Secure Routing in Wireless Sensor Network using HTARF
International Journal of Computer Science and Engineering |
© 2016 by SSRG - IJCSE Journal |
Volume 3 Issue 5 |
Year of Publication : 2016 |
Authors : M.S.Krishnaveni, Dr.K.Kavitha |
How to Cite?
M.S.Krishnaveni, Dr.K.Kavitha, "Secure Routing in Wireless Sensor Network using HTARF," SSRG International Journal of Computer Science and Engineering , vol. 3, no. 5, pp. 27-30, 2016. Crossref, https://doi.org/10.14445/23488387/IJCSE-V3I5P104
Abstract:
A wireless sensor network (WSN) is a group of distributed sensor self organizing (managing) nodes. There different types of attacks (DOS, Sybil, stealthy, wormhole attack) that affects the security level of the network. Hence the security is the major issue of the WSN. To improve the security level of the network, the trust parameters should be implemented with energy conservation. Here HTARF (Hybrid Trust Aware Routing Framework) is implemented to improve the security level and lifetime of the network. In this paper HTARF algorithm and its uses are discussed. Through this algorithm energy awareness is established in network. HTARF algorithm provides trustworthable secure routing. The simulation analysis proposed here is based on three parameters are Energy Monitor, Trust Aware Manager and Distance Measurement Analyzer. This simulation analysis results are measured for the performance metrics (Packet Delivery Ratio, Latency, Energy Conservation, False Positive Rate and Detection Ratio). The Hybrid Trust Aware Routing Framework implementation in WSN provides better energy conservation, high packet delivery ratio and efficient security metrics.
Keywords:
DOS, Energy Awareness, HTARF, Latency, Security, Trust Awareness, WSN.
References:
[1] https://en.wikipedia.org/wiki/Wireless_sensor_ne twork
[2] G. Theodorakopoulos and J. S. Baras, “On trust models and trust evaluation metrics for ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 318–328, 2006. View at Publisher · View at Google Scholar · View at Scopus
[3] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,”IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2–22, 2006. View at Google Scholar
[4] http://www.hindawi.com/journals/ijdsn/2014/209436/
[5] S. R. Zakhary and M. Radenkovic, “Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments,” in Proceedings of the 7th International Conference on Wireless On-demand Network Systems and Services (WONS '10), pp. 161–167, February 2010. View at Publisher ·View at Google Scholar · View at Scopus
[6] L. Abusalah, A. Khokhar, and M. Guizani, “Trust aware routing in mobile ad hoc networks,” inProceedings of the IEEE Telecommunications Conference (GLOBECOM '06), pp. 1–5, December 2006.View at Publisher · View at Google Scholar · View at Scopus
[7] http://www.hindawi.com/journals/ijdsn/2014/209436/