International Journal of Engineering Technology and Management Sciences

2023, Volume 7 Issue 5

A Novel Security Framework: Trust based routing for Wireless Sensor Network

AUTHOR(S)

M.Raju, Dr.K.P.Lochanambal

DOI: https://doi.org/10.46647/ijetms.2023.v07i05.033

ABSTRACT
Nowadays technology is growing very rapidly. The devices are becoming wireless. The telephones are gradually replaced by the mobile and wires are replaced by wireless devices. Even though there is advancement in technology, threats to security are also increasing. Since the medium is wireless, chances of eavesdropping is more and there is security issue of information being transmitted over wireless medium. The nodes can be compromised. The limitations of the nodes are low capacity of storage and lesser battery life. Hence, the security of the data being transmitted on the wireless medium is a serious concern. Because the information that is being transmitted over wireless medium is more vulnerable for attacks. Here, the problem of security and privacy related to the information, that will be passed through the mediatory nodes is considered. Hence a model is proposed to address the problem and solution based on certain considered parameters. Here, we have proposed a model to categorize the nodes into safe and unsafe.

Page No: 284 - 292

References:

    • Sastry N., and Wagner D., 2004. Security considerations for IEEE 802.15.4 networks. In Proceedings of ACM workshop on Wireless security.
    • Bisdikian, C. 2001. An overview of the Bluetooth Wireless technology. IEEE Communication Magazine, vol. 39.
    • Ezhilarasi, M., et al. "A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks." Soft Computing 27.7 (2023): 4157-4168.
    • Saravana Kumar, N. M., S. Deepa, C. N. Marimuthu, T. Eswari, and S. Lavanya. "Signature based vulnerability detection over wireless sensor network for reliable data transmission." Wireless Personal Communications 87 (2016): 431-442.
    • Ngai ECH, Liu J, Lyu MR. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications 2007; 30 (11-12): 2353–2364.
    • Ezhilarasi, M., Krishnaveni, V. (2020). A Novel Paradigm Towards Exploration of Rechargeable WSN Through Deep Learning Architecture for Prolonging Network Lifetime. In: Kumar, L., Jayashree, L., Manimegalai, R. (eds) Proceedings of International Conference on Artificial Intelligence, Smart Grid and Smart City Applications. AISGSC 2019 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-24051-6_87
    • Pawar, S. N. "Intrusion detection in computer network using genetic algorithm approach: a survey." International Journal of Advances in Engineering & Technology 6.2 (2013): 730-736.
    • Tahir, S., Bakhsh, S. T., & Alsemmeari, R. A. (2019). An intrusion detection system for the prevention of an active sinkhole routing attack in Internet of things. International Journal of Distributed Sensor Networks, 15(11), 1550147719889901.
    • Li, Xuanang, et al. "PSAP-WSN: a provably secure authentication protocol for 5g-based wireless sensor networks." CMES-Computer Modeling in Engineering & Sciences 135.1 (2023): 711.
    • Munusamy, Nagarajan, Sneha Vijayan, and M. Ezhilarasi. "Role of Clustering, Routing Protocols, MAC protocols and Load Balancing in Wireless Sensor Networks: An Energy-Efficiency Perspective." Cybernetics and Information Technologies 21.2 (2021): 136-165.
    • Singh, Charanjeet, et al. "A Secure IoT Based Wireless Sensor Network Data Aggregation and Dissemination System." Cybernetics and Systems (2023): 1-13.
    • Papadimitriou A, Fessant FL, Viana AC, Sengul C. Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks. 5th Workshop on Secure Network Protocols (NPSec 2009), USA, Princeton, 2009; 43–48.
    • Ezhilarasi, M., Krishnaveni, V. An evolutionary multipath energy-efficient routing protocol (EMEER) for network lifetime enhancement in wireless sensor networks. Soft Comput 23, 8367–8377 (2019). https://doi.org/10.1007/s00500-019-03928-1
    • Shafiei H, Khonsari A, Derakhshi H, Mousavi P. Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences 2014; 80(3): 644–653.
    • Sneha, V., and M. Nagarajan. "Localization in wireless sensor networks: A review." Cybernetics and Information Technologies 20.4 (2020): 3-26.
    • M. Ezhilarasi, A. Kumar, M. Shanmugapriya, A. Ghanshala and A. Gupta, "Integrated   Healthcare Monitoring System using Wireless Body Area Networks and Internet of Things," 2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT), Kottayam, India, 2023, pp. 1-5, doi: 10.1109/ICITIIT57246.2023.10068616.
    • Yilmazel, Rüstem, and Nihat Inanç. "A novel approach for channel allocation in OFDM based cognitive radio technology." Wireless Personal Communications 120.1 (2021): 307-321.
    • Hashim, H. A. (2020). Enhanced Method to Stream Real Time Data in IoT using Dynamic Voltage and Frequency Scaling with Memory. International Journal of Advanced Computer Science and Applications, 11(11).
    • El Attar, Hussein M., and Mohamed Ibrahim El-Emary. "Energy, delay and hop count multi-constraints QoS routing algorithm for wireless ad-hoc networks." 2017 IEEE 17th International Conference on Communication Technology (ICCT). IEEE, 2017.

     


    How to Cite This Article:
    M.Raju, Dr.K.P.Lochanambal . A Novel Security Framework: Trust based routing for Wireless Sensor Network . ijetms;7(5):284-292. DOI: 10.46647/ijetms.2023.v07i05.033