You are on page 1of 5

Trust-Distrust Protocol for the Secure Routing In

Wireless Sensor Networks


1* 2 3
S. Karthick, Dr. E. Sree Devi, R.V. Nagarajan,
PG Student, Dept. of ECE, Professor and Head, Dept. of ECE, Assistant Professor, Dept. of ECE,
Rohini College of Engg. & Tech., Rohini College of Engg. & Tech., Rohini College of Engg. & Tech.,
Tamil Nadu, India. Tamil Nadu, India Tamil Nadu, India.
karthicksuyam@gmail.com

Abstract — Now a days usage of Wireless Sensor Networks depends on global addresses as well as routing metrics of hop
(WSNs) is increasing, because of its wide application. Unlike counts, the sensor nodes typically lack global addresses [8].
common networks the WSNs have the capability of The major challenge in designing WSN is the provision of
reconfiguration, whenever any defect occurs in the network. the functional, and the non-functional, for example data
However, while routing in these network the loss of data is
latency and integrity respectively [9].
occurring due to its security lack. Hence many researchers have
presented their research for providing secure routing in WSNs. In this paper, we have introduced a novel routing protocol
The security is still an issue in routing of WSNs. In this paper, we for WSN, named as TDP. The proposed protocol have four
have developed a novel protocol for the secure routing of WSNs, stages of operation, in the first stage topology management is
and named as Trust-Distrust Protocol (TDP). The proposed done. The WSN not configured by any desired topology.
protocol has four stages, initial stage is topology management, Hence it is essential to maintain a topology to achieve proper
where an improved k-means algorithm is applied. Then the second communication. An improved k-means algorithm is applied
stage is Link Quality Appraisal, which means fitness evaluation of for the topology management. The second stage is Link
every nodes in the network. The third stage is Grading, in which Quality Appraisal (LQA), where the quality of every node in
based on the fitness value a grade point is allotted to every node.
is analysed. Third stage is Grading, in which based on the
In the last stage the secure path for the routing is determined
based on grade point. The proposed TDP is tested in NS2 and the quality of the node a grade value is assigned to every node.
performance is compared with the existing LEACH protocol. Then in the final stage based on the grade point vale a secure
Ultimately the proposed protocol outperform the performance of and low energy consuming path will be selected for routing.
the existing routing protocol. The outline to the paper is as follows: the recent research
related to the WSN routing is given in section 2. Proposed
Keywords: Wireless Sensor Network, secure routing, energy aware trust distrust protocol for the WSN routing is described in
routing, improved k-means algorithm, routing protocol.
section 3. Implementation results and discussion is given is
I. INTRODUCTION section 4. Then in the subsequent sections the conclusion and
reference to the paper is given.
Wireless network become a part of day to day life,
because of its tremendous application. Due to its growth the II. RELATED WORK
necessity of self-organizing wireless network is adopted to
Some of the recent research related to the routing in WSN is
provide flexible anytime, anywhere networking. Wireless
listed below;
Sensor Network, Mobile Ad hoc Network (MANET),
Wireless sensor networks is one of the most usable
Vehicular Ad hoc Network (VANET) and Wireless Mesh
technologies in this era. However, the sensor nodes are
