CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Trust based Energy aware Reactive Routing Protocol for Wireless Sensor Networks

by P.Samundiswary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 21
Year of Publication: 2012
Authors: P.Samundiswary
10.5120/6391-8841

P.Samundiswary . Trust based Energy aware Reactive Routing Protocol for Wireless Sensor Networks. International Journal of Computer Applications. 43, 21 ( April 2012), 37-40. DOI=10.5120/6391-8841

@article{ 10.5120/6391-8841,
author = { P.Samundiswary },
title = { Trust based Energy aware Reactive Routing Protocol for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 21 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 37-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number21/6391-8841/ },
doi = { 10.5120/6391-8841 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:34:20.929481+05:30
%A P.Samundiswary
%T Trust based Energy aware Reactive Routing Protocol for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 21
%P 37-40
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Recently, Wireless Sensor Networks (WSNs) have drawn a lot of attention due to broad applications in military, civilian wildlife monitoring and disaster management. Sensor networks are composed of large number of densely deployed sensor nodes with limited energy and computation. Since these nodes operate in a physically insecure environment, they are susceptible to various types of attacks. These attacks infuse malevolent packets by compromising the nodes. Various secured reactive routing protocols have been developed with the help of cryptographic techniques in order to protect the network against the compromised nodes. However the routing protocols using encryption schemes require large memory for storing the keys and more computation. Further, these protocols have been developed without the consideration of energy aware algorithm. In this paper, trust based energy aware reactive routing protocol is developed for wireless sensor networks by appending trust based mechanism in the energy aware reactive routing protocol. The performance of the proposed protocol has been evaluated and analysed in terms of delivery ratio for different number of nodes

References
  1. . C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures", Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, pp. 113-127, May 2003.
  2. A. Perrig, J. Stankovic and D. Wagner, "Security in wireless sensor networks", Communications of the ACM, vol. 47, no. 6, pp. 53-57, June 2004.
  3. Yong Wang, Garhan Attebury and Byrav Ramamurthy, "A survey of security issues in wireless sensor networks", IEEE Communications Survey and Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
  4. Kalpana Sharma, M. K. Ghose and Kuldeep, "Complete security framework for wireless sensor network", International Journal of Computer Science and Information Security, vol. 3, no. 1, pp. 196-202, July 2009.
  5. Pirzada and C. McDonald, "Establishing trust in pure adhoc networks", Proceedings of the 27th Australasian Computer Science Conference, Dunedin, New Zealand, vol. 26, no. 1, pp. 47-54, January 2004.
  6. Mohammad Momani and Subhash Challa "Survey of trust models in different network domains" International Journal of Ad hoc, Sensor & Ubiquitous Computing, vol. 1, no. 3, pp. 1-19, September 2010.
  7. Charles E. Perkins, "Ad hoc On-demand Distance Vector Routing", RFC 3561, IETF MANET Working Group, July 2003.
  8. Asar Ali and Zeeshan Akbar, "Evaluation of AODV and DSR routing protocols of wireless sensor networks for monitoring applications", Thesis Report, Department of Electrical Engineering with Telecommunication, Blekinge Institute of Technology, Sweden, October 2009.
  9. Georgy Sklyarenko, "AODV routing protocol", Seminar Technische Informatik, Institut fur Informatik, Freie Universitat, Berlin, Germany, July 2006
  10. Sachin Sharma, H. M. Gupta and S. Dharmaraja, "EAGR: Energy aware greedy routing scheme for wireless Adhoc networks", International Symposium on Performance Evaluation of Computer and Telecommunication Systems, David Hume Building and William Robertson Building, Edinburgh, UK, pp. 122-128, June 2008.
  11. Uk-Pyo Han, Sang-Eon Park and Young-Jun Chung, " An efficient energy aware routng protocol for wireless sensor networks", Proceedings of International Conference on Wireless Networks, Las Vegas, pp. 122-127, June 2006.
  12. Asad Amir Pirzada , Amitava Datta and Chris McDonald, "Trust-based routing for adhoc wireless networks", Proceedings of 12th IEEE International Conference on Networks , vol. 1, pp. 326-330, November 2004.
  13. Kamal Deep Meka, Mohit Virendra and Shambhu Upadhyaya, "Trust based routing decisions in mobile adhoc networks", Proceedings of 2nd Workshop on Secure Knowledge Management, Brooklyn, New York, September 2006.
  14. H. C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis and T. Zahariadis, "Combining trust with location information for routing in wireless sensor networks", Research Article, Wireless Communications and Mobile Computing, John Wiley and Sons Ltd. , December 2010.
  15. I. Downard, "Simulating sensor networks in ns-2," NRL Formal Report 5522-04-10, Naval Research Laboratory, Washington, May 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Wsn Aodv Rreq Rrep Eaodv Atv Otv Teaodv