Professional Documents
Culture Documents
Abstract — Now a days usage of Wireless Sensor Networks depends on global addresses as well as routing metrics of hop
(WSNs) is increasing, because of its wide application. Unlike counts, the sensor nodes typically lack global addresses [8].
common networks the WSNs have the capability of The major challenge in designing WSN is the provision of
reconfiguration, whenever any defect occurs in the network. the functional, and the non-functional, for example data
However, while routing in these network the loss of data is
latency and integrity respectively [9].
occurring due to its security lack. Hence many researchers have
presented their research for providing secure routing in WSNs. In this paper, we have introduced a novel routing protocol
The security is still an issue in routing of WSNs. In this paper, we for WSN, named as TDP. The proposed protocol have four
have developed a novel protocol for the secure routing of WSNs, stages of operation, in the first stage topology management is
and named as Trust-Distrust Protocol (TDP). The proposed done. The WSN not configured by any desired topology.
protocol has four stages, initial stage is topology management, Hence it is essential to maintain a topology to achieve proper
where an improved k-means algorithm is applied. Then the second communication. An improved k-means algorithm is applied
stage is Link Quality Appraisal, which means fitness evaluation of for the topology management. The second stage is Link
every nodes in the network. The third stage is Grading, in which Quality Appraisal (LQA), where the quality of every node in
based on the fitness value a grade point is allotted to every node.
is analysed. Third stage is Grading, in which based on the
In the last stage the secure path for the routing is determined
based on grade point. The proposed TDP is tested in NS2 and the quality of the node a grade value is assigned to every node.
performance is compared with the existing LEACH protocol. Then in the final stage based on the grade point vale a secure
Ultimately the proposed protocol outperform the performance of and low energy consuming path will be selected for routing.
the existing routing protocol. The outline to the paper is as follows: the recent research
related to the WSN routing is given in section 2. Proposed
Keywords: Wireless Sensor Network, secure routing, energy aware trust distrust protocol for the WSN routing is described in
routing, improved k-means algorithm, routing protocol.
section 3. Implementation results and discussion is given is
I. INTRODUCTION section 4. Then in the subsequent sections the conclusion and
reference to the paper is given.
Wireless network become a part of day to day life,
because of its tremendous application. Due to its growth the II. RELATED WORK
necessity of self-organizing wireless network is adopted to
Some of the recent research related to the routing in WSN is
provide flexible anytime, anywhere networking. Wireless
listed below;
Sensor Network, Mobile Ad hoc Network (MANET),
Wireless sensor networks is one of the most usable
Vehicular Ad hoc Network (VANET) and Wireless Mesh
technologies in this era. However, the sensor nodes are
Network (WMN) and, are the most usable self-organizing
limited by energy resources, hence developoing energy
network. Among them WSN has it unique advantages, and
efficient routing protocol for WSN become the research
widely used in industrial and military purpose [1].
motivation. Gurbinder Singh Brar et al. [10] have exhibited
WSN is configured with any kind of sensor nodes, which
hybrid optimization based PEGASIS-DSR routing protocol
can acts as sender as well as receiver. Each sensor nodes has
that utilizes cache and directional transmission idea of both
its own battery backup, storage and an antenna. Sensor
proactive and responsive routing protocol. Xiaonan Wang et
network can operate a specified frequency band, and didn’t
al. [11] have delivered the addressing based routing
have any specified topology. Security and energy become
techniques (ABRS) for WSN. Based on perceptions that
major issues, should be concentrated throughout the
sensor networks may neglect to be designed with an address
communication in WSN. Sensor networks have the self-
because of lack of routes and address space along a tree won't
organizing feature, thus automatic selection of sender and
not be ideal. Ju Ren et al. [12] have developed model to
receiver is applicable hence security become a milestone in
assess energy consumption, lifetime and traffic load of sensor
WSN [2]. WSN can support multimedia information
networks in data gathering WSN. Their propagation comes
transmission, in this case the energy and Quality of Service
about display that their proposed model could assess energy
(QoS) should be concentrated while routing [3-5].
hole evolution process inside an ER smaller than 5%.
Recent researches in WSN have proposed different
Juan Luo et al. [13] have focused on minimizing energy
routing protocol, among them energy is most consider
consumption and maximizing system lifetime of 1D queue
objective in their routing strategy. Routing protocol has most
organize where areas of sensors were unchangeable and
of the attention, because it can vary depends on the network
predetermined. For this matter, they get information from
architecture and its application [6]. Micro sensor networks
opportunistic routing theory to advance the system energy
can contain hundreds or thousands of sensing nodes. It is
consumption by considering differentiation among sensor
essential to develop cheap and energy efficient sensor nodes
networks to the extent distance to sink and remaining energy.
[7]. In contrast with IP-based communication, which is
Trong-Thua Huynh et al. [14] have proposed another Step 1: Consider ‘k’ initial centroid for clustering the sensor
distributed clustering way to deal with decide the best cluster nodes into ‘k’ cluster. In conventional k-means algorithm the
head for every cluster in WSNs keeping so as to trade-off initial centroid is placed at random position. In the proposed
end-to-end delay and energy consumption. improved k-means algorithm initial centroid is placed at
equal distance to each other.
III. PROPOSED TRUST-DISTRUST PROTOCOL Step 2: Euclidian distance based clustering is undergone. To
Providing secure routing in WSN becoming a challenging find the minimum variance clustering of nodes into k
task, hence many research work have been presented, still
there is a vacuum for research in the routing protocol for
clusters. To find the k centroids m j ^ ` k
j 1 in Rd is,
WSN. In this paper I have developed a novel strategy for the
¦ §¨© min d X ,m ·¸¹,
§1·
¨ ¸u
2
routing in WSN, which can also provide the security while i j for i 1 to n (1)
data transmission. The proposed routing strategy is named as ©n¹ j
if (TD>5)
Trust from 1 to 5
Base Node
else if (TD≤5) D
end
Receiver Node