the highest possible level of security by applying new keymanagement technique that can be used during wireless sensor networks communications. For our proposal to be more effective and applicable to a large number of wireless sensor networks applications, we work on a special kind of architecture that have been proposed to cluster hierarchy of wireless sensor networks and we pick one of the most interesting protocols that have been proposed for this kind of architecture, which is LEACH. This proposal is a module of a complete solution that we are developing to cover all the aspects of wireless sensor networks communication which is labeled Secure Object Oriented Architecture for Wireless Sensor Networks (SOOAWSN) .
A mobile Ad-hoc network (MANET) is an impulsive network that can be recognized with no predetermined infrastructure. To achieve safe path selection cryptographic key exchange was implemented mostly in turn of huge computational cost. Confidence based coordination in MANET focuses on routing challenges created by selfish nodes, as energy utilization & time factor are key issues in this aspect. The present protocol is focused on fuzzy optimization-based node confidence estimation and path selection with minimum energy utilization. The node with maximum confidence value will give high priority to include in the path for transmission. In the implemented protocol to build a novel confidence-based model multidimensional factors like confidence value, link cost, degree of node and node energy are included as decision-making factors. The proposed protocol CLBNSRM estimates confidence level in four steps to decide a trustworthiness of neighboring node. To estimate the efficiency of the present confidence model various protocols are compared by using attributes like the number of nodes, node speed, malicious node variation, etc. Moreover, different parameters like Packet delivery ratio, Throughput, Residual energy, and Packet dropped are considered with these attribute variations. Experimental results indicate that PDR and Throughput increase although in presence of malicious nodes, along with the utilization of minimal energy. Statistical analysis is carried out for mathematical modeling. This analysis shows that a linear model of an implemented protocol is better than compared protocol with all the aspects.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
Wireless sensor networks are collections of large number of sensor nodes. The sensor nodes are featured
with limited energy, computation and transmission power. Each node in the network coordinates with
every other node in forwarding their packets to reach the destination. Since these nodes operate in a
physically insecure environment; they are vulnerable to different types of attacks such as selective
forwarding and sinkhole. These attacks can inject malicious packets by compromising the node.
Geographical routing protocols of wireless sensor networks have been developed without considering the
security aspects against these attacks. In this paper, a secure routing protocol named secured greedy
perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating
trust based mechanism in the existing greedy perimeter stateless routing protocol (GPSR). Simulation
results prove that S-GPSR outperforms the GPSR by reducing the overhead and improving the delivery
ratio of the networks.
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by mobile and harsh network conditions. Traditional cryptographic techniques or efforts at developing trust-aware routing protocols do not effectively address this severe problem. To secure the WSNs against adversaries misdirecting the multi-hop routing, we have designed and implemented TARF, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information, TARF provides trustworthy and energy-efficient route. Most importantly, TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large-scale WSNs under various scenarios including mobile and RF-shielding network conditions. Further, we have implemented a low-overhead TARF module in Tiny OS; as demonstrated, this implementation can be incorporated into existing routing protocols with the least effort. Based on TARF, we also demonstrated a proof-of-concept mobile target detection application that functions well against an anti-detection mechanism.
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
Wireless Ad Hoc Network is a dynamically organized network on emergency
situations, in which a group of wireless devices send data among themselves
without requiring any base stations for forwarding data. Here the nodes itself
perform the functions of routing. This important characteristic of mobile ad
hoc networks allows the hassle free set up of the network for
communications in different crisis such as battlefield and natural disaster
zones. Multi hop communication in MANET is achieved by the cooperation
of nodes in forwarding data packets. This feature of MANET is largely
exploited to launch a security attack called black hole attack. A light weight
solution called SEC-DSR is proposed to defend the network from black hole
attack and enables communication among nodes even in the presence of
attackers. In this scheme, by analyzing only the control packets used for
routing in the network, the compromised nodes launching the attack are
identified. From the collective judgment by the participating nodes in the
routing path, a secure route free of black hole nodes is selected for
communication by the host. Simulation results validate and ensure the
effectiveness of the proposed solution tested on an ad hoc network with
compromised black hole nodes.
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any Simranjeet Kaur"Reliable and Efficient Routing in WLAN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3585.pdf http://www.ijtsrd.com/computer-science/computer-network/3585/reliable-and-efficient-routing-in-wlan/simranjeet-kaur
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for detecting and isolating malicious nodes before they can do any harm to the network. One of the possible mechanisms is by using trust-based routing protocols. One of the main requirements of such protocols is to have a cost-effective trust determination algorithm. This paper presents the performance analysis of a recently developed trust determination algorithm, namely, the neighbor-weight trust determination (NWTD) algorithm. The performance of the algorithm is evaluated through simulation using the MANET simulator (MANSim). The simulation results demonstrated the reliability and effectiveness of the algorithm in identifying and isolating any maliciously behaving node(s) in a timely manner.
