Call For Paper Volume:4 Issue:8 Aug'2017 |

Trusted Routing Path Selection in WSNs through TARF

Publication Date : 31/12/2014

Author(s) :

M.P.Vijaya Kumar , Dr. Monica R Mundada.

Volume/Issue :
Volume 1
Issue 6
(12 - 2014)

Abstract :

In wireless Sensor Networks data transfer is insecure, because the intruders may use duplicate IP address to hack the confidential data. Hop by hop authentication is necessary for secured communication to prevent such confidentiality Multi hop routing in Wireless sensor networks (WSNs) offers little protection against the identity deception through replaying routing information. This defect may take a chance of an adversary to misdirect significant network traffic, resulting in disastrous consequences attacks against the routing protocols including Sinkhole, Worm hole and Sybil attacks. The situation is further aggravated by mobile & harsh network condition. It cannot be solved by traditional encryption or authentication techniques or efforts at developing trust aware routing protocols do not effectively address this severe problem. Secure the WSNs against adversaries misdirecting the multi-hop routing. So proposed a method is “Trusted Routing Path Selection in WSNs through TARF”, a robust trust-aware routing framework for dynamic WSNs. Without tight time synchronization or known geographic information. TARF provides trustworthy, secure, time efficient & energy efficient route. Most importantly TARF proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments on large scale WSNs under various scenarios. Keywords: Trust Manger, Trusted node, Un-trusted node, WSNs (Wireless Sensor Networks), ECC (Elliptic Curve Cryptography), Sinkhole Attack, Wormhole Attack, Sybil Attack.

No. of Downloads :



Web Design MymensinghPremium WordPress ThemesWeb Development

Trusted Routing Path Selection in WSNs through TARF

December 30, 2014