Network (WMN) and, are the most usable self-organizing
limited by energy resources, hence developoing energy
network. Among them WSN has it unique advantages, and
efficient routing protocol for WSN become the research
widely used in industrial and military purpose [1].
motivation. Gurbinder Singh Brar et al. [10] have exhibited
WSN is configured with any kind of sensor nodes, which
hybrid optimization based PEGASIS-DSR routing protocol
can acts as sender as well as receiver. Each sensor nodes has
that utilizes cache and directional transmission idea of both
its own battery backup, storage and an antenna. Sensor
proactive and responsive routing protocol. Xiaonan Wang et
network can operate a specified frequency band, and didn’t
al. [11] have delivered the addressing based routing
have any specified topology. Security and energy become
techniques (ABRS) for WSN. Based on perceptions that
major issues, should be concentrated throughout the
sensor networks may neglect to be designed with an address
communication in WSN. Sensor networks have the self-
because of lack of routes and address space along a tree won't
organizing feature, thus automatic selection of sender and
not be ideal. Ju Ren et al. [12] have developed model to
receiver is applicable hence security become a milestone in
assess energy consumption, lifetime and traffic load of sensor
WSN [2]. WSN can support multimedia information
networks in data gathering WSN. Their propagation comes
transmission, in this case the energy and Quality of Service
about display that their proposed model could assess energy
(QoS) should be concentrated while routing [3-5].
hole evolution process inside an ER smaller than 5%.
Recent researches in WSN have proposed different
Juan Luo et al. [13] have focused on minimizing energy
routing protocol, among them energy is most consider
consumption and maximizing system lifetime of 1D queue
objective in their routing strategy. Routing protocol has most
organize where areas of sensors were unchangeable and
of the attention, because it can vary depends on the network
predetermined. For this matter, they get information from
architecture and its application [6]. Micro sensor networks
opportunistic routing theory to advance the system energy
can contain hundreds or thousands of sensing nodes. It is
consumption by considering differentiation among sensor
essential to develop cheap and energy efficient sensor nodes
networks to the extent distance to sink and remaining energy.
[7]. In contrast with IP-based communication, which is
Trong-Thua Huynh et al. [14] have proposed another Step 1: Consider ‘k’ initial centroid for clustering the sensor
distributed clustering way to deal with decide the best cluster nodes into ‘k’ cluster. In conventional k-means algorithm the
head for every cluster in WSNs keeping so as to trade-off initial centroid is placed at random position. In the proposed
end-to-end delay and energy consumption. improved k-means algorithm initial centroid is placed at
equal distance to each other.
III. PROPOSED TRUST-DISTRUST PROTOCOL Step 2: Euclidian distance based clustering is undergone. To
Providing secure routing in WSN becoming a challenging find the minimum variance clustering of nodes into k
task, hence many research work have been presented, still
there is a vacuum for research in the routing protocol for
clusters. To find the k centroids m j ^ ` k
j 1 in Rd is,
WSN. In this paper I have developed a novel strategy for the
¦ §¨© min d X ,m ·¸¹,
§1·
¨ ¸u
2
routing in WSN, which can also provide the security while i j for i 1 to n (1)
data transmission. The proposed routing strategy is named as ©n¹ j

