Self Adaptive Trust Model for Secure Geographic Routing in Wireless Sensor Networks

Full Text (PDF, 568KB), PP.21-28

Views: 0 Downloads: 0

Author(s)

P. Raghu Vamsi 1,* Krishna Kant 1

1. Dept. of CSE, Jaypee Institute of Information Technology, Noida, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2015.03.03

Received: 11 Jun. 2014 / Revised: 17 Oct. 2014 / Accepted: 5 Dec. 2014 / Published: 8 Feb. 2015

Index Terms

Trust, Adaptive Trust Model, Security Attacks, Secure Routing, Intelligent Computing

Abstract

The presence of malicious nodes in the ad hoc and sensor networks poses serious security attacks during routing which affects the network performance. To address such attacks, numerous researchers have proposed defense techniques using a human behavior pattern called trust. Among existing solutions, direct observations based trust models have gained significant attention in the research community. In this paper, the authors propose a Self Adaptive Trust Model (SATM) of secure geographic routing in wireless sensor networks (WSNs). Unlike conventional weight based trust models, SATM intelligently assigns the weights associated with the network activities. These weights are applied to compute the final trust value. SATM considers direct observations to restrict the reputation based attacks. Due to the flexible and intelligent weight computation, SATM dynamically detects the malicious nodes and direct the traffic towards trustworthy nodes. SATM has been incorporated into Greedy Perimeter Stateless Routing (GPSR) protocol. Simulation results using the network simulator NS-2 have shown that GPSR with SATM is robust against detecting malicious nodes.

Cite This Paper

P. Raghu Vamsi, Krishna Kant, "Self Adaptive Trust Model for Secure Geographic Routing in Wireless Sensor Networks", International Journal of Intelligent Systems and Applications(IJISA), vol.7, no.3, pp.21-28, 2015. DOI:10.5815/ijisa.2015.03.03

