Skip to main content

Trust Based Energy Efficient Clustering Protocol in Wireless Sensor Networks for Military Applications

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 721))

Included in the following conference series:

  • 1576 Accesses

Abstract

Wireless sensor network finds its prominence in military applications because the sensing nature of sensors deduces uncertainty. As the sensors may work in harsh environments, minimal or no manual attention can be given to the sensors. Hence they are prone to adversary attacks. With the objective of obtaining security in these environments, trust based energy efficient method TBEM is suggested for clustered wireless sensor networks. By energy efficient and trust based clustering, security and decrease in energy deprivation in Wireless sensor networks can be achieved. The method is compared with existing Low Energy Adaptive Clustering Hierarchy LEACH protocol. The achieved minimal false positives and false negatives are presented for performance analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Durisic, M.P., Tafa, Z., Milutinovic, V.M: A survey of military applications of wireless sensor networks. In: Proceedings of the Mediterranean Conference on Embedded Computing (MECO), pp. 12–20, June 2012

    Google Scholar 

  2. Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N.: Security issues and attacks in wireless sensor network. World Appl. Sci. J. 30(10), 1224–1227 (2014). doi:10.5829/idosi.wasj.2014.30.10.334

    Google Scholar 

  3. Xing, K., Sundhar, S., Srinivasan, R., Rivera, M., Li, J., Cheng, X.: Attacks and counter measures in sensor networks: a survey. In: Huang, S.C.-H., MacCallum, D., Du, D.-Z. (eds.) Network Security, pp. 251–272. Springer, Heidelberg (2010). doi:10.1007/978-0-387-73821-5_11

    Chapter  Google Scholar 

  4. Thakkar, A., Kotecha, K.: Cluster head election for energy and delay constraint applications of wireless sensor networks. IEEE Sens. J. 14(8), 2658–2664 (2014). doi:10.1109/JSEN.2014.2312549

    Article  Google Scholar 

  5. Liu, C.-M., Lee, C.-H.: Distributed algorithms for energy-efficient cluster-head election in wireless mobile sensor networks. In: Proceedings of the International Conference on Wireless Networks, ICWN, pp. 405–411 (2005)

    Google Scholar 

  6. Mahajan, S., Malhotra, J., Sharma, S.: An energy balanced QoS based cluster head selection strategy for WSN. Egypt. Inform. J. 15(3), 189–199 (2014). doi:10.1016/j.eij.2014.09.001

    Article  Google Scholar 

  7. Tyagi, S., Kumar, N.: A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks. J. Netw. Comput. Appl. 36(2), 623–645 (2013). doi:10.1016/j.jnca.2012.12.001

    Article  Google Scholar 

  8. Yanli, Yu., Li, Y., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks attack analysis and countermeasures. J. Netw. Comput. Appl. 35(1), 867–880 (2011). doi:10.1016/j.jnca.2011.03.005

    Google Scholar 

  9. Ishmanov, F., Kim, S.W., Nam, S.Y.: A robust trust establishment scheme for wireless sensor networks. Sensors 15(3), 7040–7061 (2015). doi:10.3390/s150307040

    Article  Google Scholar 

  10. Ahmed, A., Abu Bakar, K., Channa, M.I., et al.: A trust aware routing protocol for energy constrained wireless sensor network. Telecommun. Syst. 61, 123 (2016). doi:10.1007/s11235-015-0068-8

    Article  Google Scholar 

  11. Ahmed, A., Bakar, K.A., Channa, M.I., et al.: A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Netw. Appl. 21, 272 (2016). doi:10.1007/s11036-016-0683

    Article  Google Scholar 

  12. Gao, W., Zhang, G., Chen, W., Li, Y.: A trust model based on subjective logic. In: Proceedings of the International Conference on Internet Computing for Science and Engineering, pp. 272–276 (2009)

    Google Scholar 

  13. Chen, M., Zhou, Y., Tang, L.: Ray projection method and its applications based on Grey Prediction. Chin. J. Stat. Decis. 1(1), 13–20 (2007)

    Google Scholar 

  14. Shao, K., Luo, F., Mei, N., Liu, Z.: Normal distribution based dynamical recommendation trust model. J. Softw. 23(12), 3130–3148 (2012). doi:10.3724/SP.J.1001.2012.04204

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. P. Rani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Rani, T.P., Jayakumar, C. (2017). Trust Based Energy Efficient Clustering Protocol in Wireless Sensor Networks for Military Applications. In: Singh, M., Gupta, P., Tyagi, V., Sharma, A., Ören, T., Grosky, W. (eds) Advances in Computing and Data Sciences. ICACDS 2016. Communications in Computer and Information Science, vol 721. Springer, Singapore. https://doi.org/10.1007/978-981-10-5427-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5427-3_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5426-6

  • Online ISBN: 978-981-10-5427-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics