A Lightweight Trust System with Provisioning for Detecting Malicious Node in Clustered Wireless Sensor Networks

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2015 by IJETT Journal
Volume-21 Number-7
Year of Publication : 2015
Authors : SudhaRani.S, George Samuel Raj. V, Earnest Paul. S
DOI :  10.14445/22315381/IJETT-V21P262


SudhaRani.S, George Samuel Raj. V, Earnest Paul. S"A Lightweight Trust System with Provisioning for Detecting Malicious Node in Clustered Wireless Sensor Networks", International Journal of Engineering Trends and Technology (IJETT), V21(7),335-341 March 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


Wireless sensor networks is one of the prominent computing network emerged worldwide due to its applications and features. One of the wireless sensor network is clustered wireless sensor network in which a set of sensor nodes are partitioned into certain number of clusters and within each cluster active sensor nodes are associated as cluster members, a sensor node with strong computing power is elected as a cluster head. Malicious node in clustering network is a key problem. A lightweight trust system is employed to reduce the effects of malicious node and a dogger timer is used to detect the malicious node in less time. Incorporating lightweight trust system with provision to detect malicious node along with time factor will avoid problem such as drop of data, defragmenting network and isolating network.


[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, ?Wireless Sensor Networks: a Survey,? Computer networks, 38, pp. 393 – 422, December 2002
[2] Kazem sohraby, Daniel Minoli, Taieb Znati, ?Wireless sensor networks: technology, protocols and applications”. First edition, 2012
[3] Edwin prem kumar, Baskaran Kaliapermal, Elijah blessing Rajsingh ?Research issues in Wireless sensor network Applications: A Survey?- International Journal of information and electronics engineering, vol 2 No 5, September 2012
[4] Aashima Singla, Ratika Sachdeva, “Review on security Issues and Attacks in Wireless Sensor Networks” – International Journal of Advanced Research in Computer Science and Software Engineering”, vol 3 No 4, April 2013.
[5] Yanli Yu,Keigiu Li, Ping Li ?Trust Mechanism in wireless sensor networks :Attacks analysis and countermeasures?, Journal of networks and computer applications press 2011
[6] Jyoti Shukla, Babil Kumari, ?Security Threats and Defense Approaches in Wireless Sensor Networks: An Overview- International Journal of Application or Innovation in Engineering and Management”, vol 2 No 3, March 2013
[7] Javier Lopez, Rodrigo Roman, Issac Agudo, Carmen Fernandez-Gago, ?Trust management systems for wireless sensor networks:Best practises-“, Computer Communications, 33, pp.1086-1093, February 2010.
[8] R. A. Shaikh, et al., ?Group-based trust management scheme for clustered wireless sensor networks,? IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 11, pp. 1698–1712, Nov. 2009.
[9] Blaze M, Feigenbaum J, Lacy J. ?Decentralized trust management?. In: Proceeding of the 1996 IEEE symposium on security and privacy, Washington, 1996. pp. 164–73.
[10] W.B. Heinzelman, ?Application-Specific Protocol Architectures for Wireless Networks,” IEEE Trans. Wireless Communication, vol. 1, no. 4, pp. 660–670, Oct. 2002.
[11] R. Devika, B. Santhi, T.Sivasubramanian, ?Survey on routing protocol inWireless Sensor Network?, International Journal of Engineering and Technology, Vol 5 No 1 Feb-mar 2013.
[12] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, ?Reputation-based framework for high integrity sensor networks,? ACM Trans. Sensor Networks., vol. 4, no. 3, pp. 1–37, May 2008.
[13] A. Srinivasn, J.Teitelbaum, J.Wu, ? DRBTS: Distributed Reputation based Beacon Trust system, In proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, USA, 2006.
[14] S. Buchegger, J. –Y.Le Boudec, ?A Robust Reputation system for Peer-to-peer and Mobile Adhoc Networks?, In proceedings of P2Pecon 2004, Harvard University, Cambridge MA, USA,June 2004.
[15] S.Buchegger and J-Y. Le Boudec, ?Performance analysis of the CONFIDANT protocol (Cooperation of Nodes-Fairness In Dynamic Adhoc Networks), In Proceedings of MobiHoc 2002, Lausanne, CH,June 2002
[16] P. Michiardi and R. Molva, ?CORE: A collaborative reputation mechanism to enhance node cooperation in Mobile Adhoc Network, Communication and Multimedia security, September 2002
[17] S.Marthi, T.J.Giuli, K.Lai, M.Baker, ?Mitigating Routing Misbehaviour inMobile adhoc Networks?, In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom) 2000.
[18] Xiaoyong Li, Feng Zhou, and Junping Du, ?LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks?,IEEE Transactions on Information Forensics and Security, Vol. 8, No. 6, June 2013
[19] Guoxing Zhan, Weisong Shi, Julia Deng, ?TARF: A Trust Aware Routing Framework for Wireless Sensor Networks?, pp. 65-80, 2010
[20] Christhu Raj M. R, Edwin Prem Kumar.G, Kartheek Kusampudi?, Drill System bsed Hierarchical Trust Calculation to detect Selfish nodes in Wireless Sensor Network?, International Journal of Engineering and Technology, Vol 5, No. 1, Feb-mar 2013.
[21] G. Edwin Prem Kumar, Titus. I, Sony. I. Thekkekara, ?A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Networks, International Conference on Modeling Optimisation and Computing, Procedia Engineering 38, 2012.
[22] Sudip Misra, Ankur Vaish, ?Reputation based role assignment for role based access control in wireless sensor networks?, Computer Cmmunications, Vol 34, pp. 281-294, 2011.
[23] Fei Hu, Jim Ziobro, Jason Tillett, Neeraj K. Sharma, ?Secure Wireless Sensor Networks: Problems and Solutions?, Systemics, Cybernetics and Informatics, Vol. 1, No. 4, pp. 90-100, 2004
[24] Rodrigo Roman, Carmen Fernandez-Gago, Javier Lopez, ?Featuring Trust and Reputation Management Systems for Constrained Hardware Devices?, in Proc. Autonomics 07, 2007
[25] Adrian Perrig, Robert Szewczyk, J.D. Tygar, /victor Wen, David E. culler, ?SPINS: Security Protocols for Sensor Networks?, Mobile Computing and Networking, Vol 8, pp. 521-534, 2002.
[26] Chris Karlof, Naveen Sastry, David Wagner, ?TinySEC: A Link Layer Security Architecture for Wireless Sensor Networks?, SenSys 04, 2004.
[27] Sun YL, Han Z, Yu W, Liu KJR, ?A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks?, IEEE INFOCOM 06, pp. 1-13, 2006
[28] Boukerche A, Ren Y, ?A trust based security system for ubiquitous and pervasive computing environments, Computer Communications, 31(18), pp.4343-51, 2008.
[29] Jaramillo J, Srikant R, Darwin: distributed and adaptive reputation mechanism for wireless adhoc networks. In: Proceedings of the 13th annual ACM international conference on mobile computing and networking, pp. 87-98, 2007.
[30] Papaioannou T, Stamoulis G, ?Achieving honest ratings with reputation based fines in electronic markets, In: IEEE INFCOM, p. 1040-8, 2008.
[31] Hani Alzaid, Juan Gonazalez Nieto, Ernest Foo, ?Secure data aggregation in wireless sensor network? in Proc. 6th Australian conference on Information security, vol. 81, 2011

Sensor networks, Security, Trust management, Lightweight Trust System, Dogger timer.