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc NetworksIJNSA Journal
A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. These networks are self-configuring, capable of self-directed operation and hastily deployable. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. Routing is always the most significant part for any networks. Each node should not only work for itself, but should be cooperative with other nodes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET. The Qos parameters like PDR, throughput and delay are affected directly due to such misbehaving nodes. We focus on trust management framework, which is intended to cope with misbehaviour problem of node and increase the performance of MANETs. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a Trust Based Reliable AODV [TBRAODV] protocol is presented which implements a trust value for each node. For every node trust value is calculated and based trust value nodes are allowed to participate in routing or else identified to become a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with general AODV, if there are misbehaving nodes in the MANET.
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
Energy is one of the main network resources that is used in mobile devices. We proposed an energy efficient routing techniques called reliable minimum energy cost routing (RMECR) and comparing with reliable minimum energy routing (RMER) which are used by the nodes in the most efficient manner. RMER and RMECR works on the basis of balancing the energy of the nodes so that the nodes with maximum energy can do the work and the nodes with less than certain threshold energy required to do a certain amount of work will not do any work. Thereby we try to raise the network reliability and lifetime of communication in a network of mobile devices. The proposed RMECR protocol is also used to decrease the cost of communication in a wireless networking environment.
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Clustering effects on wireless mobile ad hoc networks performancesijcsit
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...CSEIJJournal
In this paper, we propose a routing protocol that is based on securing the routing information from
unauthorized users. Even though routing protocols of this category are already proposed, they are not
efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every
Bit of routing information they pass from one intermediate node to another in the routing path. The
proposed mechanism is evaluated against selected alternative trust schemes, with the results showing that
our proposal achieves its goals.Our research aims at providing a secure and distributed
authentication service in the ad hoc networks.
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
The most emerging prominent sensor network applications collect data from sensor nodes and monitors
periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink
via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such
applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering
scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses
artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible
optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This
scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets.
This code and speed optimized block encryption provides confidentiality against critical data and
consumes less energy for encryption. This proposed method increases the network lifetime there by
reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network
Simulator (NS2) shows the superiority of the proposed scheme
Similar to LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS (20)
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
LSR PROTOCOL BASED ON NODES POTENTIALITY IN TRUST AND RESIDUAL ENERGY FOR WSNS
1. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
DOI : 10.5121/ijnsa.2012.4202 21
LSR PROTOCOL BASED ON NODES POTENTIALITY
IN TRUST AND RESIDUAL ENERGY FOR WSNS
Shaik Sahil Babu#1
, Arnab Raha#2
, M.K. Naskar#3
#
Department of Electronics and Telecommunication Engineering,
Jadavpur University, Kolkata – 700 032, West Bengal, India
1
sksahilbabu419@gmail.com, 2
arnabraha1989@gmail.com,
3
mrinalnaskar@yahoo.co.in
ABSTRACT
In Wireless Sensor Networks (WSNs), all the nodes selected for packet routing must be trustworthy, and
at the same time energetic too. Smooth conservation of nodes energies and the trust levels, are an
important issues in WSN because they directly affects the life span and reliability of the nodes as well as
the entire network. The energy utilization at every node must be very smooth and at the same time,
packets should be forwarded via trusted nodes only. In this paper, we propose an Energy Efficient Link
State Routing Protocol (EELSRP) using the potential nodes selected by applying the fuzzy logic on the
trust and residual energy levels. This routing protocol finds the best route by balancing the nodes
residual energies and trust levels, and protects the WSN against routing attacks by eliminating the un-
trusted nodes before the creation of route.
KEYWORDS
Wireless Sensor Network (WSN); Fuzzy Logic; Geometric Mean (GM); Direct Trust; Indirect Trust;
Route Trust (RT); Base Station (BS); Benevolent Node; Packet Latency.
1. INTRODUCTION
As Wireless Sensor Networks (WSNs) are highly application oriented, these various
applications bring various security needs. In WSN, sensor nodes have limited communication
bandwidth, processing resources, memory space and battery capacity [1]. Though the
cryptographic security methods are playing major role for providing security, they are not
suitable for WSNs, due to resource constraints like memory, processing and energy at node.
Cryptographic security is more complex and the overhead is high. Hence, a new way of security
called “Trust” came into picture and has become new area for researchers. Trust, a degree of
reliability of a node on any other neighbour node of WSN, can be formed from the track record
of past transactions made with the node. By maintaining a record of the transactions with other
nodes, directly as well as indirectly, trust value will be established [2]. Trust is dependent on
time; it can increase or decrease with time based on the available evidence through direct
interactions with the same node or recommendations from other trusted nodes [3].
Similarly, energy of a node is another constraint in WSN, because all the nodes operate on
battery, which can’t be replaced in their life time. Hence, energy efficiency has become another
challenging issue in WSN applications. Any type of processing at node should not consume
much energy as it affects the node’s life, in-turn the life span of the WSN. The life time of any
network, can evaluated from the trustworthy relations among the nodes and from the number of
route from source node to destination. As a matter of fact, for routing any packet in WSN, all
the nodes of routing path from source to sink must be both, energetic as well as trustworthy.
