Abstract
Wireless sensor network finds its prominence in military applications because the sensing nature of sensors deduces uncertainty. As the sensors may work in harsh environments, minimal or no manual attention can be given to the sensors. Hence they are prone to adversary attacks. With the objective of obtaining security in these environments, trust based energy efficient method TBEM is suggested for clustered wireless sensor networks. By energy efficient and trust based clustering, security and decrease in energy deprivation in Wireless sensor networks can be achieved. The method is compared with existing Low Energy Adaptive Clustering Hierarchy LEACH protocol. The achieved minimal false positives and false negatives are presented for performance analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Durisic, M.P., Tafa, Z., Milutinovic, V.M: A survey of military applications of wireless sensor networks. In: Proceedings of the Mediterranean Conference on Embedded Computing (MECO), pp. 12–20, June 2012
Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Security issues and attacks in wireless sensor network. World Appl. Sci. J. 30(10), 1224–1227 (2014). doi:10.5829/idosi.wasj.2014.30.10.334
Xing, K., Sundhar, S., Srinivasan, R., Rivera, M., Li, J., Cheng, X.: Attacks and counter measures in sensor networks: a survey. In: Huang, S.C.-H., MacCallum, D., Du, D.-Z. (eds.) Network Security, pp. 251–272. Springer, Heidelberg (2010). doi:10.1007/978-0-387-73821-5_11
Thakkar, A., Kotecha, K.: Cluster head election for energy and delay constraint applications of wireless sensor networks. IEEE Sens. J. 14(8), 2658–2664 (2014). doi:10.1109/JSEN.2014.2312549
Liu, C.-M., Lee, C.-H.: Distributed algorithms for energy-efficient cluster-head election in wireless mobile sensor networks. In: Proceedings of the International Conference on Wireless Networks, ICWN, pp. 405–411 (2005)
Mahajan, S., Malhotra, J., Sharma, S.: An energy balanced QoS based cluster head selection strategy for WSN. Egypt. Inform. J. 15(3), 189–199 (2014). doi:10.1016/j.eij.2014.09.001
Tyagi, S., Kumar, N.: A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. J. Netw. Comput. Appl. 36(2), 623–645 (2013). doi:10.1016/j.jnca.2012.12.001
Yanli, Yu., Li, Y., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks attack analysis and countermeasures. J. Netw. Comput. Appl. 35(1), 867–880 (2011). doi:10.1016/j.jnca.2011.03.005
Ishmanov, F., Kim, S.W., Nam, S.Y.: A robust trust establishment scheme for wireless sensor networks. Sensors 15(3), 7040–7061 (2015). doi:10.3390/s150307040
Ahmed, A., Abu Bakar, K., Channa, M.I., et al.: A trust aware routing protocol for energy constrained wireless sensor network. Telecommun. Syst. 61, 123 (2016). doi:10.1007/s11235-015-0068-8
Ahmed, A., Bakar, K.A., Channa, M.I., et al.: A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Netw. Appl. 21, 272 (2016). doi:10.1007/s11036-016-0683
Gao, W., Zhang, G., Chen, W., Li, Y.: A trust model based on subjective logic. In: Proceedings of the International Conference on Internet Computing for Science and Engineering, pp. 272–276 (2009)
Chen, M., Zhou, Y., Tang, L.: Ray projection method and its applications based on Grey Prediction. Chin. J. Stat. Decis. 1(1), 13–20 (2007)
Shao, K., Luo, F., Mei, N., Liu, Z.: Normal distribution based dynamical recommendation trust model. J. Softw. 23(12), 3130–3148 (2012). doi:10.3724/SP.J.1001.2012.04204
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rani, T.P., Jayakumar, C. (2017). Trust Based Energy Efficient Clustering Protocol in Wireless Sensor Networks for Military Applications. In: Singh, M., Gupta, P., Tyagi, V., Sharma, A., Ören, T., Grosky, W. (eds) Advances in Computing and Data Sciences. ICACDS 2016. Communications in Computer and Information Science, vol 721. Springer, Singapore. https://doi.org/10.1007/978-981-10-5427-3_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-5427-3_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5426-6
Online ISBN: 978-981-10-5427-3
eBook Packages: Computer ScienceComputer Science (R0)