TDP. In this section the description on the proposed routing


protocol is described in detail. Lack of continuous network
Where, d X i ,m j is the Euclidean distance between X i
connectivity become the noticeable technical problem in
WSN.
and m j . Then the points ^m `
j
k
j 1 known as cluster
In this paper a novel routing approach is developed for the center.
WSNs, the proposed approach comprises of four phases they START
are topology management, fitness value calculation, trust-
distrust setting and path selection. In WSN proving constant Place initial ‘k’ group of
link between sensor nodes is a complex task. Thus in the centroids
proposed system a virtual topology is generated to ease the
routing process. An improved k-means algorithm is utilized
Assign each node to the centroid nearest to
for the topology management. Then the fitness value of every it and form initial clusters
node is determined by sending and receiving sample packets.
Subsequently based on the fitness value the trust-distrust
value is defined for the nodes then based on this value the Recalculate the positions of
routing path is selected. The architecture for the proposed centroid in each cluster
TDP is given in fig 1.
Position of centroid
YES
change ?
Cluster Node Sender
NO
Secure END
Fitness D Path
T
Euclidean distance
Fig 2. Flow chart for clustering the nodes in WSN
Grading Receiver
Step 3: Centroid update by recalculate the centroid position.
Location of Nodes
Step 4: If the position of centroid changes, the iteration is
repeated by moving to Step 2, otherwise the clustering gets
Topology Management Trust Distrust Path Selection finalized.
The above steps can perform clustering of nodes into ‘k’
Fig 1: Architecture of TDP clusters and cluster heads are to be chosen as shown in fig 2.
The improved k-means algorithm algorithm can group the
A. Topology Management nodes in the nearest region and the cluster head is assumed as
In WSN to realize the management of the overall delivery a base node, so that the link can provide easily. Then the
topology, employed the topology management. In the fitness value for every node in WSN has to calculate it is
proposed protocol an improved k-means algorithm is used for discussed in the subsequent section.
managing the topology. The improved K-means algorithm
clustering technique which groups the nodes based on the B. Link Quality Apprisal
similarity. Clustering is a soft computing technique which In this phase the trust ability or the quality of every node
can gather similar objects or items in same group. in the WSN, it ensure the denial-of-service (DoS) attach. The
The attributes are considering here to group the node is DoS attack generally consists of efforts to temporary or
distance and energy. Hence in this paper the sensor nodes are permanent interrupt in communication path. Hence in order
grouped based on the distance between each nodes. The to ensure the trust ability of a node in WSN, a sample set of
nearest nodes with closer energy level are kept in a same packets is sent and receive it back by the same node, the
group. In WSN clustering the selection of center node sending and receiving ratio represents the fitness value of the
(cluster head) is one of the challenging tasks. An improved particular node.
k-means algorithm is applied in the proposed protocol for the For example, consider two sensor nodes ‘X’ and ‘Y’, here
clustering and cluster head selection. ‘X’ wants to verify the fitness value of sensor node ‘Y’
Step involved in the improved k-means algorithm for means. The sensor node ‘X’ sent a set of hello packets to ‘Y’.
clustering the nodes in WSN is as follows: Sensor node ‘Y’ will receive the packets and retransmit it to
‘X’. If the number of packets transmitted and received by ‘X’
is same then the fitness value of node ‘Y’ is 100%. In our
protocol the cluster head acts as the base node, hence the base node from cluster1 is considered as a source node and node in
node alone verify the fitness of other nodes in their cluster. cluster2 is considered as destination shown in fig 4. First the
The fitness value of a node can be finding out by using the source node sends the information to its base node and it
eqn. (2). forward it to the corresponding base node, then the
FPi corresponding base node convey the information to
Fi u100 (2) destination node through the trust-distrust procedure.
RPi
For sending the information from source to its base it
Where, ‘ Fi ’- Fitness Value of i th node analyzes the trust-distrust value of its adjacent node and the
‘ FPi ’- No of packets forwarded by i th node appropriate node is selected. The source nodes never send
directly to its base unless it is in adjacent. Here the source
‘ RPi ’ - No of packets received by i th node node check the trust-distrust value of adjacent, where two
nodes are adjacent to the source among them one have
C. Grading distrust value and another has trust value, so the trusted node
In general term the trust and distrust is a kind of is selected. Base node is adjacent to the selected node, so it
appreciation, to motivate and hour best participant in directly sends the information to the base.
everywhere. In this paper the trust and distrust is a kind of
ranking based on the trust ability of nodes in WSN. The
formula for calculating the trust-distrust value is given in eqn.
(3).
Fi
TD (3)
10
Where, TD is the Trust-distrust it is calculated to define
the fitness value out of 10.

