##plugins.themes.bootstrap3.article.main##

Mouhebeh Sadat Katebi Hassan Shakeri Farzad Tashtarian

Abstract

This research with attention to the establishment of trust in WSNs and with the goal of increment in energy supply and growth in malicious node detection accuracy by using of improved sliding window, is saving energy by using computation of the previous periods. Also, this research calculates the trust in aspect of transferring information, based on subjective logic model and incremented the detection rate of malicious node by proposing two algorithms for identifying these nodes. Then, this method increases the speed of routing. The results of simulation of STAR compared to EDTM (Jiang, et al., 2015) shows 11.99% increment in the residual energy of network and growth of 1.52% in detecting the accuracy of malicious nodes.

Article Details

References
hmed, A., Abu Bakr, K. & Channa, M. I., "A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network", Mobile Networks and Applications, 21(2), pp. 272-285, (2016).
[2] Chakrabarti, A., Parekh, V. & Ruia, A., "A Trust Based Routing Scheme for Wireless Sensor Networks", Bangalore, India, Springer Berlin Heidelberg, pp. 159-169, (2012).
[3] Chavan, P. A., Aher, R. D., Khairnar, K. V. & Sonawane, H. D., "Enhanced Trust Aware Routing Framework against Sinkhole Attacks in Wireless Sensor Networks", Engineering and Technical Research (IJETR), 3(1), pp. 22-25, (2015).
[4] D. Devanagavi, G., Nalini, N. & C.Biradar, R., "Secured routing in wireless sensor networks using fault-free and trusted nodes", Communacation Systems, 29(1), pp. 170-193, (2016).
[5] Faridi, A., Dohler, M. & Grieco, L. A., Comprehensive Evaluation of the IEEE 802.15.4 MAC Layer Performance With Retransmissions. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 59(8), pp. 3917-3932, (2010).
[6] Gambetta, D., "Can we trust trust", Trust: Making and breaking cooperative relations. pp. 213-237, (1988).
[7] He, S. & Zhao, H., "Trust and potential field-based routing protocol for wireless sensor networks", Ningbo, Signal Processing, Communications and Computing (ICSPCC), (2015).
[8] Hoceini, O., Talbi, S. & Aoudjit, R., "Trust framework for a secured routing in wireless sensor network", Electronic Journal of Information Technology, 8(8), pp. 58-65, (2015).
[9] Ishmanov, F., Won Kim, S. & Yeob Nam, S., A "Robust Trust Establishment Scheme for Wireless Sensor Networks", Sensors, Volume 15, pp. 7040-7061, (2015).
[10] Jiang, J. et al., "An Efficient Distributed Trust Model for Wireless Sensor Networks", PARALLEL AND DISTRIBUTED SYSTEMS, 26(5), pp. 1228 - 1237, (2015).
[11] Josang, A., Gray, L. & Kinateder, M., "Simplification and Analysis of Transitive Trust Networks", Web Intelligence and Agent Systems Journal, 4(2), pp. 139 - 161, (2006).
[12] Kaur, J., Sandeep, S. G. & Balwinder, S. D., "Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks", Journal of Engineering, pp. 1-9, (2016).
[13] Latha, D. & Palanivel, K., "Secure Routing Through Trusted Nodes in Wirels Sensor Networks – A Survey", Advanced Research in Computer Engineering & Technology (IJARCET), 3(11), pp. 3792-3799, (2014).
[14] Lewis, N., Foukia, N. & G. Govan, D., "Using trust for key distribution and route selection in Wireless Sensor Networks", Salvador, Bahia, s.n, (2008).
[15] McKnight, D. H. & Chervany, N. L., "The Meanings of Trust", s.l.: University of Minnesota, Management Information Systems Reseach Center, (1996).
[16] Olmedilla, D., Rana, O. F., Matthews, B. & Nejdl, W., "Security and Trust Issues in Semantic Grids", Dagstuhl, Germany, Internationales Begegnungs- und Forschungszentrum Informatik (IBFI), (2006).
[17] Raza, S., Haider, W. & Durrani, N. M., "Trust Based Energy Preserving Routing Protocol in Multi-hop WSN. In: Networked Systems", s.l.:Springer International Publishing, pp. 518-523, (2015).
[18] Salehi, M., Boukerche, A. & Darehshoorzadeh, A., "Towards a novel trust-based opportunistic routing protocol for wireless networks", Wireless Netw, 22(3), p. 927–943, (2016).
[19] Vasudha, N. & Gajkumar Shah, P., "Requisite Trust Based Routing Protocol for WSN", International Journal of Innovative Research in Advanced Engineering (IJIRAE), 01(05), pp. 138-142, (2014).
[20] Zahariadis, T. et al., "Implementing a Trust-Aware Routing Protocol in Wireless Sensor Nodes", London, s.n, (2010).
[21] Zho, C. et al., "Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network", IEEE Transactions on Emerging Topics in Computing, 3(1), pp. 84-94, (2015).
How to Cite
Katebi, M. S., Shakeri, H., & Tashtarian, F. (2018). STAR: Improved Algorithm based on Sliding Window for Trust-Aware Routing in WSNs. Computer and Knowledge Engineering, 1(2), 33-46. https://doi.org/10.22067/cke.v1i2.66227
Section
Computer and Network Security-Ghaemi