Loading

Trustworthy Routing in Wireless Sensor Networks Using Hop Count Filter
Pritesh A. Patil1, R. S. Deshpande2

1Pritesh A. Patil, Department of E&TC, VIIT Pune, Affiliated to Savitribai Phule Pune University, (Maharashtra), India.
2Dr. R.S. Deshpande, Principal, SCSMCOE, Nepti, Ahmednagar, Affiliated to Savitribai Phule Pune University, (Maharashtra), India
Manuscript received on 07 March 2019 | Revised Manuscript received on 20 March 2019 | Manuscript published on 30 March 2019 | PP: 303-313 | Volume-8 Issue-5, March 2019 | Retrieval Number: E3305038519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless Sensor Networks transmit data from source to destination and inform base station using various sensors. However, the routing path through multiple hops of WSNs usually becomes the target of severe attacks. Outmoded cryptographic security techniques have proven to be inefficient against several insider attacks such as wormhole attack, sinkhole attack, Sybil attack, selective forwarding attack, etc. These attacks further impacts on restating of routing information and also exacerbate identity deception. To handle such instances, trust aware routing can be the alternative to provide a trustworthiness and energy efficient route irrespective of known geographic information or tight time synchronization. Significantly, it is strong against the attacks caused due to identity theft. Besides that WSNs are also vulnerable to the attacks illegally acquiring network resources which is caused by many popular attacks. These attacks are complex as it affect not only the victim but its legitimate members also. Existing routing techniques could not solve these severe issues. We are proposing an effective solution, M-TARF to significantly defend network from annoying resource acquisition imposed by adversaries on compromised nodes and its neighbours through additional component hop_count_filter. The proposed scheme demonstrated an average throughput of 6.4% which is more that existing scheme when implemented on NS2 for varying number of nodes.
Keyword: Hop Count Filter, Supervisor, Trust_ Advisor, Energy_Recorder, Hop_Count.
Scope of the Article: Network Protocols & Wireless Networks