CFP last date
22 April 2024
Reseach Article

Reliable and Secured Routing in Wireless Sensor Networks using Active Trust

by Sneha K., Akhila S.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Number 10
Year of Publication: 2017
Authors: Sneha K., Akhila S.
10.5120/ijca2017914892

Sneha K., Akhila S. . Reliable and Secured Routing in Wireless Sensor Networks using Active Trust. International Journal of Computer Applications. 170, 10 ( Jul 2017), 27-32. DOI=10.5120/ijca2017914892

@article{ 10.5120/ijca2017914892,
author = { Sneha K., Akhila S. },
title = { Reliable and Secured Routing in Wireless Sensor Networks using Active Trust },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 170 },
number = { 10 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 27-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume170/number10/28116-2017914892/ },
doi = { 10.5120/ijca2017914892 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:08.275508+05:30
%A Sneha K.
%A Akhila S.
%T Reliable and Secured Routing in Wireless Sensor Networks using Active Trust
%J International Journal of Computer Applications
%@ 0975-8887
%V 170
%N 10
%P 27-32
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Wireless Sensor Network (WSN) comprises of devices that are autonomously distributed in space used to supervise the physical and environmental conditions with the help of sensors. They are mainly used in security critical applications such as monitoring the environment, tracking the surroundings and controlling areas. Security is an important requirement in WSNs. Because of the resource limitation and computational constraints the WSNs are transparent to various security attacks. Black hole attack is a serious attack which badly affects the packet transfer from source to destination. Here the Active Trust scheme is used to avoid the Black hole attack. The Active Trust scheme avoids the black holes through Active detection routing and data routing which improves the route security. The results obtained will indicate that the Active Trust scheme can achieve the same throughput as that of the normal Wireless Sensor Network without black holes. This shows the importance of Active Trust scheme in black hole attacks.

References
  1. Yuxin Liu, Mianxiong Dong, “ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks,” IEEE, vol.11, No.9, September-2016,pp.2013-2027.
  2. J. Wang, Y. Liu, and Y. Jiao, “Building A Trusted Route In A Mobile Ad Hoc Network Considering Communication Reliability And Path Length,” J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1138–1149, 2011.
  3. Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo, “Mobile Target Detection In Wireless Sensor Networks With Adjustable Sensing Frequency,” IEEE Syst. J., to be published, doi: 10.1109/JSYST.2014.2308391.
  4. H. C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, “Combining Trust With Location Information For Routing In Wireless Sensor Networks,” Wireless Commun. Mobile Comput. vol. 12, no. 12, pp. 1091–1103, 2012.
  5. M.-Y. Hsieh, Y.-M. Huang, and H.-C. Chao, “Adaptive Security Design With Malicious Node Detection In Cluster-Based Sensor Networks,” Comput. Commun., vol. 30, nos. 11–12, pp. 2385–2400, 2007
  6. Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “Energy And Memory Efficient Clone Detection In Wireless Sensor Networks,” IEEE Trans. Mobile Comput., vol. 15, no. 5,May 2016,pp.1130–1143, doi: 10.1109/TMC.2015.2449847.
  7. Network Simulator 2.35 available at http://www.NS-2.35.org/
  8. S. Mandala, K. Jenni, A. Ngadi, M. Kamat, and Y. Coulibaly, “Quantify- Ing The Severity Of Blackhole Attack In Wireless Mobile Adhoc Networks,”in Security in Computing and Communications. Berlin, Germany: Springer, 2014, pp. 57–67.
Index Terms

Computer Science
Information Sciences

Keywords

Active Trust Black holes Throughput.