Reference

[1]I.F.Akyildiz, W.Su, Y Sankarasubramaniam, E. Cayirci, ”Wireless Sensor Networks: A Survey”, Computer Networks, Elsevier, Pages 393-422, Volume 38, Issue 4, 15 March 2002.
[2]P. Raghu Vamsi and Krishna Kant, “Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review”, proceedings of ACCT 2014, 8-9 February, 2014.
[3]Probst, Matthew J., and Sneha Kumar Kasera. “Statistical trust establishment in wireless sensor networks”, Parallel and Distributed Systems, 2007 International Conference on. Vol. 2. IEEE, 2007.
[4]Urpi, A., M. Bonuccelli, and Silvia Giordano. “Modelling cooperation in mobile ad hoc networks: a formal description of selfishness”, WiOpt’03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. 2003.
[5]Kuan Lun Huang, Salil S. Kanhere, Wen Hu, ”Are You Contributing Trustworthy Data? The Case for a Reputation System in Participatory Sensing”, proceedings of MSWiM10, October 1721, 2010.
[6]Saurabh Ganeriwal and Mani B. Srivastava, ”Reputation-based Framework for High Integrity Sensor Networks”, proceedings of SASN04, October 25, 2004.
[7]Suat Ozdemir, ”Functional reputation based reliable data aggregation and transmission for wireless sensor networks”, Computer Communications 31 (2008).
[8]Theodore Zahariadis, Panagiotis Trakadas, Helen C, Leligou, Sotiris Maniatis, Panagiotis Kar, ”A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Net-works”, Wireless Personal Commun DOI 10.1007/s11277-012-0613-7, Springer, Published Online 15 April 2012.
[9]Huang, Lei, Lei Li, and Qiang Tan. “Behavior-based trust in wireless sensor network”, Advanced Web and Network Technologies, and Applications. Springer Berlin Heidelberg, 2006. 214-223.
[10]Theodore Zahariadis, Panagiotis Trakadas, Helen C, Leligou, Sotiris Maniatis, Panagiotis Kar, ”A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Net-works”, Wireless Personal Commun DOI 10.1007/s11277-012-0613-7, Springer, Published Online 15 April 2012.
[11]Huang, Lei, Lei Li, and Qiang Tan. “Behavior-based trust in wireless sensor network”, Advanced Web and Network Technologies, and Applications. Springer Berlin Heidelberg, 2006. 214-223.
[12]Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, proceedings of MOBICOM 2000, Boston MA, USA
[13]V. R. Sarma Dhulipala, N. Karthik, RM. Chandrasekaran ”A Novel Heuristic Approach Based Trust Worthy Architecture for Wireless Sensor Networks”, Wireless Personal Communications, DOI 10.1007/s11277- 012-0688-1, 2012.
[14]Marcela Mejia, Nestor Pena, Jose L Munoz, Oscar Espanza, A Review of trust modeling in adhoc networks”, Internet Research, Vol 19, issue 1, pp 88-104, 2010.
[15]Kannan Govindan, Prasant Mohapatra, ”Trust computations and Trust Dynamics in Mobile Ad hoc Networks: A Survey”, IEEE Communications Surveys and Tutorials, vol 14, No 2, Second Quarter 2012.
[16]M. Carmen Fern andez-Gago, Rodrigo Rom an, Javier Lopez, A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks”, proceedings of Third International Workshop on SecPerU 2007.
[17]Michiardi, P. and Molva, R”, CORE: A collaborative reputation mechanism to enforce node cooperation”, proceeding of IFIP, 2002.
[18]AA Pirzada, C McDonald, ”Trusted Greedy Perimeter Stateless Routing”, proceedings of ICON 2007.
[19]Nael Abu Gazaleh, Kyoung Don Kang and Ke Liu, ”Towards Resilient Geographic Rout-ing in WSNs”, Proceedings of Q2Winter, Oct 13, 2005.
[20]Ka-Shun Hung, King-Shan Lui, and Yu-Kwong Kwok, ”A Trust Based Geographical Routing Scheme in Sensor Networks”, proceedings of IEEE WCNC, March 2007.
[21]Chen, Hongyang, et al. “Cooperative node localization for mobile sensor networks”, Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on. Vol. 1. IEEE, 2008.
[22]Yong wang, Garhan Attebury, Byrav Rammurthy, ”A Survey of Security Issues in Wire-less Sensor Networks”, IEEE Communication Surveys and Tutorials, 2nd Quarter, No 2, Vol 8, 2006.
[23]Audun Jsang, Roslan Ismail, ”The Beta Reputation System”, proceedings of 15th Bled Electronic Commerce Conference, Bled, Slovenia, June 17 - 19, 2002.
[24]Network simulator ns-2 available at: http://www.isi.edu/nsnam/ns/
[25]B. Karp and H. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” in Proceedings of the 6th Annual ICMCN, ACM Press, 2000, pp. 243–254.
[26]GPSR source code available at: http://www.icir.org/bkarp/gpsr/gpsr.html
[27]P. Raghu Vamsi, Payal Khurana Batra and Krishna Kant, “BT-GPSR: An Integrated Trust Model for Secure Geographic Routing for Wireless Sensor Networks”, proceedings of 3rd IEEE Students Conference on Engineering and Systems, 28-30 May 2014.
[28]Sadra Abedinzadeh, Samira Sadaoui,"A Rough Sets-based Agent Trust Management Framework", IJISA, vol.5, no.4, pp.1-19, 2013.DOI: 10.5815/ijisa.2013.04.01
[29]Koffka Khan, Wayne Goodridge,"Impact of Multipath Routing on WSN Security Attacks", IJISA, vol.6, no.6, pp.72-78, 2014. DOI: 10.5815/ijisa.2014.06.08.
[30]Xiang, Ming, Quan Bai, and William Liu. "Trust-based Adaptive Routing for Smart Grid Systems." Journal of Information Processing 22.2 (2014): 210-218.
[31]P. Raghu Vamsi and Krishna Kant, “ An Improved Trusted Greedy Perimeter Stateless Routing for Wireless Sensor Networks”, International Journal of Computer Networks and Information Security, MECS Press, Vol. 6, No. 11, pp. 13-19, 2014.