Call for Paper - March 2022 Edition
IJCA solicits original research papers for the March 2022 Edition. Last date of manuscript submission is February 22, 2022. Read More

Reliable and Secured Routing in Wireless Sensor Networks using Active Trust

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Sneha K., Akhila S.

Sneha K. and Akhila S.. Reliable and Secured Routing in Wireless Sensor Networks using Active Trust. International Journal of Computer Applications 170(10):27-32, July 2017. BibTeX

	author = {Sneha K. and Akhila S.},
	title = {Reliable and Secured Routing in Wireless Sensor Networks using Active Trust},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2017},
	volume = {170},
	number = {10},
	month = {Jul},
	year = {2017},
	issn = {0975-8887},
	pages = {27-32},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2017914892},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


A Wireless Sensor Network (WSN) comprises of devices that are autonomously distributed in space used to supervise the physical and environmental conditions with the help of sensors. They are mainly used in security critical applications such as monitoring the environment, tracking the surroundings and controlling areas. Security is an important requirement in WSNs. Because of the resource limitation and computational constraints the WSNs are transparent to various security attacks. Black hole attack is a serious attack which badly affects the packet transfer from source to destination. Here the Active Trust scheme is used to avoid the Black hole attack. The Active Trust scheme avoids the black holes through Active detection routing and data routing which improves the route security. The results obtained will indicate that the Active Trust scheme can achieve the same throughput as that of the normal Wireless Sensor Network without black holes. This shows the importance of Active Trust scheme in black hole attacks.


  1. Yuxin Liu, Mianxiong Dong, “ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks,” IEEE, vol.11, No.9, September-2016,pp.2013-2027.
  2. J. Wang, Y. Liu, and Y. Jiao, “Building A Trusted Route In A Mobile Ad Hoc Network Considering Communication Reliability And Path Length,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1138–1149, 2011.
  3. Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo, “Mobile Target Detection In Wireless Sensor Networks With Adjustable Sensing Frequency,” IEEE Syst. J., to be published, doi: 10.1109/JSYST.2014.2308391.
  4. H. C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, “Combining Trust With Location Information For Routing In Wireless Sensor Networks,” Wireless Commun. Mobile Comput. vol. 12, no. 12, pp. 1091–1103, 2012.
  5. M.-Y. Hsieh, Y.-M. Huang, and H.-C. Chao, “Adaptive Security Design With Malicious Node Detection In Cluster-Based Sensor Networks,” Comput. Commun., vol. 30, nos. 11–12, pp. 2385–2400, 2007
  6. Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “Energy And Memory Efficient Clone Detection In Wireless Sensor Networks,” IEEE Trans. Mobile Comput., vol. 15, no. 5,May 2016,pp.1130–1143, doi: 10.1109/TMC.2015.2449847.
  7. Network Simulator 2.35 available at
  8. S. Mandala, K. Jenni, A. Ngadi, M. Kamat, and Y. Coulibaly, “Quantify- Ing The Severity Of Blackhole Attack In Wireless Mobile Adhoc Networks,”in Security in Computing and Communications. Berlin, Germany: Springer, 2014, pp. 57–67.


Active Trust, Black holes, Throughput.