Research On Trust Sensing Based Secure Routing Mechanism For Wireless Sensor Network
Research On Trust Sensing Based Secure Routing Mechanism For Wireless Sensor Network
Research On Trust Sensing Based Secure Routing Mechanism For Wireless Sensor Network
ABSTRACT
Aiming at the serious impact of the typical network attacks caused by the limited
energy and the poor deployment environment of wireless sensor network (WSN)
with the lightweight characteristics and the ability to resist many common attacks
simultaneously is proposed in this paper, at the same time the security route
selection algorithm is also optimized by taking trust degree and QOS metrics into
account. Performance analysis and simulation results show that TSSRM can
The trust sensing based secure routing mechanism is designed; establishment and
working process of TSSRM are also described in this paper. The proposed routing
algorithm is applied to the secure routing mechanism to achieve the efficient and
A sensor node, including the movement and energy consumption of sensor nodes.
The trust degree of sensor node is evaluated according to these characters, and then
the trust degree of route is calculated and the trust calculation model of network is
established to get the optimal route from the source node to the destination node.
At the same time, the trust degree and QoS metrics are combined as the routing
theory, which considers the trust degree and other QoS metrics. Simulation results
show that TSSRM can reduce the routing overhead and improve the reliability of
data transmission compared with the traditional trust mechanism. Future research
will design a distributed intrusion detection system for WSN, which may provide a
new way for the research of trust degree and ubiquitous routing
LITERATURE SURVERY
optimal policies
DESCRIPTION:
lifetime and are sustainable. A distinct characteristic of these systems is the fact
that the nodes can harvest energy throughout the duration in which communication
takes place. As such, transmission policies of the nodes need to adapt to these
data transmission with an energy harvesting transmitter which has a limited battery
controlling the time sequence of transmit powers subject to energy storage capacity
and causality constraints. We, first, study optimal offline policies. We introduce a
power supply
DESCRIPTION:
that it has capacitive rather than inductive source impedance, and may be driven by
optimal power flow from a rectified piezoelectric device is derived, and an “energy
harvesting” circuit is proposed which can achieve this optimal power flow. The
energy flow into the battery. An adaptive control technique for the dc–dc converter
is used to continuously implement the optimal power transfer theory and maximize
sensing model
DESCRIPTION:
Network Model
In this paper, we consider a WSN consisting of a few sink nodes and a number of
sensor nodes that are randomly distributed in a designated area. Each sensor node
packets. All the sensor nodes are resource constrained and have the same limited
distributed manner. We also assume that all the sensor nodes are compromisable if
there are no security mechanisms protecting them. In addition, WSNs may consist
of sensor nodes from different manufacturers or service providers. In this case, the
Authentication Phase:
First test is performed for the authentication of a node. A node encrypts its data
with the shared secret key which is calculated by two nodes previously; and
At second level of trust, a node is checked for its trust vales. For this 3
• If the response time of a node is less than the Intimacy Threshold AND
Ranging from the trust parameter, every neighbor is evaluated based on a set
decline to send packets, acting in an ungenerous manner, each time a source node
sends a packet to a neighbor for further forwarding; it enters the promiscuous mode
and overhears the wireless medium to see whether or not the packet was actually
the source node, it’s listed here as an input to the trust analysis system.
• Remaining Energy: Even though the level of energy of each neighbour is not a
real trust metric. In our proposed routing protocol, the remaining energy is used to
USECASE DIAGRAM:
Set Network
Choose Packet
Packet Forwarding
Sender Receiever
Authentication Phase
Received Packet
CLASS DAIGRAM:
SENDER RECEIVER
+Username +USername
+Password +Password
+Login() +Login()
+Set network() +Set network()
+Choose Packet() +Choose received path()
+Choose trust based network() +Choose trust based network()
+Authentication Phase() +Authentication Phase()
+Packet Forwarding() +Packet forwarding()
+Find untrust node() +Find untrust node()
+Send packet() +Received packet()
SEQUENCE DIAGRAM:
Router
Recevier
Sender
1 : Set network path()
5 : Authentication phase()
6 : Packet Forwarding()
10 : Authentication Phase()
11 : Packet Forwarding()
13 : Received packet()
COLLABORATION DIAGRAM:
10 : Authentication Phase()
5 : Authentication phase()
Router
11 : Packet Forwarding()
7 : Find untrust node()
13 : Received packet()
6 : Packet Forwarding()
Recevier
Sender
ROUTER
sender. Receiver.
DFD DIAGRAM:
LEVEL 0:
Sender
Router
Receiver
LEVEL 1:
Set Network
Sender
Choose trust based network
Choose Packet
Receiver
Choose trust based network
Authentication Phase
Choose trust based
Networks
Packet Forwarding
Choose packet
Sender
EXPECTED OUTCOMES
theory, which considers the trust degree and other QoS metrics. Simulation results
show that TSSRM can reduce the routing overhead and improve the reliability of
data transmission compared with the traditional trust mechanism. Future research
will design a distributed intrusion detection system for WSN, which may provide a
new way for the research of trust degree and ubiquitous routing.
REFERENCES
with energy harvesting nodes in fading wireless channels: optimal policies,” IEEE
Journal on Selected Areas in Communications, vol. 29, no. 8, pp. 1732-1743, Sep.
2011.
”Active low intrusion hybrid monitor for wireless sensor networks,” Sensors, vol.
energy harvesting circuit for wireless, remote power supply,” IEEE Transactions
5] G. Uttam G, and D. Raja, ”SDRP: secure and dynamic routing protocol for
mobile ad-hoc networks,” IET Networks, vol. 3, no. 2, pp. 235-243, 2014.