Otherwise, the packet may not be reached or captured. There is much literature for WSN routing
protocols, but routing protocol with potential nodes like, trustworthy as well as energetic, is out
2. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
22
of literature. Hence, a routing protocol with the integration of trust and node’s residual energies
is very much required. Integration of Trust in routing protocols of WSNs gives high security for
packet routing from the Source node to reach the Base Station. Integration of energetic node in
routing protocols of WSNs gives high guarantee in packet reaching to the Base Station.
In DTLSRP [4], trust using direct interactions only is incorporated. Trust aware routing
framework for WSNs is proposed by [5], to secure multi-hop routing in WSNs against intruders
exploiting the replay of routing information. With the idea of trust management, their proposal
enables a node to keep track of the trustworthiness of its neighbours and thus to select a reliable
route. Their proposal can also be implemented for large-scale WSNs deployed in wild
environments. Many security attacks have been presented in ([6], [7]) with a significant subset
targeting the routing process [8]. If an adversary force manages to capture the node, it
participates in the network, and it can damage the routing process by simply dropping the
packets it receives for forwarding. Another attack easy to implement is packet modification. In
[9] an approach that the human society follows proposed to defend against the majority of
routing attacks. Although the design of mechanisms to enhance security at all layers of the
networking protocol stack has attracted the interest of the research community (e.g. [10], [11]),
very limited implementation effort has been reported. In [12], the implementation of link-layer
security architecture is presented, while in [13] experience regarding the implementation of
hash-based encryption schemes in TinyOS operated sensor nodes is reported. In [14], the
efficiency of a set of routing protocols is compared based on real test-bed experiments. In [15],
very limited information regarding the implementation of a trust model is provided. Finally, in
[16] presented results and experience gained through the implementation of a location-based
trust-aware routing solution. A distributed trust model is incorporated in the routing solution
which relies on both direct and indirect trust information.
In this paper, we propose a new energy efficient link state routing protocol based on potential
nodes found by applying fuzzy logic on node’s residual energy and trustworthiness by
eliminating the malicious nodes from the network, and presented simulated results. This
protocol incorporates a trust computational model [17] with direct and indirect experiences
based on geometric mean approach on the QoS characteristics such as packet forward, data rate,
power consumption reliability, etc. To find the potentiality of the node, a Fuzzy Logic is applied
on node’s trust and residual energy. Finally, routing path will be formed with potential nodes
only.
The rest of this paper is organized as follows: first in section 2 we present the related work on
WSN routing protocols based on trust and traditional trust evaluation method, and in section 3
the designated EELSR Protocol based on nodes potentiality derived from the Fuzzy logic
application on trust and residual energy, while in section 4 Simulation results. Finally, section 5
gives the conclusions and future scope.
2. RELATED WORK
Routing methods based on Trust: Routing related protocols based with trust integration have
been widely addressed in the literature. The following are the most important research results in
this direction:
2.1 Trusted GPSR
The Greedy Perimeter Stateless Routing [18] is modified to take trust levels of node into
account. Each time a node sends out a packet it waits until it overhears its neighbouring node
forwarding it. Based on this correct and prompt forwarding information it maintains a trust
value for its neighbours. This information is then taken into account in the routing decisions.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
23
2.2 ARIADNE
It is very efficient protocol, using highly efficient symmetric cryptographic primitives and per-
hop hashing function [19]. It prevents the attackers or compromised nodes from tampering with
uncompromised routes consisting of uncompromised nodes, and also prevents a large number of
types of Denial-of-Service attacks.
2.3 ATSR (Ambient Trust Sensor Routing)
A fully distributed Trust Management System is realized in ATSR [1] in order to evaluate the
reliability of the nodes. Using this approach, nodes monitor the behaviour of their neighbours in
respect to different trust metrics and finds direct trust value per neighbour. It also, takes into
account indirect trust information, i.e. trust information from its neighbours, also called
reputation. Direct and indirect trust information is combined to reach the Total Trust
information. Finally, the routing decisions are based on geographical information (distance to
the base-station) and Total Trust information. The trust model presented has been integrated
with a location-based routing protocol. If no malicious node exists in the network, i.e. the Total
Trust is almost equal to 1, the ATSR behaves simply the Greedy Perimeter Stateless Routing
(GPSR) protocol.
2.4 SPINS (A suite of security protocols optimized for sensor networks)
This [20] has been designed to provide data authentication, data confidentiality and evidence of
data freshness. In this protocol two security blocks SNEP and µTESLA are involved. The first
block introduces overhead of 8 bytes and maintains a counter for achieving semantic security.
µTESLA provides authentication for data broadcasting. Though SPINS claim to provide trusted
routing ensuring data authentication and confidentiality, but it does not deal with Denial of
Service Attacks.
2.5 Trust- aware DSR:
The watchdog and Pathrater modules has been designed and incorporated in the Dynamic
Source Routing protocol for security [21]. The watchdog module is responsible for detecting
selfish nodes that do not forward packets. For this, each node in the network buffers every
transmitted packet for a limited period. During this period each node enters into promiscuous
mode in order to overhear whether the next node has forwarded the packet or not. And based on
the feedback that Pathrater receives from the watchdog, it assigns different ratings to the nodes.
These ratings are then used to select routes consisting of nodes with the highest forwarding rate.
