A trust based clustering routing scheme to enhance the security of WSNs

6Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Because of the nature of efficiency and load balancing, LEACH based hierarchical routing protocols mixed with trust management techniques can be one of the good choices to design a trustable and secured wirelesssensornetwork where each node can trust highly on the next hop on their forwarding path.Trust management models can be used as much powerful while aimimg at designing a secured and attack-resistant protocol for routing in wireless sensor networks.In case of trust management models,there are various methodologies and ways exist for computing trust value of a normal sensor node and/or that of a cluster head node and afterwards the resulted trust value can be used in different ways to find a secure routing path.This paper aims to provide a trust management scheme to address the packet drop attack or blackhole attack made by a compromised sensor node inside WSNs.Alongwith the security feature against the above attack,we have implemented DIJKSTRA shortest path algorithm to regain the speed efficiency which may have been degraded due to trust computation in various phases of the routing inside and outside of clusters in the network.

Cite

CITATION STYLE

APA

Panigrahi, L. (2019). A trust based clustering routing scheme to enhance the security of WSNs. International Journal of Innovative Technology and Exploring Engineering, 8(9), 1113–1121. https://doi.org/10.35940/ijitee.i7811.078919

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free