if (TD>5)
Trust from 1 to 5
Base Node

else if (TD≤5) D

Distrust from 1 to 5 Sender Node

end
Receiver Node

Fig 3. Syntax for honoring Trust-distrust


Fig 4: Path Selection
The syntax for calculating the trust-distrust setting is
shown in fig 3, the trust value is given for the node having After receiving the information by the based node it
TD value is greater than five and if the TD value is five or analyses the destination address, that whether the destination
less than five distrust values is given. For example if the is also present in its group otherwise it transmit the
nodes N1, N2, N3, N4, N5, N6, N7, N8, N9 and N10 having information to the adjacent base nodes, then the process is
TD values as 10, 9, 8, 7, 6, 5, 4, 3, 2 and 1 respectively, then repeated to reach the destination in cluster2 as given in fig 4.
the trust-distrust setting become T5, T4, T3, T2, T1, D1, D2, The packet format is shown in fig 5.
D3, D4 and D5 respectively, where T5 means Trust-5 and D5
means Distrust-5. Hence the highest trust node is highly
believed for secure routing and highest distrust node is never Header Information Trailer
considered for routing.
D. Path Selection Fig 5. Packet format
Selection of path is one of the crucial processes in every The Header and Trailer are fixed size and having the
network and it became a challenging task in WSN. In the sender and destination address. The nodes in the WSN
proposed system the path is selected on the basis of trust- receive the packet and check whether the destination address
distrust setting. The operation of path selection based on the is same as its address otherwise the node transmits the packet
proposed approach is shown in fig 4. The path selection is a to its base node. The base node checks whether the
major process in the WSN so in the proposed system the path destination node exists in its group otherwise transmit it to
is selected based on the trust-distrust setting. Initially the the other group. While selecting the path based on the trust-
nodes in the WSN are grouped based on the distance and the distrust values the loss can minimized by preventing from the
trust value for every node is calculated by sending a sample DoS attacks. Moreover the path is in short rage so the
packets. Then based on the fitness value the trust-distrust continuity can maintain for a long time than the normal
value is provided for every nodes and this value is consider WSN. Hence form this overall system the proper routing can
for the path selection the operation of the path selection is achieved in WSN, by enhancing the security and reducing the
shown in fig 4. loss.
Let us consider a WSN having 18 nodes; initially it is
clustered into two by applying k-means algorithm, so the
cluster1 contain 7 nodes and cluster2 contains 11 nodes. A
IV. IMPLEMENTATION RESULTS AND DISCUSSION by corresponding nodes is called throughput, the comparison
The proposed TDP for the secure routing in WSN is based on throughput is shown in fig 9. The amount of
implemented in the working platform of NS2. The simulation information loss, while routing is termed as packet loss ratio,
parameter is given in table I. the loss of packet should be minimum in a system. The
comparison based on packet loss is shown in fig 10. The total
energy required to complete a communication is denoted as
energy consumption, the comparison chart based on energy
TABLE. I SIMULATION PARAMETERS consumption is shown in fig 11.
Parameter Values
Number of nodes 250
Area(deployment) 300*300 m2
Initial energy 1 Joules
MAC Type IEEE 802.11
Data packet size 1024 bits/ sec
Transmitted power 0.02 watts
Received power 0.01 watts
Frequency range 5 GHZ
Transmission range 120m

In our work totally 250 nodes are placed in WSN. Then


the deployment area is covered by six clusters. Initially
cluster heads are selected to form a cluster within the
transmission area. In figure 6 marked area represents the
cluster head and totally six clusters are formed.
Fig 8. Delay analysis

Fig 9. Throughput analysis

Fig 6. Node placement in WSN

The computed quantitative relation between the amount


of management and also the number of transmitted packets is
termed as overhead analysis and is shown in fig 7.

Fig 10. Packet loss analysis

Fig 7. Overhead analysis

The time taken to route packet from sender to receiver is


denoted as delay. The delay comparison is shown in fig 8.
The rate at which the whole data get transmitted and received
[1] A. Wood, J.A. Stankovic, G. Virone, L. Selavo, Zhimin He,
Qiuhua Cao, Thao Doan, Yafeng Wu, Lei Fang and R. Stoleru,
“Context-aware wireless sensor networks for assisted living and
residential monitoring,” IEEE Network, vol. 22, no. 4, pp. 26-33,
2008
[2] Chris Karlof and David Wagner, “Secure routing in wireless
sensor networks: attacks and countermeasures,” Ad Hoc
Networks, vol. 1, pp. 293-315, 2003
[3] K. Akkaya and M. Younis, “An energy-aware QoS routing
protocol for wireless sensor networks,” In Proceedings of 23rd
International Conference on Distributed Computing Systems
Workshops, pp. 710-715, 2003
[4] L. Doherty, K.S.J. Pister and L. El Ghaoui, "Convex position
estimation in wireless sensor networks," In Proceedings of IEEE
INFOCOM 2001, Twentieth Annual Joint Conference of the
IEEE Computer and Communications Societies, vol. 3, pp. 1655-
Fig 11. Energy consumption analysis 1663, 2001
[5] I. Stojmenovic, “Position-based routing in ad hoc networks,”
In this performance analysis, we have observed that the IEEE Communications Magazine, vol. 40, no. 7, pp. 128-134,
2002
proposed system has reduced overhead, delay, packet loss [6] Kemal Akkaya and Mohamed Younis, “A survey on routing
and energy consumption which are shown in fig 7, fig 8, fig protocols for wireless sensor networks,” Ad Hoc Networks, Vol.
10 and fig 11 respectively. On the other head the proposed 3, pp. 325-349, 2005
system has improved throughput which is shown in fig 9. [7] W.R. Heinzelman, A. Chandrakasan and H. Balakrishnan,
“Energy-efficient communication protocol for wireless
microsensor networks,” In Proceedings of the 33rd Annual
V. CONCLUSION Hawaii International Conference on System Sciences, vol. 2, pp.
In every network system security of information is the 1-10, 2000
most concentrated issue, in case of WSNs it is a challenging [8] Min Chen, Taekyoung Kwon and Yanghee Choi, “Energy-
efficient differentiated directed diffusion (EDDD) in wireless
task. The security of the WSN can achieved by proper routing sensor networks,” Computer Communication, vol. 29, no. 2, pp.
hence in this paper a novel routing protocol is proposed. In 231-245, 2005
the proposed protocol initially the topology management is [9] Mohamed Younis and Kemal Akkaya, “Strategies and techniques
done by using an improved k-means algorithm. Then the for node placement in wireless sensor networks: A survey,” Ad
Hoc Networks, Vol. 6, pp. 621-655, 2008
fitness of every node is calculated by sending and receiving a [10] Gurbinder Singh Brar, Shalli Rani, Vinay Chopra, Rahul
set of sample packets (or hello packet), the ratio of receiving Malhotra, Houbing Song, and Syed Hassan Ahmed, “Energy
to transmitting is denoted as trust ability or the fitness of a Efficient Direction-Based PDORP Routing Protocol for WSN,”
node. Based on this fitness a grade for every node is defined, IEEE Access, vol. 4, pp. 3182-3194, 2016.
[11] Xiaonan Wang, Hongbin Cheng, and Yufeng Yao, “Addressing-
it is similar to ranking of nodes in the range of five. At last based routing optimization for 6LoWPAN WSN in vehicular
the best suitable path for transmission is selected based on the scenario,” IEEE Sensors Journal, vol. 16, no. 10, pp. 3939-3947,
grade of node. The proposed system for the routing in WSN 2016.
is implemented in NS2 and the comparison is made with the [12] Ju Ren, Yaoxue Zhang, Kuan Zhang, Anfeng Liu, Jianer Chen,
and Xuemin Sherman Shen, “Lifetime and energy hole evolution
existing technique like LEACH. The performance analysis in data-gathering wireless sensor networks,” IEEE
comparison proved that the proposed system has improved Transactions on Industrial Informatics, vol. 12, no. 2, pp. 788-
average success ratio and reduced energy consumption. 800, 2016.
Hence it proves that the security of the proposed system is [13] Juan Luo, Jinyu Hu, Di Wu, and Renfa Li, “Opportunistic routing
algorithm for relay node selection in wireless sensor networks,”
achieved by this enhance success ratio. Ultimately the IEEE Transactions on Industrial Informatics, vol. 11, No. 1, pp.
performance analysis proves that the proposed protocol 112-121, 2015.
become one of the best choice for routing in WSN with high [14] Trong-Thua Huynh, Anh-Vu Dinh-Duc, and Cong-Hung Tran,
security and reduced energy consumption. “Delay-constrained energy-efficient cluster-based multi-hop
routing in wireless sensor networks,” Journal of Communications
and Networks, vol. 18, no. 4, pp. 580-588, 2016.
REFERENCE

You might also like