2.6 CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc
Networks)
This [22] protocol adds reputation system and a trust manager to the Watchdog and Pathrater
scheme. The trust manager evaluates the events reported by the Watchdog and issues signals to
other nodes regarding malicious nodes. The signal recipients are maintained in a friends-list.
The reputation system maintains a black-list of nodes at each node and shares them with
friends-list nodes. In one way it is a punishment based scheme by not forwarding packets of
nodes whose trust level drops below the certain threshold.
2.7 TRANS (Trust Routing for Location Aware Sensor Networks)
TRANS [23] routing protocol selects routes based on trust information not on hop count to
avoid the insecure locations. This protocol assumes that the sensors know their locations and
4. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
24
that geographic routing is used. A sink sends a message only to its trusted neighbours for the
destined location. Those corresponding neighbours forward the packet to their trusted
neighbours that have the nearest location to destination. Thus the packet reaches the destination
along a path of trusted sensors. Here the important feature of TRANS, the sink identifies
misbehaviour by observing replies, probes potential misbehaving locations, and isolates
insecure locations. On discovery of such locations, the sink records and advertises to the
neighbouring nodes.
2.8 Traditional weighting approach for Trust evaluation [3]
He introduced one algorithm for trust calculation and risk assessment based on trust factors and
dynamic aspects of trust. He assumed that trust is computed using traditional weighting
approach of the QoS characteristics such as packet forward, data rate, error rate, power
consumption, reliability, competence, etc. A traditional weighing approach to calculate Trust
and asses Risk (Risk assessment algorithm) is introduced. These weights WA, WB can be
assigned using different approaches. Some nodes might give more weight to direct trust, others
might give more weight to recent indirect trust.
3. Energy Efficient Link State Routing Protocol based on Nodes
Potentiality in Trust and Residual Energy for WSNs
Our proposed model is extended and modified version of routing protocol DTLSRP [4] and
geometric mean based Trust Management System [17]. In GMTMS [17], we proposed a new
trust model suitable for many practical applications of the Wireless Sensor Networks (WSNs).
In [4], we proposed LSR Protocol for WSNs based on Direct Trust of a neighbour node only. In
this proposal, we are evaluating the Trust from both direct and indirect trusts. As in [17], Trust
of a node on any neighbour node is a function of both direct and indirect trusts. Similarly, LSR
Protocol proposed in [4], based on only Direct Trusts. In this proposed LSR Protocol, Indirect
Trust also integrated for reliability, and for the smooth conservation of energies of nodes, and
balancing between trust and residual energy, the selection of nodes for routing is performed by
applying Fuzzy logic on node’s trustworthiness and residual energy. There are five steps to find
the best route from source node to Base Station that gives equal importance to residual energy
and trust level at every node of the entire route.
Step 1: Every node in the network finds the neighbour nodes and evaluates their trust and
residual energy levels.
Step 2: Every node applies Fuzzy Logic on nodes listed above and finds their routing potential
levels. Based on minimum qualification for participation in routing, some neighbour
nodes will be listed as potential nodes.
Step 3: Source node runs Link State Routing Protocol using potential nodes only, assuming
Base Station as a destination, and gets the routing information.
Step 4: Source node extracts the different routes to the Base Station, from the information given
by the neighbour nodes. Also, Source node calculates route potential levels for each of
the discovered routes.
Step 5: Source node uses the highest potential level route for routing.
5. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
25
3.1. Trust and Residual Energy Evaluation
Every node uses trust evaluation method [17] and knows the trust levels of its neighbours of one
radio range (m with respect to node S) as shown in Figure 1. It finds the trustworthy neighbour
nodes (say A, B, C) based on the trust threshold tTH. If no node is found trustworthy or only few
trustworthy nodes are present in its radio range then it increase the radio range from m to n, and
finds the new trustworthy nodes again (nodes D, E, F, G, H, I may be added), which is an
energy consuming operation.
Every node in WSN maintains a database that contains the history related to their neighbours,
i.e., trust metrics of each neighbour node, direct trusts, indirect trusts, trusts at different times,
and residual energies of neighbours. Every node gets residual energy levels of its neighbour
nodes in every reply transaction performed to find the trust, and will be stored in the database of
the node. These residual energies received, maintained by the trust management system of the
node.
In trust management system [17], the direct trust is geometric mean of all different trust metrics
for different events occurred in the network. Every node will be having a separate record of data
of every surrounding node in different trust metrics for different events occurred in the network.
From these records, Direct Trust (DT) is calculated based on geometric mean of the QoS
characteristics as given in the below equations.
DT = geometric mean of trust metrics
DT = ሾ∏ሺmଵ, mଶ, … , m୩ሻሿ
ଵ
୩ൗ
DTభ
ሺNଶሻ = ൣ∏ ൫mభ, మ,୬൯୬ ൧
భ
ౡ
Here, mଵ, mଶ, … , m୩ are the trust metrics of node. The DTభ
ሺNଶሻ in the above equation is the
Direct Trust value of node Nଵ on node Nଶ, calculated for K different type of trust metrics (for
n=1 to k).
