72 research outputs found

    Trust based routing protocol in MANET

    Get PDF
    Traditional network routing protocols find the shortest path by minimizing a cost over the paths. Number of hops is the most common metric to measure this cost of forwarding. However, this administrative cost metric is not guaranteed to have the same level of quality in mobile ad hoc networks (MANET). In addition malicious nature of nodes augments the problem even further. There is a need for generic cost metric to find the most reliable path for forwarding the packets. We propose a trust-based metric for routing in MANETs. This metric works as a reliability measure of nodes and the ad hoc routing protocol tries to find the most reliable path. We propose a quantitative measure of trustworthiness of a node based on node's properties like signal strength, stability, node's performance to forward packets and its rating by other nodes. To our knowledge, our approach is the first attempt to use a generic trust metric for reliable routing in MANETs

    Comprehensive Trust based Routing Protocol to Mitigate Black-hole attack in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) is a collection of sensor nodes, that sense environmental data and send it to the administrator for further processing. Sensor nodes are wireless devices with limited battery and are vulnerable to security attacks such as black hole attack, gray hole attack, sink hole attack etc. Researchers have proposed many security mechanisms to mitigate security attacks. Trust based approaches have gained tremendous interest among researchers to embed security in WSNs. A Trust Based Secure Routing Protocol to mitigate black hole attack is presented in this paper. The protocol computes comprehensive trust value for each node and routes the packets only through the nodes with trust value > 0.5. The results of the proposed protocol are compared with TBSEER [10] protocol. The results show an improvement in Packet Delivery Ratio (PDR), throughput, End to End (EED), routing overhead and energy consumption

    TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET

    Full text link

    Homomorphic Data Isolation for Hardware Trojan Protection

    Full text link
    The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content. In this work, we suggest using homomorphism for Hardware Trojan protection. We implement two partial homomorphic designs based on ElGamal encryption/decryption scheme. The first design is a multiplicative homomorphic, whereas the second one is an additive homomorphic. We implement the proposed designs on a low-cost Xilinx Spartan-6 FPGA. Area utilization, delay, and power consumption are reported for both designs. Furthermore, we introduce a dual-circuit design that combines the two earlier designs using resource sharing in order to have minimum area cost. Experimental results show that our dual-circuit design saves 35% of the logic resources compared to a regular design without resource sharing. The saving in power consumption is 20%, whereas the number of cycles needed remains almost the sam

    Fuzzy TOPSIS-based Secure Neighbor Discovery Mechanism for Improving Reliable Data Dissemination in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) being an indispensable entity of the Internet of Things (IoT) are found to be more and more widely utilized for the rapid advent of IoT environment. The reliability of data dissemination in the IoT environment completely depends on the secure neighbor discovery mechanism that are utilized for effective and efficient communication among the sensor nodes. Secure neighbor discovery mechanisms that significantly determine trustworthy sensor nodes are essential for maintaining potential connectivity and sustaining reliable data delivery in the energy-constrained self organizing WSN. In this paper, Fuzzy Technique of Order Preference Similarity to the Ideal Solution (TOPSIS)-based Secure Neighbor Discovery Mechanism (FTOPSIS-SNDM) is proposed for estimating the trust of each sensor node in the established routing path for the objective of enhancing reliable data delivery in WSNs. This proposed FTOPSIS-SNDM is proposed as an attempt to integrate the merits of Fuzzy Set Theory (FST) and TOPSIS-based Multi-criteria Decision Making (MCDM) approach, since the discovery of secure neighbors involves the exchange of imprecise data and uncertain behavior of sensor nodes. This secure neighbor is also influenced by the factors of packet forwarding potential, delay, distance from the Base Station (BS) and residual energy, which in turn depends on multiple constraints that could be possibly included into the process of secure neighbor discovery. The simulation investigations of the proposed FTOPSIS-SNDM confirmed its predominance over the benchmarked approaches in terms of throughput, energy consumption, network latency, communication overhead for varying number of genuine and malicious neighboring sensor nodes in network

    Secure Data Transmission in IoT based on Optimization Based Routing Protocol for Wireless Body Area Networks

    Get PDF
    The security of Internet of Things (IoT) networks has become highly significant due to the growing number of IoT devices and the rise in data transfer across body area networks. The main purpose is to enhance the security level of data transmission between patients and health service providers by considering the availability of energy at sensor nodes through the Wireless Body Area Network. Energy efficiency is considered a foremost challenge to increase the lifetime of a network. To deal with energy efficiency, one of the important systems is selecting the relay node, which can be modeled as an optimization problem. This research proposes the patient health collected data are needed for transmission in IoT-Patient Care Monitoring (PCM) based on the Optimized Routing Protocol along WBANs. The proposed model focuses on a routing mechanism that makes use of an Optimization Routing-based Algorithm along with the relay node selection based on distances and residual energies. DO NOT USE SPECIAL CHARACTERS, SYMBOLS, OR MATH IN YOUR TITLE OR ABSTRACT
    • …
    corecore