Loading

A Trust Based Clustering Routing Scheme to Enhance the Security of WSNs
Lakshmisree Panigrahi

Lakshmisree Panigrahi, Assistant Professor and a PhD Student in Computer Science & Engineering Department of Siksha O Anusandhan Deemed to be University, Bhubaneswar, India.
Manuscript received on 18 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 1113-1121 | Volume-8 Issue-9, July 2019 | Retrieval Number: I7811078919/19©BEIESP | DOI: 10.35940/ijitee.I7811.078919

Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Because of the nature of efficiency and load balancing, LEACH based hierarchical routing protocols mixed with trust management techniques can be one of the good choices to design a trustable and secured wireless sensor network where each node can trust highly on the next hop on their forwarding path. Trust management models can be used as much powerful while aimimg at designing a secured and attack-resistant protocol for routing in wireless sensor networks.In case of trust management models,there are various methodologies and ways exist for computing trust value of a normal sensor node and/or that of a cluster head node and afterwards the resulted trust value can be used in different ways to find a secure routing path.This paper aims to provide a trust management scheme to address the packet drop attack or blackhole attack made by a compromised sensor node inside WSNs.Alongwith the security feature against the above attack,we have implemented DIJKSTRA shortest path algorithm to regain the speed efficiency which may have been degraded due to trust computation in various phases of the routing inside and outside of clusters in the network.
Keywords: DIJKSTRA Shortest Path, LEACH, Multi-Hop, Wireless Sensor Network, Blackhole Attack, Trust Management

Scope of the Article: Clustering