The Indirect Trust on node Nଶ with respect to Nଵ can be calculated from the direct trusts (DTs
on Nଶ with respect to its neighbours) sent by the neighbour nodes of Nଶ.
IT = geometric mean of trust information
given by neighbour nodes.
ITభ
ሺNଶሻ = ൣ∏ ൫DT୮ሺNଶሻ൯୮ ൧
భ
ై for p = 1 to L
Fig.1 Node S radio range
B
C
A
S
I
H
D
E
G
F
m
n
6. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
26
Here, DTଵ, DTଶ, … , DT are the DTs given by the neighbour nodes. The ITభ
ሺNଶሻ is the Indirect
Trust value of node Nଵ on node Nଶ, calculated for indirectly given information by L neighbours
of Nଶ.
As shown in following equation, DT is direct trust (experience), IT is indirect trust
(recommendations), T is total trust.
total trust T = FሺDT, ITሻ
T = DT ∗ Wୟ + IT ∗ Wୠ
The weights ܹ is weightage given to DT and Wୠ to the IT where Wୟ + Wୠ = 1. Weights can
be assigned using different approaches. Sometimes DT may be given more weight, and IT may
be given less weight i.e. Wୟ > Wୠ.
Tభ
ሺNଶሻ = DTభ
ሺNଶሻ ∗ Wୟ + ITభ
ሺNଶሻ ∗ Wୠ
Hence, every node of the network finds the neighbour nodes and evaluates their trust and
residual energy levels. If no neighbour node found in the radio range, then it increases the radio
range and gets the new neighbour nodes if any, and evaluates their trust. Based on minimum
trust threshold (tTH) and minimum residual energy threshold (reTH), some nodes will be filtered
out and they are not allowed in routing. Hence, every node prepares a list of their neighbour
nodes with different trust levels and residual energies.
3.2 Fuzzy Logic for neighbour nodes routing potential levels
To increase the life of the node, as well as the entire network, every node in the network must
utilize their energy properly. All the time, neither only energetic nodes nor the only trustworthy
nodes may be selected for routing. If only energetic nodes, without considering trustworthiness
are selected for routing, then the packet may not reach the Base Station. Similarly, if only
trustworthy nodes, without considering residual energy are selected for routing, then the life
span of most trustworthy nodes will be fall down. Hence, trustworthy node may die, and entire
lifespan of network decreased. In this proposed method, we are giving same priority to the two
parameters, because we are applying this fuzzy logic on nodes whose trust and residual energy
levels are greater than the minimum threshold level. The relation between trust management
system, routing protocol, neighbour node’s database and the fuzzy logic controller is shown in
Figure 2. The trust management system periodically finds the neighbour nodes trust metrics
including residual energy, in its radio range, evaluates their trust levels and stores them into the
database. As shown in Fig. 2, the inputs to the FLC come from the database module. The inputs
are trust and residual energy levels. The output of FLC is routing potential level. The routing
protocol collects the routing potential levels of the entire neighbour nodes for routing operations.
The inputs and outputs for the FLC and their minimum and maximum values are shown in
Table 1.
An important function of trust management system is, it gets the neighbour node’s residual
energy levels. All the gathered data maintained in the node’s database. Whenever routing
protocol wants to form a new route to send some packet to the BS, it first instructs the trust
management system to update the database. Then the TMS in turn, initiates the Fuzzy Logic
Controller to find the neighbour nodes routing potential levels from the available information of
the database and update the database. Then the routing protocol collects the nodes routing
potential level information and take appropriate decision for routing in that moment.
7. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
27
Hence, every node applies Fuzzy Logic on nodes listed in Step 1, and finds their routing
potential levels, i.e., node routing potential levels (nrpl). So, every node will be having
neighbour nodes list with their qualifying node routing potential levels. Based on minimum
qualifying node routing potential level threshold (nrplTH), some nodes may be filtered out again.
All other nodes are listed, are called potential nodes, and they are only eligible for participating
in routing.
3.3 LSRP execution at Source node using potential nodes
Link state routing protocols are the most widely used static routing protocols. Here, we are only
interested in the basic features of the LSRP and are not mentioning the wide details of it or
whether OPSF, IS-IS, MOPSF,MLSRP etc. are used in this case. Applying anyone of these
LSRPs are possible depending upon other network needs.
Database
Trust
Management
System
Fuzzy Logic Controller
Routing Protocol
Inference
Engine
Defuzzifier
Fuzzy Rule Base
Fuzzifier
Fig. 2 Relationship of FLC with database
Fig. 3 LSR Protocol via potential nodes
A
B
C
Q
B
L
P
O
W
V
G
U
K
T
R
S
I
H
D
E
F
J
M
N
BS
8. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
28
The basic features of LSRP in brief are:
a) Discovery of the neighbors of the nodes and learning their network addresses
b) Measurement of the delay or cost to each of its neighbors.
c) Construction of a packet telling all the information learnt by it.
d) Transmission of this packet to all the router nodes.
One of the main advantages in our algorithm is that it doesn’t require the LSRP to apply
Dijsktra’s algorithm or any other algorithm to find the shortest path from the source to the sink.
