Trust-based routing in wireless sensor networks using fuzzy logic
Subject Areas : Electronics EngineeringH. Moemenzadeh Haghighi 1 , fatemeh bavi 2 , masoud etesami 3
1 - 1Islamic Azad University, Bushehr branch, Bushehr, Iran
2 - Islamic Azad University, Genaveh branch, Bushehr, Iran
3 - Islamic Azad University, Genaveh branch, Bushehr, Iran
Keywords:
Abstract :
Wireless sensor networks, network generation with high potential in the field of the most unpredictable and dynamic environments .. However, this network because of its open media, Changing and dynamic topology and routing algorithms is fragile. Ad hoc networks and wireless networks support different features, such as dynamic self-organizing, self-configuring, self-correction, high scalability, easy maintenance and reliable services, Despite its many features already mentioned, this network is very susceptible to damage from attacks. The absence of a central control system known weakness is perhaps the most important reason. Hierarchical dynamic network topology also allows the implementation of security mechanisms disclaims grid design. By reliable way to offer solutions that can change the nature of attacks against network node that is a dangerous counter attack in this area and to restore network . Characteristic features of the method, computational overhead and minimal power dissipation on the one hand and preventing attacks on the network works. Strategy and the proposed mechanism is evaluated using the simulator NS2.
[1] Zahariadis, Theodore, Helen C. Leligou, Panagiotis Trakadas, and Stamatis Voliotis. "Trust management in wireless sensor networks." European Transactions on Telecommunications 21, no. 4 (2010): 386-395.
[2] خدیجه نخعی "به کار گیری الگوریتم تطبیقی برای تعیین اعتماد بین گرههای شبکه حسگر "پایاننامه کارشناسی ارشد ،دانشگده مهندسی فناوری اطلاعات گرایش مخابرات امن ،دانشگاه علم و صنعت ،خردادماه 1389
[3] Zahariadis, Theodore, Helen C. Leligou, Panagiotis Trakadas, and Stamatis Voliotis. "Trust management in wireless sensor networks." European Transactions on Telecommunications 21, no.
[4] Zhan, G., Shi, W., Deng, J. (2012) Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 9, NO. 2.
[5] Zahariadis, T., Leligou, H., Karkazis, P., Trakadas, P., Papaefstathiou, I., Vangelatos C., Besson, L. (2010) DESIGN AND IMPLEMENTATION OF ATRUST-AWARE ROUTING ROTOCOL FOR LARGEWSNS. International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3
[6] AsadPirzada, A., McDonald, C. (2007) Trusted Greedy Perimeter Stateless Routing. IEEE ICON.
[7] P.Samundiswary, “Trust based Energy aware Reactive Routing Protocol for WirelessSensor Networks”, International Journal of Computer Applications (0975 – 8887) Volume 43– No.21, April 2012
[8] Theodore Zahariadis, Helen Leligou, Panagiotis Karkazis,Panagiotis Trakadas, Ioannis Papaefstathiou,Charalambos Vangelatos, Lionel Besson, ''DESIGN AND Implementation of atrust-aware routing protocol for large wsns”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010
[9] Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867-880.
[10] Dogan, G., & Brown, T. (2014). A Survey of Provenance Leveraged Trust in Wireless Sensor Networks. Computer Engineering and Intelligent Systems, 5(2), 1-11.
[11] Bao, F., Chen, R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. Network and Service Management, IEEE Transactions on, 9(2), 169-183.
[12] Devisri, S., & Balasubramaniam, C. (2013). Secure routing using trust based mechanism in wireless sensor networks (WSNs). International Journal of Scientific & Engineering Research, 4(2), 1-7.
[13] Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 80(3), 602-617.
_||_[1] Zahariadis, Theodore, Helen C. Leligou, Panagiotis Trakadas, and Stamatis Voliotis. "Trust management in wireless sensor networks." European Transactions on Telecommunications 21, no. 4 (2010): 386-395.
[2] خدیجه نخعی "به کار گیری الگوریتم تطبیقی برای تعیین اعتماد بین گرههای شبکه حسگر "پایاننامه کارشناسی ارشد ،دانشگده مهندسی فناوری اطلاعات گرایش مخابرات امن ،دانشگاه علم و صنعت ،خردادماه 1389
[3] Zahariadis, Theodore, Helen C. Leligou, Panagiotis Trakadas, and Stamatis Voliotis. "Trust management in wireless sensor networks." European Transactions on Telecommunications 21, no.
[4] Zhan, G., Shi, W., Deng, J. (2012) Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 9, NO. 2.
[5] Zahariadis, T., Leligou, H., Karkazis, P., Trakadas, P., Papaefstathiou, I., Vangelatos C., Besson, L. (2010) DESIGN AND IMPLEMENTATION OF ATRUST-AWARE ROUTING ROTOCOL FOR LARGEWSNS. International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3
[6] AsadPirzada, A., McDonald, C. (2007) Trusted Greedy Perimeter Stateless Routing. IEEE ICON.
[7] P.Samundiswary, “Trust based Energy aware Reactive Routing Protocol for WirelessSensor Networks”, International Journal of Computer Applications (0975 – 8887) Volume 43– No.21, April 2012
[8] Theodore Zahariadis, Helen Leligou, Panagiotis Karkazis,Panagiotis Trakadas, Ioannis Papaefstathiou,Charalambos Vangelatos, Lionel Besson, ''DESIGN AND Implementation of atrust-aware routing protocol for large wsns”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010
[9] Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867-880.
[10] Dogan, G., & Brown, T. (2014). A Survey of Provenance Leveraged Trust in Wireless Sensor Networks. Computer Engineering and Intelligent Systems, 5(2), 1-11.
[11] Bao, F., Chen, R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. Network and Service Management, IEEE Transactions on, 9(2), 169-183.
[12] Devisri, S., & Balasubramaniam, C. (2013). Secure routing using trust based mechanism in wireless sensor networks (WSNs). International Journal of Scientific & Engineering Research, 4(2), 1-7.
[13] Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 80(3), 602-617.