Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network

被引:16
作者
Sajan, R. Isaac [1 ]
Jasper, J. [2 ]
机构
[1] Ponjesly Coll Engn, Dept Comp Sci & Engn, Nagercoil, India
[2] Ponjesly Coll Engn, Dept Elect & Elect Engn, Nagercoil, India
关键词
atom search routing; carousal attack; intrusion detection; stretch attack; trust; vampire attack; wireless ad hoc sensor network; ENERGY-EFFICIENT; OPTIMIZATION; PROTOCOL; HYBRID;
D O I
10.1002/dac.4341
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent development in technologies is the driving force for development in sensors, especially in military applications. Due to the openness nature of the ad hoc sensor network, the system gets easily affected, which may lead to some packet drop, transmission delay, high network overhead, and more energy consumption. In this paper, the security during data transmission is provided to the network by using the proposed Secure Atom Search Routing (SASR) algorithm, which is adopted from the behavior of molecular dynamics. For global optimization problems, this algorithm provides an effective solution based on the constraint and interaction force of atoms. Moreover, the performance of SASR is improved by providing a proper balance between exploitation and exploration. Since the knowledge base processes all the data, the computational complexity is reduced and the lifetime of the network is increased. The simulation and performance are carried out for the proposed Knowledge and Intrusion Detection based Secure Atom Search Routing (KID-SASR) protocol and is compared with the existing methods based on the metrics trust, delay, throughput, energy, packet delivery ratio, network lifetime, trust detection rate, and communication cost. The results obtained show improvement in the overall performance of the system.
引用
收藏
页数:21
相关论文
共 30 条
[1]   TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
IEEE SENSORS JOURNAL, 2015, 15 (12) :6962-6972
[2]  
AlFarraj O., 2018, J AMB INTEL HUM COMP, P1, DOI [10.1007/s12652-018-0885-1, DOI 10.1007/S12652-018-0885-1]
[3]  
[Anonymous], 2019, WIRELESS PERSONAL CO, DOI DOI 10.1007/S11277-019-06155-X
[4]  
Chen IR, 2010, 2010 IEEE GLOB TEL C, P1, DOI DOI 10.1109/GLOCOM.2010.5683235
[5]   PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks [J].
Cho, Jin-Hee ;
Chen, Ing-Ray .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (01) :151-165
[6]   SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems [J].
Das, Anupam ;
Islam, Mohammad Mahfuzul .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) :261-274
[7]   A Scheme for Preventing Denial of Service Attacks on Wireless Sensor Networks [J].
Gill, Khusvinder ;
Yang, Shuang-Hua .
IECON: 2009 35TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS, VOLS 1-6, 2009, :2455-+
[8]   A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks [J].
Gunasekaran, Mahalakshmi ;
Periakaruppan, Subathra .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2017, 104 (06) :993-1007
[9]   An application-specific protocol architecture for wireless microsensor networks [J].
Heinzelman, WB ;
Chandrakasan, AP ;
Balakrishnan, H .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (04) :660-670
[10]   An Efficient Distributed Trust Model for Wireless Sensor Networks [J].
Jiang, Jinfang ;
Han, Guangjie ;
Wang, Feng ;
Shu, Lei ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) :1228-1237