An energy and trust-aware routing protocol for large wireless sensor networks

  • Authors:
  • Theodore Zahariadis;Helen C. Leligou;Stamatis Voliotis;Sotiris Maniatis;Panagiotis Trakadas;Panagiotis Karkazis

  • Affiliations:
  • Electrical Engineering Department, Technological Educational Institute of Chalkida, Evia, Greece;Electrical Engineering Department, Technological Educational Institute of Chalkida, Evia, Greece;Electrical Engineering Department, Technological Educational Institute of Chalkida, Evia, Greece;Electrical Engineering Department, Technological Educational Institute of Chalkida, Evia, Greece;Electrical Engineering Department, Technological Educational Institute of Chalkida, Evia, Greece;Electrical Engineering Department, Technological Educational Institute of Chalkida, Evia, Greece

  • Venue:
  • AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Efficient defense against security attacks is a challenging task in the wireless sensor network environment. Although significant research effort has been spend on the design of trust models to detect malicious nodes based on direct and indirect evidence, this comes at the cost of additional energy consumption. The situation is further aggravated as the next generation wireless sensor network will be larger and larger. To face this problem, we propose a secure routing protocol (Ambient Trust Sensor Routing, ATSR) which adopts the geographical routing principle to cope with the network dimensions and relies on a distributed trust model for the detection of malicious nodes. Both direct and indirect trust information is taken into account to evaluate the trustworthiness of each neighbour. An important feature of the proposed routing solution is that it takes into account the remaining energy of each neighbour, thus allowing for better load balancing and network lifetime extension. Based on computer simulation results we evaluate the additional energy consumption caused by the exchange of indirect trust information and the benefits stemming from the adoption of our algorithm.