Secure and Energy-Efficient Routing Protocol for Wireless Sensor Networks Using Trust-Based Optimization

Authors

  • Ms. Bhawana Devi, Dr. Nidhi Mishra

Keywords:

Wireless Sensor Networks, Trust-Based Optimization, Secure Routing Protocol, Energy-Efficient Communication, Packet Delivery Ratio

Abstract

Wireless Sensor Networks have become one of the most important technologies in modern communication systems because of their ability to support real-time monitoring, intelligent automation, environmental observation, healthcare applications, military surveillance, industrial management, and smart infrastructure development. Wireless sensor nodes are generally deployed in distributed environments where communication takes place through wireless links without centralized infrastructure. Although wireless sensor networks provide several advantages in communication and monitoring applications, they also face many critical challenges associated with routing security, limited energy resources, packet transmission reliability, communication delay, malicious attacks, and unstable network topology. The presence of malicious communication nodes may significantly affect network performance by creating packet dropping attacks, black hole attacks, wormhole attacks, spoofing attacks, and unauthorized communication interception. Similarly, excessive communication overhead and repeated packet retransmissions consume significant energy resources and reduce the operational lifetime of wireless sensor networks. Therefore, developing secure and energy-efficient routing mechanisms has become an important research area in wireless communication systems.

The present research focuses on the development of a secure and energy-efficient routing protocol using trust-based optimization techniques for wireless sensor networks. The proposed routing framework combines trust evaluation, secure route selection, energy-aware communication mechanisms, and optimized packet forwarding strategies for improving communication reliability and network security. Trust-based optimization allows the routing protocol to identify reliable communication nodes and isolate suspicious or malicious devices from communication operations. The proposed system continuously evaluates communication reliability based on packet forwarding behaviours, communication consistency, residual energy, packet delivery performance, and routing stability. The routing protocol selects communication paths with higher trust values and lower energy consumption in order to improve packet transmission efficiency and extend overall network lifetime.

References

Akkaya, K. and Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), pp.325-349.

Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), pp.393-422.

Al-Karaki, J. N. and Kamal, A. E. (2004). Routing techniques in wireless sensor networks: A survey. IEEE Wireless Communications, 11(6), pp.6-28.

Clausen, T. and Jacquet, P. (2003). Optimized link state routing protocol. RFC 3626, IETF.

Conti, M., Passarella, A. and Erol-Kantarci, M. (2018). The Internet of People, Things and Services. Elsevier.

Deng, H., Li, W. and Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), pp.70-75.

Ganeriwal, S. and Srivastava, M. B. (2004). Reputation-based framework for high integrity sensor networks. Proceedings of ACM SASN, pp.66-77.

Heinzelman, W. B., Chandrakasan, A. and Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the Hawaii International Conference on System Sciences, pp.1-10.

Hu, Y. C., Perrig, A. and Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks. Proceedings of IEEE INFOCOM, pp.1976-1986.

Jain, A. and Tokekar, V. (2012). Trust based secure routing in wireless sensor networks. International Journal of Engineering Research and Applications, 2(3), pp.246-251.

Johnson, D. B. and Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, pp.153-181.

Karlof, C. and Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), pp.293-315.

Liu, D. and Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. Proceedings of ACM CCS, pp.52-61.

Mainwaring, A., Polastre, J., Szewczyk, R., Culler, D. and Anderson, J. (2002). Wireless sensor networks for habitat monitoring. Proceedings of ACM WSNA, pp.88-97.

Mishra, A., Nadkarni, K. and Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), pp.48-60.

Papadimitratos, P. and Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp.27-31.

Pathan, A. S. K. (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC Press.

Perkins, C. E. and Royer, E. M. (1999). Ad hoc on-demand distance vector routing. Proceedings of IEEE WMCSA, pp.90-100.

Perrig, A., Stankovic, J. and Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), pp.53-57.

Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V. and Culler, D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), pp.521-534.

Roman, R., Zhou, J. and Lopez, J. (2006). Applying intrusion detection systems to wireless sensor networks. IEEE Consumer Communications and Networking Conference, pp.640-644.

Sen, J. (2010). A survey on wireless sensor network security. International Journal of Communication Networks and Information Security, 1(2), pp.55-78.

Sharma, S. and Ghose, M. K. (2010). Wireless sensor networks: An overview on its security threats. ICTACT Journal on Communication Technology, 1(2), pp.42-45.

Singh, S. K., Singh, M. P. and Singh, D. K. (2010). Routing protocols in wireless sensor networks. International Journal of Computer Science and Engineering Survey, 1(2), pp.63-83.

Wang, Y., Attebury, G. and Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2), pp.2-23.

Wood, A. D. and Stankovic, J. A. (2002). Denial of service in sensor networks. Computer, 35(10), pp.54-62.

Xiao, B., Yu, B. and Gao, C. (2006). CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), pp.1218-1230.

Yick, J., Mukherjee, B. and Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), pp.2292-2330.

Yu, Z. and Cho, B. H. (2006). A trust model for wireless sensor networks. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, pp.1-10.

Zhang, Y., Lee, W. and Huang, Y. A. (2003). Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5), pp.545-556.

Downloads

How to Cite

Ms. Bhawana Devi, Dr. Nidhi Mishra. (2023). Secure and Energy-Efficient Routing Protocol for Wireless Sensor Networks Using Trust-Based Optimization. International Journal of Research & Technology, 11(3), 120–132. Retrieved from https://ijrt.org/j/article/view/1320

Similar Articles

<< < 20 21 22 23 24 25 26 27 28 29 > >> 

You may also start an advanced similarity search for this article.