@ijisme_beiesp

TAEER: Trust Aware Energy Efficient Routing Frame Work for Wireless Sensor Networks

, , , , and . International Journal of Innovative Science and Modern Engineering (IJISME), 3 (2): 67-74 (January 2015)

Abstract

Wireless Sensor Networks are basically employed for critical tasks whose operation is of prime importance.The sensor nodes are deployed in an environment where human intervention is not possible most of the times. The deployment of sensor nodes in habitat monitoring, health care, military fields demands that security to be in place because the data being handled is highly confidential. Wireless sensor networks are vulnerableto a wide set of attacks which threaten the network operation. The routing procedure employed inwireless sensor networks must becapable of preventing the data integrity loss that results out of the both active and passive attacks. In addition to the network being secure, trust establishment atvarious points at which the data is transmitted and energy awareness is essential tohave high network lifetime. Networks are highly constrained in resources such as memory, processing capabilities and energy. This resourceconstraint is a rigid obstacle against applying traditional security mechanism like cryptographic solutions which need too much processing power and thus leading to heavy energy consumption. The limited energy resources on sensor nodes makethem an attractive target for the attackers. Our proposed protocol caters to include trustworthiness and energy awareness by including a trust model thatincludesboth directand indirecttrusts.The proposed protocol safeguards a wireless sensor network from intruders by considering the trustworthiness of the forwarder node at every stage of multi-hop routing. Increasesnetwork lifetime by considering the energy level of the node, preventstheadversaryfrom tracing the route from source to destination by providing path variation. The protocolis built on NS2 Simulator. Experimental results show that the protocol provides energy balance through establishment of trustworthy paths from the sourceto thedestination.

Links and resources

Tags