It gets automatically evaluated from determination of Route potential levels.
For example, the WSN shown in Fig. 3, A to W, are nodes in which S is a Source node, and BS
is Base Station. Nodes with Black colour are potential nodes and Red marked, are not qualified
nodes for routing, because they may be either not trustworthy or low residual energy or both.
Hence, Source node gets the different routes information from neighbour nodes. This
information contains different nodes those are eligible to participate in routing and their node
routing potential levels with respect to their neighbour nodes.
3.4 Routes and their potential levels extraction
Source node calculates the different routes, from the information given by the neighbour nodes.
Also, Source node calculates route potential levels (rpl) for each of the discovered routes from
Source to Base Station, by applying geometric mean on all the nrpls of the nodes those are
falling in the route. Each route will be having its own route potential level. Upon the completion
of the LSRP protocol, the different routes that are found out are listed in Table 2.
Table 2. Different routes from Source (S) to Base Station (BS)
Rt
no
.
Route
Rt
no
.
Route
1 S→G→I→M→N→O→K→L→T→BS 13 S→A→I→M→N→O→U→V→BS
2 S→G→I→M→N→O→K→L→R→T→BS 14 S→A→I→M→N→U→V→BS
3 S→G→I→M→N→O→U→V→BS 15 S→A→I→M→N→O→K→L→T→BS
4 S→G→I→M→N→U→V→BS 16 S→A→I→M→N→O→K→L→R→T→BS
5 S→G→M→N→O→K→L→T→BS 17 S→A→E→I→M→N→O→U→V→BS
6 S→G→M→N→O→K→L→R→T→BS 18 S→A→E→I→M→N→U→V→BS
7 S→G→M→N→O→U→V→BS 19 S→A→E→I→M→N→O→K→L→T→BS
8 S→G→M→N→U→V→BS 20 S→A→E→I→M→N→O→K→L→R→T→BS
9 S→G→K→L→T→BS 21 S→E→I→M→N→O→K→L→T→BS
10 S→G→K→L→R→T→BS 22 S→E→I→M→N→O→K→L→R→T→BS
11 S→G→K→O→U→V→BS 23 S→E→I→M→N→O→U→V→BS
12 S→G→K→O→N→U→V→BS 24 S→E→I→M→N→U→V→BS
TABLE 1 Universe of Discourse for Inputs and Output.
Name Input/ Output Min. Value Max. Value
Node’s Trust (T) I 0 1.0
Node’s Residual Energy Level (E) I 0 1.0
Node’s routing potential level (nrpl) O 0 1.0
9. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
29
Route potential levels:
rpl = geometric mean (nodes routing potential levels in the route)
The route potential level of route n that has k-hops is given by the following equation.
࢘ࡾ
= ሾ∏ ሺ܍܌ܗܖ ܖܑܜܝܗܚ ܔ܉ܑܜܖ܍ܜܗܘ ܔ܍ܞ܍ܔ ሻୀ ࢚ ሿ
ܓ
For example, as shown in Table 2, route 9 has 5 hops and its routing potential level is:
࢘ࡾૢ
ൌ ሾ∏ ሾሺ܁ → ۵ሻ, ሺ۵ → ۹ሻ, ሺ۹ → ۺሻ, ሺۺ → ܂ሻ, ሺ܂ → ۰܁ሻሿୀ ࢚ ሿ
...(1)
3.5 Routing using route with highest routing potential level
In the fifth and final step, data will be routed only through that path whose routing potential
level value is the highest. The highest routing potential level route may or may not be the
minimum number of hop route. If all the nodes in the minimum number hop route are energetic
and trustworthy then only that route will be selected as highest potential route. And if any one of
the nodes in the minimum number hops route is neither energetic nor trustworthy nor both then
that route may get lower potential than other routes.
4. SIMULATION RESULTS
We have designed the FLC system; it is shown as a block in the Figure 2. The inputs to the FLC
come from the database module. The inputs are trust and residual energy level of node. The
output of FLC is potential level of the node. The Universe of Discourse for Inputs and Output
are shown in Table 1.
Fuzzifying of Inputs and Outputs: We have used triangular membership functions to fuzzify the
inputs. For different inputs the fuzzy variable and its crisp input ranges are shown below in Fig.
4. The optimization of these assignments is often done through trial and error method for
achieving optimum performance of the FLC.
We have just only one output, which is node’s routing potential level, and assigned fuzzy
memberships as we did for inputs.
The Fuzzy Inference Technique available of MATLAB is used in our node election method.
The so-called mamdani method is applied. Fuzzy rule base for defuzzification is shown in
Figure 5.
Fig. 4 Crisp ranges for Inputs and Output
10. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
30
The output which is node’s potential level for different inputs, i.e., none’s residual energy level
and trust levels is shown in Figure 5. Defuzzification of node’s potential level output is
evaluated using the centroid approach: overlap and additive composition.
The Fig. 6, shows how smooth the energy as well as trust level of node can be balanced to find
the node’s routing potential level. We have chosen a symmetric square field area with random
distribution of nodes as shown in Fig.3. The assignment of node’s routing potential levels with
respect to their neighbour nodes has taken randomly and is shown in Table 3.
