A Combinatorial Multi-Objective Trust Model for Efficient and Secured Routing in UWSN

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2015 by IJETT Journal
Volume-22 Number-6
Year of Publication : 2015
Authors : U D Prasan, Dr. S Murugappan
DOI :  10.14445/22315381/IJETT-V22P255

Citation 

U D Prasan, Dr. S Murugappan"A Combinatorial Multi-Objective Trust Model for Efficient and Secured Routing in UWSN", International Journal of Engineering Trends and Technology (IJETT), V22(6),259-264 April 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Wireless Sensor Networks (WSN) play an important role in applications both in the civilian as well as in the defence sector. WSNs are autonomous, distributed, self-organized networks consisting of multiple sensor nodes. Usually, limited radio range of the nodes, arising from energy constraints and trust value amongst the nodes, is overcome with the cooperation between nodes. Attention in the domain of Underwater Wireless Sensor Networks (UWSN) is increasing because of its realistic applications and necessity of communication through mobile devices. A mobile ad hoc network consists of mobile self configuring wireless nodes and these nodes communicate amongst themselves without any centralized management system. Dynamic characteristics of UWSN, has made it fairly demanding to uphold connectivity and guarantee Quality of Service (QoS). Trust based routing is one way to develop cooperation among nodes for performing efficient routing between nodes. A trust based AODV is presented where nodes are selected for routing based on their trust values. A threshold value is defined dynamically and nodes are preferred for routing only if the trust levels are higher than the threshold. Energy levels of nodes are also considered to make routing still more efficient. Nodes which are selected for routing are also considered based on high energy levels. In addition, all data transmission is secured using MD5 algorithm. Simulation results show good improvement on QoS metrics like Packet Delivery Ratio, Throughput, Delay, Packet Received, Packet Loss and energy consumption when compared with traditional AODV and DSR.

 References

[1] A. Abraham, A. Hassanien, and V. Snasel, “Computational social network analysis: trends, tools and research advances”, Springer- Verlag New York Inc, 2009.
[2] A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei, Reputation and Trust- based systems for Ad Hoc and Sensor Networks," Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks, 2006.
[3] A. Kellner, K. Behrends, and D. Hogrefe, Simulation Environments for Wireless Sensor Networks," Institute of Computer Science, Georg- August-Universit at Gottingen, Germany, Technical Report No. IFITB- 2010-04, June 2010, ISSN 1611-1044. [Online]. Available: http://_lepool.informatik.uni-goettingen.de/ publication/tmg/2010/AK KB 2010 01.pdf
[4] D. Angus and C. Woodward, Multiple objective ant colony optimisation," Swarm intelligence, vol.3, no. 1, pp. 69 - 85, 2009.
[5] M. Hempstead, M. Lyons, D. Brooks, and G. Wei, “Survey of hardware systems for wireless sensor networks," Journal of Low Power Electronics, vol. 4, no. 1, p. 11, 2008.
[6] K. Pister, J. Kahn, B. Boser et al., “Smart dust: Wireless networks of millimeter-scale sensor nodes”, Highlight Article in, p. 2, 1999.
[7] J. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: A survey”, Security in distributed, grid, mobile, and pervasive computing, p. 367, 2007.
[8] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks”, IEEE Communications Surveys and Tutorials, vol. 8, no. 2, pp. 2 - 23, 2006.
[9] J. Zhang, P. Orlik, Z. Sahinoglu, A. Molisch, and P. Kinney, “UWB systems for wireless sensor networks," Proceedings of the IEEE, vol. 97, no. 2, pp. 313 - 331, 2009.
[10] L. Rasmusson and S. Jansson, “Simulated social control for secure Internet commerce," in Proceedings of the 1996 workshop on New security paradigms. ACM New York, NY, USA, 1996, pp. 18 - 25.
[11] A. J_sang and S. Pope, “Semantic constraints for trust transitivity," in Proceedings of the 2nd Asia-Pacific conference on Conceptual modeling, Vol. 43. Australian Computer Society, Inc., 2005, pp. 59-68.
[12] P. Dasgupta, “Trust as a Commodity”, Trust: Making and Breaking Cooperative Relations, electronic edition, Department of Sociology, University of Oxford, pp. 49 - 72, 2000.
[13] R. Lewicki and B. Bunker, “Trust in relationships: A model of development and decline," Conict, cooperation, and justice: Essays inspired by the work of Morton Deutsch, pp. 133 - 173, 1995.

Keywords
Wireless Sensor Network, Threshold value, Data transmission, Secured, Throughput, Delay.