Manuscript Title:

MALICIOUS NODES DETECTION AND AVOIDANCE USING TRUSTBASED ROUTING IN DATA CRITICAL WIRELESS SENSOR NETWORK APPLICATIONS

Author:

SREEVIDYA B, SUPRIYA M

DOI Number:

DOI:10.17605/OSF.IO/C4BTS

Published : 2023-01-23

About the author(s)

1. SREEVIDYA B - Department of Computer Science & Engineering, Amrita School of Computing, Bengaluru, Amrita Vishwa Vidyapeetham, India.
2. SUPRIYA M - Department of Computer Science & Engineering, Amrita School of Computing, Bengaluru, Amrita Vishwa Vidyapeetham, India.

Full Text : PDF

Abstract

Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. There are various forms of assaults that are relevant in Wireless Sensor Networks (WSN). Cardinal impairment is regarded as attacks emanating from compromised nodes and changing data. The paper analyses several attacks and proposes a new security approach to prevent data change due to compromised nodes. The suggested technique is a noncryptographic scheme in which node trust factors exclude hostile nodes from the probable list of forwarding nodes. The trust factor is calculated by considering the number of packets dropped, packets rejected, and the node's remaining energy. Network Simulator NS2 is used to simulate the proposed scheme. Various network factors are compared to classic Adhoc On-Demand Vector (AODV) and customized AODV protocols.


Keywords

Wireless Sensor Networks, trust-based routing, data integrity attacks, network lifetime.