Abstract
A wireless sensor networks encompasses battery powered sensor nodes with extremely limited processing capabilities. One of the major challenges in WSN is to overcome the attacks like Sinkhole, Wormhole and Sybil, Dos attacks, Selective forwarding etc. which reduces the performance of the network, since the Cryptographic techniques are not much effective in solving this problem. So in order to protect wireless sensor networks from attacks and to perform improvement in some of the aspects we have implemented a low overhead trust aware routing with energy efficient network protocol. This protocol is designed by incorporating the trust aware routing frame work with adaptive periodic threshold sensitive energy efficient network protocol. By minimizing the attacks, the network provides a better QOS with trustworthy and energy efficient route which leads to increase the network life time.













Similar content being viewed by others
References
Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans. Depend. Secure Comput. 9, 184–197 (2012)
Zhao, F., Guibas, L.: Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann, Burlington (2004)
Wood, A.D., Stankovic, J.: Denial of service in sensor networks. Computer 35, 54–62 (2002)
Jain, M., Kandwal, H.: A survey on complex wormhole attack in wireless ad hoc networks. In: Proceeding of International Conference Advances in Computing, Control, and Telecomm. Technologies (ACT ’09), pp. 555–558 (2009)
Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks; the intruder side. In: Proceedings of IEEE International Conference Wireless and Mobile Computing, Networking and Communication (WIMOB ’08), pp. 526–531 (2008)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis and defenses. In: Proceedings Third International Conference Information Processing in Sensor Networks (IPSN ’04) (2004)
Bai, L., Ferrese, F., Ploskina, K., Biswas, S.: Performance analysis of mobile agent-based wireless sensor network. In: Proceeding Eighth International Conference Reliability, Maintainability and Safety (ICRMS ’09), pp. 16–19 (2009)
Zhang, L., Wang, Q., Shu, X.: A mobile-agent-based middleware for wireless sensor networks data fusion. In: Proceeding Instrumentation and Measurement Technology Conference (I2MTC ’09), pp. 378–383 (2009)
Xue, W., Aiguo, J., Sheng, W.: Mobile agent based moving target methods in wireless sensor networks. In: Proceedings IEEE International Symposium Communication and Information Technology (ISCIT ’05), vol. 1, pp. 22–26 (2005)
Jeong, H.-J., Nam, C.-S., Jeong, Y.-S., Shin, D.-R.: A mobile agent based leach in wireless sensor networks. In: Proceedings 10th International Conference Advanced Communication Technology (ICACT ’08), vol. 1, pp. 75–78 (2008)
Al-Karaki, J., Kamal, A.: Routing techniques in wireless sensor networks: a survey. Wirel. Commun. 11(6), 6–28 (2004)
Karlof, C., Sastry, N., Wagner, D.: Tinysec: a link layer security architecture for wireless sensor networks. In: Proceeding ACM International Conference Embedded Networked Sensor Systems (SenSys ’04) (2004)
Perrig, A., Szewczyk, R., Wen, W., Culler, D., Tygar, J.: SPINS: security protocols for sensor networks. Wirel. Netw. J. 8(5), 521–534 (2002)
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 59–64 (2004)
Liu, A., Ning, P.: Tinyecc: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings Seventh International Conference Information Processing in Sensor Networks (IPSN ’08), pp. 245–256 (2008)
Safa, H., Artail, H., Tabet, D.: A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel. Netw. 16(4), 969–984 (2010)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., Lam, K.: Trust based routing for misbehavior detection in ad hoc networks. J. Netw. 5(5), 551–558 (2010)
Yan, Z., Zhang, P., Virtanen, T.: Trust evaluation based security solution in ad hoc networks. In: Proceedings Seventh Nordic Workshop Secure IT Systems (2003)
Li, J.L.X., Lyu, M.R.: Taodv: A Trusted AODV routing protocol for mobile ad hoc networks. In: Proceedings of Aerospace Conference (2004)
Kavita, A.P.: Design and implementation of tarf for WSNs. Int. J. Sci. Res. (IJSR) 3, 1944–1947 (2012)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Udhayavani, M., Chandrasekaran, M. Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: a trust-aware routing framework for wireless sensor networks. Cluster Comput 22 (Suppl 5), 11919–11927 (2019). https://doi.org/10.1007/s10586-017-1512-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1512-1