Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications

B. Sreevidya, Dr.M. Supriya
{"title":"Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications","authors":"B. Sreevidya, Dr.M. Supriya","doi":"10.58346/jowua.2024.i1.003","DOIUrl":null,"url":null,"abstract":"Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. While incorporating data security, the most important requirement of wireless sensor nodes being energy optimized also need to be kept in consideration. There are various forms of assaults that are relevant in Wireless Sensor Networks (WSN). Attacks like Black Hole attacks, sink hole attacks, False data Injection attacks etc. are the most commonly seen attacks on WSNs. The common element in all these attacks is the concept of malicious / compromised node - a node which either drops / modifies the data content while forwarding it. Existing techniques for data security generally use cryptographic algorithms, but the use of cryptographic algorithms is in contrast with the energy optimization requirement of sensor nodes. An energy efficient data security scheme needs to be developed. The proposed system analyses several attacks and proposes a multi-layer data security approach to prevent change of data / dropping of data by the compromised nodes. The proposed system is a routing protocol referred as Trust Based Routing (TBR). A concept of trust value of a node is the core idea of TBR. Forwarding node is selected based on highest trust value and thus avoid malicious / compromised nodes from being involved in the routing process. The trust factor is calculated by considering the number of packets dropped, packets rejected, and the node's remaining energy. The idea of TBR is enhanced by incorporating the concept of past trust and trust of node towards a specific destination. This proposed scheme is referred as Extended Trust Based Routing (ETBR). This scheme is further enhanced by including Direct Trust, Indirect Trust and Energy Trust concepts. This scheme is referred as Consolidated Trust Estimation – Trust Based Routing (CTE-TBR). Network Simulator NS2 is used to simulate the proposed schemes. Various network factors are compared to classic Adhoc On-Demand Vector (AODV) and newly proposed schemes. The result indicates the effectiveness of the proposed data security scheme in terms of energy efficiency and Packet Delivery ratio (PDR).","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"58 17","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jowua.2024.i1.003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. While incorporating data security, the most important requirement of wireless sensor nodes being energy optimized also need to be kept in consideration. There are various forms of assaults that are relevant in Wireless Sensor Networks (WSN). Attacks like Black Hole attacks, sink hole attacks, False data Injection attacks etc. are the most commonly seen attacks on WSNs. The common element in all these attacks is the concept of malicious / compromised node - a node which either drops / modifies the data content while forwarding it. Existing techniques for data security generally use cryptographic algorithms, but the use of cryptographic algorithms is in contrast with the energy optimization requirement of sensor nodes. An energy efficient data security scheme needs to be developed. The proposed system analyses several attacks and proposes a multi-layer data security approach to prevent change of data / dropping of data by the compromised nodes. The proposed system is a routing protocol referred as Trust Based Routing (TBR). A concept of trust value of a node is the core idea of TBR. Forwarding node is selected based on highest trust value and thus avoid malicious / compromised nodes from being involved in the routing process. The trust factor is calculated by considering the number of packets dropped, packets rejected, and the node's remaining energy. The idea of TBR is enhanced by incorporating the concept of past trust and trust of node towards a specific destination. This proposed scheme is referred as Extended Trust Based Routing (ETBR). This scheme is further enhanced by including Direct Trust, Indirect Trust and Energy Trust concepts. This scheme is referred as Consolidated Trust Estimation – Trust Based Routing (CTE-TBR). Network Simulator NS2 is used to simulate the proposed schemes. Various network factors are compared to classic Adhoc On-Demand Vector (AODV) and newly proposed schemes. The result indicates the effectiveness of the proposed data security scheme in terms of energy efficiency and Packet Delivery ratio (PDR).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于信任的路由选择--基于 WSN 的关键数据应用中的数据安全新方法
无线技术改变了实体之间的通信方式。无线网络在军事、医疗保健和栖息地监测等领域创造了许多机会。然而,只有少数数据关键型应用建立在无线传感器网络上,如边境侦察、检测侵权行为和病人监测。这些应用需要处理大量私人数据。由于大多数应用都对数据敏感,因此确保无线传感器网络之间的数据传输安全至关重要。在保证数据安全的同时,还需要考虑到无线传感器节点最重要的要求是能量优化。与无线传感器网络(WSN)相关的攻击形式多种多样。黑洞攻击、沉洞攻击、虚假数据注入攻击等都是 WSN 上最常见的攻击。所有这些攻击的共同点是恶意/受损节点的概念--节点在转发数据时丢弃或修改数据内容。现有的数据安全技术通常使用加密算法,但加密算法的使用与传感器节点的能量优化要求相悖。因此需要开发一种高能效的数据安全方案。所提出的系统分析了几种攻击,并提出了一种多层数据安全方法,以防止受损节点更改数据或丢弃数据。所提议的系统是一种路由协议,被称为基于信任的路由(TBR)。节点的信任值概念是 TBR 的核心思想。转发节点根据最高信任值进行选择,从而避免恶意/受损节点参与路由过程。信任系数是通过考虑丢弃的数据包数量、拒绝的数据包数量以及节点的剩余能量计算得出的。TBR 的理念通过纳入过去信任度和节点对特定目的地的信任度的概念得到了增强。这一建议方案被称为基于信任的扩展路由(ETBR)。通过纳入直接信任、间接信任和能量信任概念,该方案得到了进一步增强。该方案被称为综合信任估计--基于信任的路由(CTE-TBR)。网络模拟器 NS2 用于模拟所提出的方案。将各种网络因素与传统的 Adhoc On-Demand Vector(AODV)和新提出的方案进行了比较。结果表明,建议的数据安全方案在能效和数据包传输率(PDR)方面非常有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
4.40
自引率
0.00%
发文量
0
期刊介绍: JoWUA is an online peer-reviewed journal and aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks, ubiquitous computing, and their dependable applications. JoWUA consists of high-quality technical manuscripts on advances in the state-of-the-art of wireless mobile networks, ubiquitous computing, and their dependable applications; both theoretical approaches and practical approaches are encouraged to submit. All published articles in JoWUA are freely accessible in this website because it is an open access journal. JoWUA has four issues (March, June, September, December) per year with special issues covering specific research areas by guest editors.
期刊最新文献
Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm Human-Centric AI : Enhancing User Experience through Natural Language Interfaces A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1