| Peer-Reviewed

Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs

Received: 26 August 2013     Published: 30 September 2013
Views:       Downloads:
Abstract

In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although, significant research effort has been spent on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. In order to enhance the security of routing information between the nodes, energy efficient and trust metric based routing protocol using collection tree protocol (CTP) for wireless sensor networks (WSN) has been proposed. Simulated results presented here indicate that the proposed protocol satisfactorily performs the routing and is strong against attacks by exploiting the replay of routing information.

Published in International Journal of Sensors and Sensor Networks (Volume 1, Issue 5)
DOI 10.11648/j.ijssn.20130105.13
Page(s) 61-68
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2013. Published by Science Publishing Group

Keywords

WSN, Trust Model Management, Energy Efficient Routing, Secure Routing, Routing in WSN Survey

References
[1] G. Zhan, W. Shi, and J. Deng, "Design and implementation of tarf: a trust aware routing framework for wsns," IEEE Transaction on Dependable and Secure Computing, vol. 9, no. 2, pp.184-197, 2012.
[2] F. Zhao and L. Guibas, Wireless Sensor Networks: Information Processing Approach, Elsevier Morgan Kaufmann, Boston, 2004.
[3] S. Ganeriwal, L. Balzano, and M. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Trans. Sensor Networks, vol. 4, pp. 1-37, 2008.
[4] G. Zhan, W. Shi, and J. Deng, "Poster abstract: sensortrust—a resilient trust model for WSNs," Proc. Seventh Int’l Conf. Embedded Networked Sensor Systems (SenSys ’09), pp. 1-3, 2009.
[5] A. Woo, T. Tong, and D. Culler, "Taming the underlying challenges of reliable multihop routing in sensor networks," Proc. First ACM Int’l Conf. Embedded Networked Sensor Systems, pp. 14-27, 2003.
[6] C. Perkins and P. Bhagwat, "Highly dynamic destination- sequenced distance-vector routing (dsdv) for mobile computers," ACM SIGCOMM Computer Comm. Rev., vol. 24, no. 4, pp. 234-244, 1994.
[7] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, "Collection tree protocol," Proc. Seventh ACM Conf. Embedded Networked Sensor Systems, pp. 1-14, 2009.
[8] L. Bai, F. Ferrese, K. Ploskina, and S. Biswas, "Performance analysis of mobile agent-based wireless sensor network," Proc. Eighth Int’l Conf. Reliability, Maintainability and Safety, pp. 16-19, 2009.
[9] L. Zhang, Q. Wang, and X. Shu, "A mobile-agent-based middleware for wireless sensor networks data fusion," Proc. Instrumentation and Measurement Technology Conf. (I2MTC ’09), pp. 378-383, 2009.
[10] W. Xue, J. Aiguo, and W. Sheng, "Mobile agent based moving target methods in wireless sensor networks," Proc. IEEE Int’l Symp. Comm. and Information Technology (ISCIT ’05), vol. 1, pp. 22- 26, 2005.
[11] A. Wood and J. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
[12] C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Proc. First IEEE Int’l Workshop Sensor Network Protocols and Applications, pp. 113-127, 2003.
[13] J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis and defences," Proc. Third Int’l Conf. Information Processing in Sensor Networks (IPSN ’04), pp. 259-268, 2004.
[14] G.Theodorakopoulos and J. S. Baras , " On trust models and trust evaluation metrics for ad-Hoc networks," IEEE Journal on Selected Areas in Communications (JSAC), vol. 24, no. 2, pp. 318-328, 2006.
[15] C. Liu, Y. Liu and Z. Zhang, "Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-11, 2013.
[16] I. Rijin, N. Sakthivel, and S. Subasree, "Development of an enhanced efficient secured multihop routing technique for wsns," International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 3, pp. 506-512, 2013.
[17] P. Deepa, A. Shalini, and J. Joshi, "Trust management for mobile ad hoc networks using recommendation exchange protocol," International Journal of Computer Trends and Technology, vol.1, no. 2, pp. 115-118, 2011.
[18] G. Crossby, L. Hester, and N. Pissinou, "Location-aware, trust-based detection and isolation of compromised nodes in wsns," International Journal of Network Security, vol. 12, no.2, pp. 107-117, 2011.
[19] H. Chen, "Task based trust management for wsns," International Journal of Security and its Applications, vol. 3, no. 2, pp. 22-26 2009.
[20] J. Al-Karaki and A. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communications, vol. 11, no.6, pp. 6–28, 2004.
[21] R. Perrig, Szewczyk, W. Wen, D. Culler, and J. Tygar, "Security protocols for sensor networks(SPINS)," Wireless Networks Journal (WINET), vol. 8, no.5, pp. 521–534, 2002.
[22] C. Karlof, N. Sastry, and D. Wagner, "Tinysec: link layer security architecture for wireless sensor networks," In. Proc. of ACM SenSys, pp.162-175, 2004.
Cite This Article
  • APA Style

