To present a new routing protocol based on trust for wireless sensor networks

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 778

This Paper With 14 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICESAL01_141

تاریخ نمایه سازی: 22 مهر 1394

Abstract:

With regard to the fact that the applications of wireless sensor networks become more widespread day by day, qualitative issues in such networks are of paramount importance.Currently, researches are moving toward a side where subject to the type of network application, it also guarantees its quality. One of these cases is the discussion of trust-based routing in wireless sensor networks. Use of this method, which is a modeling of human social relationships,has recently got attention among researches on wireless sensor networks. Hence in this paper, we intend to discuss on trust-based routing in wireless sensor networks. Theproposed idea, by computing the path trust with existing parameters in the routing table of nodes,tries to provide a mechanism to identify malicious nodes in the network, and removes them. Malicious nodes in our scenario, with the misconducting that show, they receive data packets anddoes not direct to the destination node. With maliciousness of each node, broadcasting route error messages in the network, path nodes notice the problem and trust of paths leading to the sink will be updated. Path reliabilities are updated in routing table of nodes and unsafe routes will be diagnosed and the path trust will be discharged. Based protocol on which reliance making operation is performed, is AODV routing protocol. To evaluate the results of this research, we use NS2-2.35 software.

Authors

Azam Saied

Master of Computer Engineering, Olum & Tahghighat University of Khorasan Razavi

Sayyed Majid Mazinanib

Electrical Department of International University of Imam Reza (AS)

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Hemanta Kumar Kalita and Avijit Kar, Wireless Sensor Network Security ...
  • Shio Kumar Singh, M P Singh, D K Singh, _ ...
  • Sensor Networks: Security Isues and Challenges", IJCIT, vol. 2, issue ...
  • Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari, "Security issues in wireless ...
  • S. Buchegger, J. Y. Le Boudec, _ Robust Reputation System ...
  • Y. Sun, Y. Yang, :Trust Establishment in Distributed Networks: Analysis ...
  • Zhan, G., Shi, W., Deng, J. (2012) Design and Implementation ...
  • Xiaoqi Li, L., Jiangchuan, L. (2004) A Trust Model Based ...
  • Samundiswary, P. (2012) Trust based Energy aware Reactive Routing Protocol ...
  • Zahariadis, T., Leligou, H., Karkazis, P., Trakadas, P., Papaefstathiou, I., ...
  • Weifangl, C., Xiangke, L., Changxiang, Shen., Shanshan, L., Shaoliang, P. ...
  • Stelios, Y., Papayanoulas, N., Trakadas, P., Maniatis, S., Leligou, H., ...
  • H. Y ang, J. shu, X. Meng, S. Lu, CSCAN: ...
  • Zhan, G, Shi, W., Deng, J. (2012) Design and Implementation ...
  • نمایش کامل مراجع