Trust-based energy-aware routing using GEOSR protocol for Ad-Hoc sensor networks

被引:4
作者
Kumar, Ranjit [1 ]
Tripathi, Sachin [2 ]
Agrawal, Rajeev [2 ]
机构
[1] Indian Inst Technol, Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] GL Bajaj Inst Technol & Management, Greater Noida 201306, India
关键词
Energy consumption; Malicious Nodes; Plain text attack; Residual energy and trust evaluation; COMMUNICATION; ALGORITHM;
D O I
10.1007/s11276-022-02991-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The openness nature of the Ad-hoc sensor networks emerged as a security threat in this network environment that leads to packets drop, network overhead, high range energy consumption, and transmission delay. Previous methods such as Trust-Based Malicious Nodes Detection in AD-hoc (TBMND) and Security based Data-Aware Routing Protocol (SDARP) found that this happens due to malicious nodes in the network. A malicious node in a network degrades its efficiency that also affects the routing decision making and also makes error decisions in route selection. Trust vector model and Trust-based Secure Routing (TBSR) have made attempts to evaluate trust nodes via various techniques, but unfortunately, the accuracy level has not been reached to the required range. In this paper, a trust-based energy-aware routing using GEOSR protocol for Ad-hoc sensor networks is presented for providing an energy-efficient and secured routing. In this trust-based energy-aware routing, initially the sensor nodes are deployed in the ad-hoc network. The clustering is performed based on the estimation of distance among the each nodes and the cluster head (CH) is selected based on the threshold value. After CH selection, the trust evaluation is performed for identify the trust and untrusted nodes present in the network. The untrusted node is considered as malicious node which is detected and blocked. The trusted nodes are forwarded to select the optimal routing path for secured transmission. Golden Eagle Optimized Secure Routing (GEOSR) is introduced for selecting the optimal routing path based on the parameters such as distance delay and energy objective function. Thus, energy-efficient and secured routing were done using the GEOSR protocol. GEOSR protocol was then implemented in the NS-2 simulation tool and then compared with existing techniques. GEOSR protocol shows 95% of residual energy for the prediction of two malicious nodes. Thus GEOSR was suitable for real-time applications.
引用
收藏
页码:2913 / 2936
页数:24
相关论文
共 29 条
  • [1] TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    [J]. IEEE SENSORS JOURNAL, 2015, 15 (12) : 6962 - 6972
  • [2] A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network
    Akhter, A. F. M. Suaib
    Ahmed, Mohiuddin
    Shah, A. F. M. Shahen
    Anwar, Adnan
    Kayes, A. S. M.
    Zengin, Ahmet
    [J]. SENSORS, 2021, 21 (04) : 1 - 21
  • [3] Anand M., 2021, Mater. Today: Proc, P1
  • [4] Bertino, 2014, DATA PRIVACY MANAGEM, P1725
  • [5] A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks
    Gunasekaran, Mahalakshmi
    Periakaruppan, Subathra
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS, 2017, 104 (06) : 993 - 1007
  • [6] Hanin MH., 2021, INT J INTERACTIVE MO, V15, P125, DOI [10.3991/ijim.v15i14.22021, DOI 10.3991/IJIM.V15I14.22021]
  • [7] Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs
    Haseeb, Khalid
    Islam, Naveed
    Almogren, Ahmad
    Din, Ikram Ud
    Almajed, Hisham N.
    Guizani, Nadra
    [J]. IEEE ACCESS, 2019, 7 : 79980 - 79988
  • [8] Hassan M.H., 2021, Bulletin of Electrical Engineering and Informatics, V10, P192, DOI 10.11591/eei.v10i1.2506
  • [9] Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks
    Jhaveri, Rutvij H.
    Patel, Narendra M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [10] Jhaveri RH, 2016, INT J NEXT-GENER COM, V7, P130