18 research outputs found

    Trust-based energy efficient routing protocol for wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) consist of a number of distributed sensor nodes that are connected within a specified area. Generally, WSN is used for monitoring purposes and can be applied in many fields including health, environmental and habitat monitoring, weather forecasting, home automation, and in the military. Similar, to traditional wired networks, WSNs require security measures to ensure a trustworthy environment for communication. However, due to deployment scenarios nodes are exposed to physical capture and inclusion of malicious node led to internal network attacks hence providing the reliable delivery of data and trustworthy communication environment is a real challenge. Also, malicious nodes intentionally dropping data packets, spreading false reporting, and degrading the network performance. Trust based security solutions are regarded as a significant measure to improve the sensor network security, integrity, and identification of malicious nodes. Another extremely important issue for WSNs is energy conversation and efficiency, as energy sources and battery capacity are often limited, meaning that the implementation of efficient, reliable data delivery is an equally important consideration that is made more challenging due to the unpredictable behaviour of sensor nodes. Thus, this research aims to develop a trust and energy efficient routing protocol that ensures a trustworthy environment for communication and reliable delivery of data. Firstly, a Belief based Trust Evaluation Scheme (BTES) is proposed that identifies malicious nodes and maintains a trustworthy environment among sensor nodes while reducing the impact of false reporting. Secondly, a State based Energy Calculation Scheme (SECS) is proposed which periodically evaluates node energy levels, leading to increased network lifetime. Finally, as an integrated outcome of these two schemes, a Trust and Energy Efficient Path Selection (TEEPS) protocol has been proposed. The proposed protocol is benchmarked with A Trust-based Neighbour selection system using activation function (AF-TNS), and with A Novel Trust of dynamic optimization (Trust-Doe). The experimental results show that the proposed protocol performs better as compared to existing schemes in terms of throughput (by 40.14%), packet delivery ratio (by 28.91%), and end-to-end delay (by 41.86%). In conclusion, the proposed routing protocol able to identify malicious nodes provides a trustworthy environment and improves network energy efficiency and lifetime

    Geographical Forwarding Methods in Vehicular Ad hoc Networks

    Get PDF
    Vehicular ad hoc networks are new and emerging technology and special class of mobile ad hoc networks that provide wireless communication between vehicles without any fixed infrastructure. Geographical routing has appeared as one of the most scalable and competent routing schemes for vehicular networks. A number of strategies have been proposed for forwarding the packets in geographical direction of the destination, where information of direct neighbors is gained through navigational services. Due to dynamically changing topologies and high mobility neighbor information become outdated. To address these common issues in network different types of forwarding strategies have been proposed. In this review paper, we concentrate on beaconless forwarding methods and their forwarding methods in detail

    Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks

    Get PDF
    The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic. Sinkhole and Blackhole attacks are very common attacks in network, where an attacker advertises un-authorized routing update in network. To deal with these types of attacks, there is a need to tighten the network security and prevent from attackers. In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. The simulation results illustrated that, how these attacks affect the network performance

    Smart Cities Security Threat Landscape: A Review

    Get PDF
    There has been a swift rise in the development of smart cities. This evolution has been prompted by the rise in emerging technologies such as edge computing, IoT, data science, and analytics. Combining these technologies has paved the way for new, automated systems for managing and monitoring procedures and industries, resulting in increased efficiency and improved quality of life. While these interconnected services assist in managing the growing population in the urban environments through efficient service delivery and increased operational efficiency, they also increase the risk of adversary threats, security, and privacy challenges to smart cities. This paper presents the holistic view of the security landscape and highlights the security threats, challenges, and risks to the smart city environment

    Firewall Best Practices for Securing Smart Healthcare Environment: A Review

    No full text
    Smart healthcare environments are growing at a rapid pace due to the services and benefits offered to healthcare practitioners and to patients. At the same time, smart healthcare environments are becoming increasingly complex environments where a plethora of devices are linked with each other, to deliver services to patients, and they require special security measures to protect the privacy and integrity of user data. Moreover, these environments are exposed to various kinds of security risks, threats, and attacks. Firewalls are considered as the first line of defense for securing smart healthcare networks and addressing the challenges mentioned above. Firewalls are applied at different levels in networks, and range from conventional server-based to cloud-based firewalls. However, the selection and implementation of a proper firewall to get the maximum benefit is a challenging task. Therefore, understanding firewall types, the services offered, and analyzing underlying vulnerabilities are important design considerations that need addressing before implementing a firewall in a smart healthcare environment. The paper provides a comprehensive review and best practices of firewall types, with offered benefits and drawbacks, which may help to define a comprehensive set of policies for smart healthcare devices and environments

    Security threats and challenges to IoT and its applications: A review

    No full text
    The emergence and rapid growth of Internet of Things (IoT) with unlimited benefits, facilities and applications provided such as smart cities, smart home, intelligent transportation (ITS), smart health and smart grids impacts everyone's lives. However, IoT based systems and applications are vulnerable to various security threats and attacks due to their deployment and use of sensing devices. Moreover, the lack of standardization due to heterogeneity of devices and technologies implementing security in IoT is real challenge. The aim of this review paper is to highlight the various security threats, challenges and attacks faced by IoT enable applications

    Security in wireless sensor network: approaches and issues

    Get PDF
    Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using shared key approaches to make less communication overhead, but still network compromise with replay impersonation and compromise attacks. The existing proposed schemes are not fully addressed other network resources such as energy and speed, etc. The intent of this paper is to provide a comprehensive security requirement, detail about security attacks in network and discuss the existing security schemes

    Malicious node detection through trust aware routing in wireless sensor networks

    No full text
    Wireless sensor network are constituted by a large number of tiny size sensors and distributed randomly for gathering information. These types of networks have remarkable applications and demand worldwide. The wireless sensor network has been suffered with variety of attacks because of its design and deployment nature. The previous traditional approaches including cryptography, authentication cannot work properly against node misbehavior attacks. To solve this problem, we propose a Trust Aware Wireless Routing Protocol (TAWRP) for detection and isolation of malicious nodes in network. The main aim of TAWRP is to establish an optimal route with trusted nodes and effectively forward the packets from source to destination with minimum packet loss. The performance of TAWRP is evaluated in terms of packet delivery ratio and routing overhead. The results clearly showed that TAWRP can achieve high delivery ratio and efficient in routing overhead in the presence of malicious nodes

    A survey of wireless sensor network security and routing techniques

    No full text
    The main purpose of the study is to review the evolution of wireless sensor network security and routing techniques. Recent years have seen tremendous growth in Wireless Sensor Networks (WSNs). As WSN's become more and more crucial to everyday life, their security and trust become a primary concern. However because of the nature of WSNs, security design can be challenging. Trust-aware routing protocols play a vital role in security of Wireless Sensor Networks (WSNs). The review study provides an overview of Wireless Sensor Network (WSN) and discusses security issues and the routing techniques for high quality of service and efficient performance in a WSN. In order to identify gaps and propose research directions in WSN security and routing techniques, the study surveys the existing body of literature in this area. The main focus is on trust concepts and trust based approaches for wireless sensor networks. The study also highlights the difference between trust and security in the context of WSNs. The trust and security are interchangeable with each other when we elaborate a secure system and not same. Various surveys conducted about trust and reputation systems in ad hoc and sensor networks are studied and compared. Finally we summarize the different trust aware routing schemes
    corecore