    Pooja Kalidas Shinde, Veeresh Gangappa Kasabegoudar. (2013). Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs. International Journal of Sensors and Sensor Networks, 1(5), 61-68. https://doi.org/10.11648/j.ijssn.20130105.13

    Copy | Download

    ACS Style

    Pooja Kalidas Shinde; Veeresh Gangappa Kasabegoudar. Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs. Int. J. Sens. Sens. Netw. 2013, 1(5), 61-68. doi: 10.11648/j.ijssn.20130105.13

    Copy | Download

    AMA Style

    Pooja Kalidas Shinde, Veeresh Gangappa Kasabegoudar. Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs. Int J Sens Sens Netw. 2013;1(5):61-68. doi: 10.11648/j.ijssn.20130105.13

    Copy | Download

  • @article{10.11648/j.ijssn.20130105.13,
      author = {Pooja Kalidas Shinde and Veeresh Gangappa Kasabegoudar},
      title = {Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs},
      journal = {International Journal of Sensors and Sensor Networks},
      volume = {1},
      number = {5},
      pages = {61-68},
      doi = {10.11648/j.ijssn.20130105.13},
      url = {https://doi.org/10.11648/j.ijssn.20130105.13},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijssn.20130105.13},
      abstract = {In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although, significant research effort has been spent on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. In order to enhance the security of routing information between the nodes, energy efficient and trust metric based routing protocol using collection tree protocol (CTP) for wireless sensor networks (WSN) has been proposed. Simulated results presented here indicate that the proposed protocol satisfactorily performs the routing and is strong against attacks by exploiting the replay of routing information.},
     year = {2013}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Energy Efficient and Trust Metric Based Routing Technique Using Collection Tree Protocol for WSNs
    AU  - Pooja Kalidas Shinde
    AU  - Veeresh Gangappa Kasabegoudar
    Y1  - 2013/09/30
    PY  - 2013
    N1  - https://doi.org/10.11648/j.ijssn.20130105.13
    DO  - 10.11648/j.ijssn.20130105.13
    T2  - International Journal of Sensors and Sensor Networks
    JF  - International Journal of Sensors and Sensor Networks
    JO  - International Journal of Sensors and Sensor Networks
    SP  - 61
    EP  - 68
    PB  - Science Publishing Group
    SN  - 2329-1788
    UR  - https://doi.org/10.11648/j.ijssn.20130105.13
    AB  - In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although, significant research effort has been spent on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. In order to enhance the security of routing information between the nodes, energy efficient and trust metric based routing protocol using collection tree protocol (CTP) for wireless sensor networks (WSN) has been proposed. Simulated results presented here indicate that the proposed protocol satisfactorily performs the routing and is strong against attacks by exploiting the replay of routing information.
    VL  - 1
    IS  - 5
    ER  - 

    Copy | Download

Author Information
  • Post Graduate Department, Mahatma Basaveshwar Education Society’s, College of Engineering, Ambajogai, India, 431 517

  • Post Graduate Department, Mahatma Basaveshwar Education Society’s, College of Engineering, Ambajogai, India, 431 517

  • Sections