72 research outputs found
Trust based routing protocol in MANET
Traditional network routing protocols find the shortest path by minimizing a cost over the paths. Number of hops is the most common metric to measure this cost of forwarding. However, this administrative cost metric is not guaranteed to have the same level of quality in mobile ad hoc networks (MANET). In addition malicious nature of nodes augments the problem even further. There is a need for generic cost metric to find the most reliable path for forwarding the packets. We propose a trust-based metric for routing in MANETs. This metric works as a reliability measure of nodes and the ad hoc routing protocol tries to find the most reliable path. We propose a quantitative measure of trustworthiness of a node based on node's properties like signal strength, stability, node's performance to forward packets and its rating by other nodes. To our knowledge, our approach is the first attempt to use a generic trust metric for reliable routing in MANETs
Comprehensive Trust based Routing Protocol to Mitigate Black-hole attack in Wireless Sensor Networks
Wireless Sensor Network (WSN) is a collection of sensor nodes, that sense environmental data and send it to the administrator for further processing. Sensor nodes are wireless devices with limited battery and are vulnerable to security attacks such as black hole attack, gray hole attack, sink hole attack etc. Researchers have proposed many security mechanisms to mitigate security attacks. Trust based approaches have gained tremendous interest among researchers to embed security in WSNs. A Trust Based Secure Routing Protocol to mitigate black hole attack is presented in this paper. The protocol computes comprehensive trust value for each node and routes the packets only through the nodes with trust value > 0.5. The results of the proposed protocol are compared with TBSEER [10] protocol. The results show an improvement in Packet Delivery Ratio (PDR), throughput, End to End (EED), routing overhead and energy consumption
Recommended from our members
ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks
his paper presents a new routing protocol called Secure and Energy Aware Routing Protocol (ETARP) designed for energy efficiency and security for wireless sensor networks (WSNs). ETARP attempts to deal with WSN applications operating in extreme environments such as the battleield. The key part of the routing protocol is route selection based on utility theory. The concept of utility is a novel approach to simultaneously factor energy eiciency and trustworthiness of routes in the routing protocol. ETARP discovers and selects routes on the basis of maximum utility with incurring additional cost in overhead compared to the commonAODV (Ad Hoc On Demand Distance Vector) routing protocol. Simulation results show that, in comparison to previously proposed routing protocols, namely, AODV-EHA and LTB-AODV (Light-Weight Trust-Based Routing Protocol), the proposed ETARP can keep the same security level while achieving more energy eiciency for data packet delivery
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its
excellent security properties and operating facilities. It allows operating on
data without revealing its content. In this work, we suggest using homomorphism
for Hardware Trojan protection. We implement two partial homomorphic designs
based on ElGamal encryption/decryption scheme. The first design is a
multiplicative homomorphic, whereas the second one is an additive homomorphic.
We implement the proposed designs on a low-cost Xilinx Spartan-6 FPGA. Area
utilization, delay, and power consumption are reported for both designs.
Furthermore, we introduce a dual-circuit design that combines the two earlier
designs using resource sharing in order to have minimum area cost. Experimental
results show that our dual-circuit design saves 35% of the logic resources
compared to a regular design without resource sharing. The saving in power
consumption is 20%, whereas the number of cycles needed remains almost the sam
Fuzzy TOPSIS-based Secure Neighbor Discovery Mechanism for Improving Reliable Data Dissemination in Wireless Sensor Networks
Wireless Sensor Networks (WSNs) being an indispensable entity of the Internet of Things (IoT) are found to be more and more widely utilized for the rapid advent of IoT environment. The reliability of data dissemination in the IoT environment completely depends on the secure neighbor discovery mechanism that are utilized for effective and efficient communication among the sensor nodes. Secure neighbor discovery mechanisms that significantly determine trustworthy sensor nodes are essential for maintaining potential connectivity and sustaining reliable data delivery in the energy-constrained self organizing WSN. In this paper, Fuzzy Technique of Order Preference Similarity to the Ideal Solution (TOPSIS)-based Secure Neighbor Discovery Mechanism (FTOPSIS-SNDM) is proposed for estimating the trust of each sensor node in the established routing path for the objective of enhancing reliable data delivery in WSNs. This proposed FTOPSIS-SNDM is proposed as an attempt to integrate the merits of Fuzzy Set Theory (FST) and TOPSIS-based Multi-criteria Decision Making (MCDM) approach, since the discovery of secure neighbors involves the exchange of imprecise data and uncertain behavior of sensor nodes. This secure neighbor is also influenced by the factors of packet forwarding potential, delay, distance from the Base Station (BS) and residual energy, which in turn depends on multiple constraints that could be possibly included into the process of secure neighbor discovery. The simulation investigations of the proposed FTOPSIS-SNDM confirmed its predominance over the benchmarked approaches in terms of throughput, energy consumption, network latency, communication overhead for varying number of genuine and malicious neighboring sensor nodes in network
Secure Data Transmission in IoT based on Optimization Based Routing Protocol for Wireless Body Area Networks
The security of Internet of Things (IoT) networks has become highly significant due to the growing number of IoT devices and the rise in data transfer across body area networks. The main purpose is to enhance the security level of data transmission between patients and health service providers by considering the availability of energy at sensor nodes through the Wireless Body Area Network. Energy efficiency is considered a foremost challenge to increase the lifetime of a network. To deal with energy efficiency, one of the important systems is selecting the relay node, which can be modeled as an optimization problem. This research proposes the patient health collected data are needed for transmission in IoT-Patient Care Monitoring (PCM) based on the Optimized Routing Protocol along WBANs. The proposed model focuses on a routing mechanism that makes use of an Optimization Routing-based Algorithm along with the relay node selection based on distances and residual energies. DO NOT USE SPECIAL CHARACTERS, SYMBOLS, OR MATH IN YOUR TITLE OR ABSTRACT
- …