To present a new routing protocol based on trust for wireless sensor networks

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 783

فایل این مقاله در 14 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICESAL01_141

تاریخ نمایه سازی: 22 مهر 1394

چکیده مقاله:

With regard to the fact that the applications of wireless sensor networks become more widespread day by day, qualitative issues in such networks are of paramount importance.Currently, researches are moving toward a side where subject to the type of network application, it also guarantees its quality. One of these cases is the discussion of trust-based routing in wireless sensor networks. Use of this method, which is a modeling of human social relationships,has recently got attention among researches on wireless sensor networks. Hence in this paper, we intend to discuss on trust-based routing in wireless sensor networks. Theproposed idea, by computing the path trust with existing parameters in the routing table of nodes,tries to provide a mechanism to identify malicious nodes in the network, and removes them. Malicious nodes in our scenario, with the misconducting that show, they receive data packets anddoes not direct to the destination node. With maliciousness of each node, broadcasting route error messages in the network, path nodes notice the problem and trust of paths leading to the sink will be updated. Path reliabilities are updated in routing table of nodes and unsafe routes will be diagnosed and the path trust will be discharged. Based protocol on which reliance making operation is performed, is AODV routing protocol. To evaluate the results of this research, we use NS2-2.35 software.

نویسندگان

Azam Saied

Master of Computer Engineering, Olum & Tahghighat University of Khorasan Razavi

Sayyed Majid Mazinanib

Electrical Department of International University of Imam Reza (AS)

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Hemanta Kumar Kalita and Avijit Kar, Wireless Sensor Network Security ...
  • Shio Kumar Singh, M P Singh, D K Singh, _ ...
  • Sensor Networks: Security Isues and Challenges", IJCIT, vol. 2, issue ...
  • Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari, "Security issues in wireless ...
  • S. Buchegger, J. Y. Le Boudec, _ Robust Reputation System ...
  • Y. Sun, Y. Yang, :Trust Establishment in Distributed Networks: Analysis ...
  • Zhan, G., Shi, W., Deng, J. (2012) Design and Implementation ...
  • Xiaoqi Li, L., Jiangchuan, L. (2004) A Trust Model Based ...
  • Samundiswary, P. (2012) Trust based Energy aware Reactive Routing Protocol ...
  • Zahariadis, T., Leligou, H., Karkazis, P., Trakadas, P., Papaefstathiou, I., ...
  • Weifangl, C., Xiangke, L., Changxiang, Shen., Shanshan, L., Shaoliang, P. ...
  • Stelios, Y., Papayanoulas, N., Trakadas, P., Maniatis, S., Leligou, H., ...
  • H. Y ang, J. shu, X. Meng, S. Lu, CSCAN: ...
  • Zhan, G, Shi, W., Deng, J. (2012) Design and Implementation ...
  • نمایش کامل مراجع