Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust-Based LEACH Protocol for Wireless Sensor Networks
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01
Hi-index | 0.00 |
Wireless sensor networks are highly susceptible to security attacks due to its open and infrastructure less configuration, autonomous operation, limited battery power and computational capability. As a result, secure routing of information by the sensor nodes has become an increasingly important topic of research interest in the recent years. In this paper, we have proposed a simple fuzzy logic based trust evaluation model for the individual nodes in a WSN mostly appropriate for routing data using the Link State Routing Protocol. The paper has been divided into two sections with the first section dealing with the evaluation of trusts of the sensor nodes. The second section involves selection of the most appropriate route for routing within the WSN from Source to Sink using the calculated trust values in the first part. Finally the protocol has been simulated on TOSSIM, and the results have shown the effectiveness of our protocol with smaller delay, increase in residual battery life and higher percentage of successful packet transmission compared to the already existing algorithms.