As per the Fig. 3, as a result of the execution of our routing protocol at node S, there will be
24 routes from Source node (S) to Base Station. Hence, the nose S lists the all 24 routes with
node’s routing potential level at every hop in all the routes. Route potential levels (rpls) of all
the routes listed in Table 2, are found by applying the equation (1) and are given below in the
respective order from route 1 to 24.
Route Potential Levels are ݈ݎோభ
= 0.50, ݈ݎோమ
= 0.54, ݈ݎோయ
= 0.48, ݈ݎோర
= 0.44, ݈ݎோఱ
=
0.49, ݈ݎோల
= 0.54, ݈ݎோళ
= 0.47, ݈ݎோఴ
= 0.43, ݈ݎோవ
= 0.52, ݈ݎோభబ
= 0.59, ݈ݎோభభ
= 0.54,
݈ݎோభమ
= 0.51, ݈ݎோభయ
= 0.52, ݈ݎோభర
= 0.46, ݈ݎோభఱ
= 0.53, ݈ݎோభల
= 0.57, ݈ݎோభళ
= 0.47,
Fig. 5 Fuzzy rule base
Fig. 6 Fuzzy Output for node routing potential level
11. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
31
݈ݎோభఴ
= 0.42, ݈ݎோభవ
= 0.48, ݈ݎோమబ
= 0.52, ݈ݎோమభ
= 0.51, ݈ݎோమమ
= 0.56, ݈ݎோమయ
= 0.50,
݈ݎோమర
= 0.44.
Though the route 9 has least hops, it is not selected as because node routing potential level of
node L on node T is 0.3 only as shown in Table 3. Similarly, in all other routes except the route
10, any one or many node/s routing potential level is/are less.
Table 3. Random assignment of routing potential levels to the node’s neighbours.
Node and its neighbours with node routing potential levels (nrpls)
S B = 0.5, C = 0.9, A = 0.4, E = 0.7, G = 0.5 L T = 0.3, R = 0.6, K = 0.7
A I = 0.7, S = 0.8, E = 0.5 M I = 0.6, G = 0.7, N = 0.5
B S = 0.6, C = 0.7 N M = 0.3, U = 0.4, O = 0.6
C S = 0.9, B = 0.5 O K = 0.7, U = 0.8, N = 0.7
D Un-trusted node P Un-trusted node
E S = 0.8, I = 0.3 Q Un-trusted node
F Un-trusted node R T = 0.6, L = 0.4
G S = 0.8, I = 0.3, M = 0.3, K = 0.7 T L = 0.5, BS = 0.7
H Un-trusted node U N = 0.9, O = 0.4, V = 0.3
I E = 0.4, A = 0.5, G = 0.7, M = 0.5 V U = 0.7, BS = 0.5
J Un-trusted node W Un-trusted node
K G = 0.4, O = 0.6, L = 0.5 BS T = 0.6, V = 0.6
The other results are represented in the following two plots. Fig.7 shows the Packet delay, and
Fig. 8 shows Network life span.
The simulation has been carried out in TOSSIM simulator based upon the TinyOS platform in
IRIS motes. We have used a homogeneous noise model in our TOSSIM simulator. The Sources
and the Sinks were selected randomly at regular intervals while doing the simulation. We have
followed two trivial processes while doing our simulation:
i. In the first case we have assigned uniform trust values and the results were obtained using
the original network behavior which changed with time.
ii. In the second case, we have assigned some pre-evaluated trust values to the nodes and all the
network characteristics like, were taken to be proportional to those values.
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
5 10 15 20 25 30 35 40 45
Delay(Normalised)
Time in Secs
DTLSRP
EELSRP
Fig. 7 Packet Delay
12. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
32
This plot shows the advantage of our protocol as compared with the (LSRTP denotes
DRTLSRP). Although in a few cases the performance of both are quite similar but in others our
model scores over the ATSR one.
This plot shows the plot of transmission latency with random trust assignment. Although we
can’t clearly decide which one is better, it’s possible to conclude that in the long run our model
behaves better than their one especially in the case of equal trusts and when the number of
nodes in the network is very large.
It is evident from the graph, that our proposed algorithm EELSRP enables us to send packets
with reduced delay compared to DTLSRP [04].
5. CONCLUSION AND FUTURE WORK:
It can be ultimately concluded from this simulation results that our model EELSRP performs
better with respect to the DTLSRP protocol [04] using only direct trusts. Due to smooth
conservation of the nodes residual energies and trustworthiness, the network life span also
increases. This increment in the network life time saves the WSN in many practical data/packet
transmission situations. The increased connectivity among the nodes helps the routing protocols
to make routing for a longer time. Future work includes implementation of this protocol and
extracting energy efficiency in practical environment.
REFERENCES:
[1] Theodore Zahariadis, Helen C. Leligou, Panagiotis Trakadas and Stamatis Voliotis, “Mobile
Networks Trust Management in Wireless Sensor Networks”, European Transactions on
Telecommunications, 2010; 21:386-395.
