A Trust Model Based on Swarm Intelligence Algorithms in WSNs

Document Type : Original Article

Authors

1 Imam Hossein University

2 Allame Tabatabaei University

Abstract

Most applications of sensor nodes are in hazardous areas, inaccessible or hostile environments.    Therefore, the need for security in these networks is essential. Trust methods are powerful tools for        diagnosing unexpected behavior of nodes (malicious nodes or failure nodes). In this paper, we have       proposed TBSI trust model whose main features are low computational overhead, low energy consumption and confronting attacks in WSNs. This model is simulated and evaluated by NS-2 simulator and its behavior has been evaluated based on the results of these simulations. Examining practical results shows that       energy consumption, routing overhead, and the time of death of nodes are reduced and the rate of packet delivery to the base station is increased. These desirable outcomes prove that using the method of trust to achieve a secure network is a good solution to solve security issues in wireless sensor networks.
 

Keywords


[1] J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, “Trust management systems for wireless sensor networks: Best practices,” Computer Communications, vol. 33, pp. 1086-1093, 2010.##
[2] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd annual Hawaii international conference on System sciences, pp. 1-10, 2000.##
[3] G. Zhan, W. Shi, and J. Deng, “Design and implementation of TARF: a trust-aware routing framework for WSNs,” in Transactions on Dependable and Secure Computing, IEEE, vol. 9, pp. 184-197, 2012.##
[4] S. S. Babu, A. Raha, and M. K. Naskar, “Trustworthy Route formation Algorithm for WSNs,” International Journal of Computer Applications (0975–8887), vol. 27, 2011.##
[5] T. Zahariadis, H. Leligou, P. Karkazis, P. Trakadas, I. Papaefstathiou, C. Vangelatos, et al., “Design and implementation of a trust-aware routing protocol for large WSNs,” International Journal of Network Security and Its Applications (IJNSA), vol. 2, pp. 52-68, 2010.##
[6] C. Weifang, L. Xiangke, S. Changxiang, L. Shanshan, and P. Shaoliang, “A trust-based routing framework in energy-constrained wireless sensor networks,” in Wireless Algorithms, Systems, and Applications, ed: Springer, pp. 478-489, 2006.##
[7] A. A. Pirzada and C. McDonald, “Trusted greedy perimeter stateless routing,” in 15th IEEE International Conference on Network ICON, pp. 206-211, 2007.##
[8] S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, “Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks,” in IEEE International Conference on Performance, Computing, and Communications, pp. 463-469, 2004.##
[9] S. M. Hosseini and A. Rezaei, “Energy Optimization in WSNs with Hybrid Algorithm,” in The First National Conference on Interdisciplinary Reseaches in Computer, Electrical, Mechanical and Mechatronics Engineering, 2016 (In Persian).##
[10] S. Nasirian and F. Faghani, “A novel hierarchical routing algorithm for wireless sensor networks in order to reduce energy consumption and increase network lifetime using a tree-sector structure,” in 2nd National Conference On Computer Engineering and IT Management, 2015 (In Persian).##