Full Paper View Go Back
Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks
Musa Mojarad1 , Sayed Ebrahim Mousavipoor2 , Ali Kohan Mansourkhani3
Section:Research Paper, Product Type: Journal-Paper
Vol.9 ,
Issue.6 , pp.13-19, Dec-2021
Online published on Dec 31, 2021
Copyright Β© Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani, βUsing of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks,β International Journal of Scientific Research in Computer Science and Engineering, Vol.9, Issue.6, pp.13-19, 2021.
MLA Style Citation: Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani "Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks." International Journal of Scientific Research in Computer Science and Engineering 9.6 (2021): 13-19.
APA Style Citation: Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani, (2021). Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks. International Journal of Scientific Research in Computer Science and Engineering, 9(6), 13-19.
BibTex Style Citation:
@article{Mojarad_2021,
author = {Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani},
title = {Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2021},
volume = {9},
Issue = {6},
month = {12},
year = {2021},
issn = {2347-2693},
pages = {13-19},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2600},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2600
TI - Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani
PY - 2021
DA - 2021/12/31
PB - IJCSE, Indore, INDIA
SP - 13-19
IS - 6
VL - 9
SN - 2347-2693
ER -
Abstract :
Wireless sensor networks (WSNs) are the most widely used field of high-potential network generations in unpredictable and dynamic environments. However, these networks are vulnerable due to their open media, changing and dynamic topology and routing algorithms. Case networks and wireless networks support various features such as dynamic self-organization, self-configuration, self-correction, easy maintenance, high scalability and reliable services. Despite the many features mentioned, this network is very susceptible to damage caused by attacks. In this paper, an energy-aware routing algorithm for WSNs is presented that uses level-to-level clustering. This technique is used to increase the network lifetime, where the network area is divided into different levels according to the radio range of the nodes and clustering is done separately in each level. This routing method is developed based on the AODV routing protocol and uses a multi-path routing technique. The simulation was performed by MATLAB software in the presence of a DoS attack. The experimental results show that the evaluation criteria in the proposed algorithm such as throughput and network lifetime against DoS attack have improved compared to other similar algorithms.
Key-Words / Index Term :
AODV Protocol; Wireless Sensor Networks; Clustering; Trust-Based Routing
References :
[1] Y. Yu, K. Li, W. Zhou, P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and computer Applications, Vol.35, Issue.3, pp.867β880, 2012.
[2] A. Rezaeipanah, H. Nazari, G. Ahmadi, "A hybrid approach for prolonging lifetime of wireless sensor networks using genetic algorithm and online clustering," Journal of Computing Science and Engineering, Vol.13, Issue.4, pp.163β174, 2019.
[3] J. Lopez, R. Roman, I. Agudo, C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, Vol.33, Issue.9, pp.1086β1093, 2010.
[4] A. Rezaeipanah, H. Nazari, M. Abdollahi, "Reducing Energy Consumption in Wireless Sensor Networks Using a Routing Protocol Based on Multi-level Clustering and Genetic Algorithm," International Journal of Wireless and Microwave Technologies, Vol.3, Issue.1, pp.1β16, 2020.
[5] T. Khan, K. Singh, M. Abdel-Basset, H.V. Long, S.P. Singh, M. Manjul, "A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks," IEEE Access, Vol.7, pp.58221β58240, 2019.
[6] T. Zahariadis, H. Leligou, P. Karkazis, P. Trakadas, I. Papaefstathiou, C. Vangelatos, L. Besson, "Design and implementation of a trust-aware routing protocol for large WSNs," International Journal of Network Security & Its Applications (IJNSA), Vol.2, Issue.3, pp.52-68, 2010.
[7] S.S. Babu, A. Raha, M.K. Naskar, "Trustworthy route formation algorithm for WSNs," International Journal of Computer Applications, Vol.975, pp.8887, 2011.
[8] G. Zhan, W. Shi, J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Transactions on dependable and secure computing, Vol.9, Issue.2, pp.184-197, 2011.
[9] G. Zhan, W. Shi, J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Transactions on dependable and secure computing, Vol.9, Issue.2, pp.184-197, 2011.
[10] S. Shen, L. Huang, E. Fan, K. Hu, J. Liu, Q. Cao, "Trust dynamics in WSNs: an evolutionary game-theoretic approach," Journal of Sensors, Vol.2016, pp.1β10, 2016.
[11] N. Marchang, R. Datta, "Light-weight trust-based routing protocol for mobile ad hoc networks," IET Information security, Vol.6, Issue.2, pp.77-83, 2012.
[12] J. Duan, D. Yang, H. Zhu, S. Zhang, J. Zhao, "TSRF: A trust-aware secure routing framework in wireless sensor networks," International Journal of Distributed Sensor Networks, Vol.2014, pp.1β14, 2014.
[13] Y. Liu, M. Dong, K. Ota, A. Liu, "ActiveTrust: Secure and trustable routing in wireless sensor networks," IEEE Transactions on Information Forensics and Security, Vol.11, Issue.9, pp.2013β2027, 2016.
[14] H.C. Chen, "TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks," IEEE Systems Journal, Vol.11, Issue.2, pp.449β459, 2015.
[15] A. Ahmed, K.A. Bakar, M.I. Channa, K. Haseeb, A.W. Khan, "TERP: A trust and energy aware routing protocol for wireless sensor network," IEEE Sensors Journal, Vol.15, Issue.12, pp.6962β6972, 2015.
[16] A. Zahedi, F. Parma, "An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks," Peer-to-Peer Networking and Applications, Vol.12, pp.167β176, 2019.
[17] P.A. Patil, R.S. Deshpande, P.B. Mane, "Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization Algorithm," Wireless Personal Communications, Vol.115, Issue.1, pp.415β437, 2020.
[18] T. Kalidoss, L. Rajasekaran, K. Kanagasabai, G. Sannasi, A. Kannan, "QoS aware trust-based routing algorithm for wireless sensor networks," Wireless Personal Communications, Vol.110, Issue.4, pp.1637β1658, 2020.
[19] M. Shelke, A. Malhotra, P.N. Mahalle, "Congestion-aware opportunistic routing protocol in wireless sensor networks," In smart computing and informatics, pp.63-72, 2018.
[20] E. Rozner, J. Seshadri, Y.A. Mehta, L. Qiu, "SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks," IEEE Transactions on Mobile Computing, Vol.8, Issue.12, pp.1622, 2009.
[21] D. Liu, "Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks," IEEE/ACM Transactions on Networking, Vol.24, Issue.2, pp.662β673, 2016.
[22] D. Qin, S. Yang, S. Jia, Y. Zhang, J. Ma, Q. Ding, "Research on trust sensing based secure routing mechanism for wireless sensor network," IEEE Access, Vol.5, pp.9599β9609, 2017.
[23] M. Mojarad, F. Sarhangnia, A. Rezaeipanah, H. Parvin, S. Nejatian, "Modeling Hereditary Disease Behavior Using an Innovative Similarity Criterion and Ensemble Clustering,β Current Bioinformatics, In Press, 2021.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atΒ support@isroset.org or view contact page for more details.