[2] M. Momani, J. Agbinya, G. P. Navarrete and M. Akache, “A New Algorithm of Trust Formation
in Wireless Sensor Networks”, in AusWireless ’06. Sydney, Australia, 2006.
[3] Mohammad Momani, Ph.D thesis on “Bayesian methods for modeling and management of Trust
in Wireless Sensor Networks”, University of Technology, Sydney, July, 2008.
0
0.2
0.4
0.6
0.8
1
1 2 3 4 5 6 7 8 9 10 11 12 13 14
NormalisedLifetime
Time Instants with a period of 30 mins
under normal routing requirements
DTLSRP
EELSRP
Fig. 8 Network Life Span
13. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
33
[4] Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, “A Direct Trust dependent Link State
Routing Protocol using Route Trusts for WSNs (DTLSRP)”, Wireless Sensor Network,
International Journal for Scientific Research, 2011, 3, 125-134.
doi:10.4236/wsn.2011.34015 Published Online April 2011.
[5] Guoxing Zhan, Weisong Shi, and Julia Deng, “TARF: A Trust-aware Routing Framework For
Wireless Sensor Networks”, Wayne State University, Detroit, MI 48202, USA.
[6] T.Kavitha, D.Sridharan, “Security vulnerabilities In Wireless Sensor Networks: A Survey”
Journal of Information Assurance and Security, Vol. 5 (2010) 031-044.
[7] Jaydip Sen, “A Survey on Wireless Sensor Network Security”, International Journal of
Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009.
[8] Chris Karlof, David Wagner, “Secure routing in WSNs: attacks and countermeasures”, Ad hoc
networks Journal, Vol. 1, Issue 2-3, Sept. 2003, pp.293-315.
[9] Asad Amir Pirzada, Chris McDonald, and Amitava Datta “Performance comparison of Trust-
Based Reactive Routing Protocols”, IEEE Transactions on mobile computing, Vol. 5, No. 6,
June 2006.
[10] Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “LEAP: Efficient Security Mechanisms for Large-
Scale Distributed Sensor Networks”, Proc. Of 10th
ACM conf. on Computer and
Communications Security, 2003.
[11] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, “SPINS: Security
Protocols for Sensor Networks”, 7th
Annual International Conference on Mobile Computing and
Networking (MobiCom 2001), 2001.
[12] Chris Karlof, Naveen Sastry, David Wagner, “TinySec: A Link Layer Security Architecture for
Wireless Sensor Networks”, SenSys’04, November 3-5, 2004, Baltimore, Maryland, USA.
[13] HangRok Lee, YongJe Choi, HoWon Kim, “Implementation of TinyHash based on Hash
Algorithm for Sensor Network”, World Academy of Science, Engineering and Technology, Vol.
10, 2005.
[14] Matthias Becker, Sven Schaust and Eugen Wittmann, “Performance of Routing Protocols for
Real Wireless Sensor Networks”, 10th
Int. Symposium on Performance Evaluation of Computer
and Telecommunication Systems (SPECTS’07), San Diego, USA, 2007.
[15] Matthew J. Probst and Sneha Kumar Kasera, “Statistical Trust Establishment in Wireless Sensor
Networks”, 13th
International Conference on Parallel and Distributed Systems, 2007.
[16] Theodore Zahariadis, Helen Leligou, Panagiotis Karkazis, Panagiotis Trakadas, Ioannis
Papaefstathiou, Charalambos Vangelatos, Lionel Besson, “Design and Implementation Of A
Trust-Aware Routing Protocol For Large WSNs”, International Journal of Network Security &
Its Applications (IJNSA), Vol. 2, No. 3, July 2010, pp. 52-68.
[17] Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, “Geometric Mean based Trust
Management System for WSNs (GMTMS)”, Proceedings of the International Conference
“World Congress on Information and Communication Technologies 2011 ( IEEE WICT- 2011)”,
Mumbai, December 2011, pp. 444-449.
[18] Asad Amir Pirzada and Chris McDonald, “Trusted Greedy Perimeter Stateless Routing”, IEEE,
ICON 2007.
[19] Y.C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad
Hoc Networks”, Proc. Eighth Ann. Int’l Conf. Mobile Computing and Networking (MobiCom),
pp. 12-23.
[20] Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victorwen and David E. Culler, “SPINS: Security
Protocols for Sensor Networks”, ACM Journal of Wireless Networks, 8:5, September 2002, pp.
521 – 534.
14. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012
34
[21] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad-hoc
Networks”, in Proceedings of the Sixth Annual International Conference on Mobile Computing
and Networking (MobiCom), ACM Press, 2000, pp. 255 – 265.
[22] S. Buchegger and J. Boudec, “ Performance Analysis of the CONFIDANT Protocol:
Cooperation Of Nodes – Fairness In Distributed Ad-hoc Networks”, in proceedings of the 3rd
ACM International Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc),
ACM Press, 2002, pp. 226-236.
[23] Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy, “Location-centric
Isolation of Misbehavior and Trust routing in Energy-constrained Sensor Networks”, IEEE
International Conference on Performance, Computing and communications, 2004.