International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.6, No.11, Oct. 2014

An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks

Full Text (PDF, 397KB), PP.13-19

Views:216   Downloads:2


P. Raghu Vamsi, Krishna Kant

Index Terms

Trust;security;geographic routing;reputation;security attacks;wireless sensor networks


In this paper, an improvement over Trusted Greedy Perimeter Stateless Routing (T-GPSR) is presented. T-GPSR employs heuristic weight values to evaluate total trust value of neighboring nodes. However, heuristic assignment of weights provide flexibility but it is not suitable in presence of several security attacks such as Grey hole, selfish behavior, on-off attack etc., are launched in the network in different proportions. To overcome this limitation, an improvement is suggested with an emphasis on trust update, lightweight trust computation and storage to reduce communication and storage overhead. The simulation study indicates that the packet delivery ratio of the improved T-GPSR has improved by 10% over T-GPSR in the presence of 50% of malicious nodes in the network.

Cite This Paper

P. Raghu Vamsi, Krishna Kant,"An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks", IJCNIS, vol.6, no.11, pp.13-19, 2014. DOI: 10.5815/ijcnis.2014.11.02


[1]I.F.Akyildiz, W.Su, Y Sankarasubramaniam, E. Cayirci,”Wireless Sensor Networks: A Survey”, Computer Networks, Elsevier, Pages 393-422, Volume 38, Issue 4, 15 March 2002.

[2]Kannan Govindan, Prasant Mohapatra,” Trust computations and Trust Dynamics in Mobile Adhoc Networks: A Survey”, IEEE Communications Surveys and Tutorials, vol 14, No 2, Second Quarter 2012.

[3]Marcela Mejia, Nestor Pena, Jose L Munoz, Oscar Espanza, “A Review of trust modeling in adhoc networks”, Internet Research, Vol 19, issue 1, pp 88-104, 2010.

[4]M. Carmen Fern andez-Gago, Rodrigo Rom an, Javier Lopez, A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks”, proceedings of Third International Workshop on SecPerU 2007.

[5]B. Karp and H. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” in Proceedings of the 6th Annual ICMCN, ACM Press, 2000, pp. 243–254. 

[6]AA Pirzada, C McDonald,” Trusted Greedy Perimeter Stateless Rout-ing”, proceedings of ICON 2007.

[7]Nael Abu Gazaleh, Kyoung Don Kang and Ke Liu, ”Towards Resilient Geographic Routing in WSNs”, Proceedings of Q2Winter, Oct 13, 2005.

[8]Ka-Shun Hung, King-Shan Lui, and Yu-Kwong Kwok, ”A Trust Based Geographical Routing Scheme in Sensor Networks”, proceedings of IEEE WCNC, March 2007.

[9]Wymeersch, H, Lien, J. and Win, M.Z., “Cooperative localization in wireless networks”, Proceedings of the IEEE, Volume: 97, Issue: 2, Pages: 427 – 450, February 2009.

[10]Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li,” Trust mechanism in wireless sensor networks: attack analysis and countermeasures”, Journal of Network and computer Applications 35 (2012) 867-880.

[11]Chris Karlof, David Wagner, ”Secure Routing in Wireless Sensor Networks: Attacks and Counter Measures”, Ad hoc Networks, Special Issue on Sensor Networks protocols and applications, Elsevier Publication, Volume 1, Issues 2-3, Pages 211-350, September 2003.

[12]Aurlien Francillon, Claude Castelluccia,” Code Injection Attacks on Harvard-Architecture Devices”, proceedings of CCS08, October 2731, 2008.

[13]Audun Josang, Roslan Ismail, ”The Beta Reputation System”, proceedings of 15th Bled Electronic Commerce Conference, Bled, Slovenia, June 17 - 19, 2002. 

[14]Saurabh Ganeriwal and Mani B. Srivastava,” Reputation-based model for High Integrity Sensor Networks”, proceedings of SASN04, October 25, 2004.

[15]P. Raghu Vamsi and Krishna Kant, “Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review”, proceedings of ACCT, 8-9 February, 2014.

[16]Network simulator ns-2 available at

[17]GPSR source code

[18]G.Jose Moses, P.Suresh Varma, N.Supriya, G.NagaSatish, "Security Aspects and Challenges in Mobile Adhoc Networks", IJCNIS, vol.4, no.6, pp.26-32, 2012.

[19]G.Sunayana, Sukrutharaj.M, Lalitha rani.N, M.B.Kamakshi, "Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols", IJCNIS, vol.4, no.12, pp.65-72, 2012.