Full Paper View Go Back

Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks

Musa Mojarad1 , Sayed Ebrahim Mousavipoor2 , Ali Kohan Mansourkhani3

Section:Research Paper, Product Type: Journal-Paper
Vol.9 , Issue.6 , pp.13-19, Dec-2021


Online published on Dec 31, 2021


Copyright Β© Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani, β€œUsing of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks,” International Journal of Scientific Research in Computer Science and Engineering, Vol.9, Issue.6, pp.13-19, 2021.

MLA Style Citation: Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani "Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks." International Journal of Scientific Research in Computer Science and Engineering 9.6 (2021): 13-19.

APA Style Citation: Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani, (2021). Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks. International Journal of Scientific Research in Computer Science and Engineering, 9(6), 13-19.

BibTex Style Citation:
@article{Mojarad_2021,
author = {Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani},
title = {Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2021},
volume = {9},
Issue = {6},
month = {12},
year = {2021},
issn = {2347-2693},
pages = {13-19},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2600},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2600
TI - Using of AODV Protocol to Develop Trust-Based Routing Algorithms in Wireless Sensor Networks
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Musa Mojarad, Sayed Ebrahim Mousavipoor, Ali Kohan Mansourkhani
PY - 2021
DA - 2021/12/31
PB - IJCSE, Indore, INDIA
SP - 13-19
IS - 6
VL - 9
SN - 2347-2693
ER -

245 Views    329 Downloads    72 Downloads
  
  

Abstract :
Wireless sensor networks (WSNs) are the most widely used field of high-potential network generations in unpredictable and dynamic environments. However, these networks are vulnerable due to their open media, changing and dynamic topology and routing algorithms. Case networks and wireless networks support various features such as dynamic self-organization, self-configuration, self-correction, easy maintenance, high scalability and reliable services. Despite the many features mentioned, this network is very susceptible to damage caused by attacks. In this paper, an energy-aware routing algorithm for WSNs is presented that uses level-to-level clustering. This technique is used to increase the network lifetime, where the network area is divided into different levels according to the radio range of the nodes and clustering is done separately in each level. This routing method is developed based on the AODV routing protocol and uses a multi-path routing technique. The simulation was performed by MATLAB software in the presence of a DoS attack. The experimental results show that the evaluation criteria in the proposed algorithm such as throughput and network lifetime against DoS attack have improved compared to other similar algorithms.

Key-Words / Index Term :
AODV Protocol; Wireless Sensor Networks; Clustering; Trust-Based Routing

References :
[1] Y. Yu, K. Li, W. Zhou, P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and computer Applications, Vol.35, Issue.3, pp.867–880, 2012.
[2] A. Rezaeipanah, H. Nazari, G. Ahmadi, "A hybrid approach for prolonging lifetime of wireless sensor networks using genetic algorithm and online clustering," Journal of Computing Science and Engineering, Vol.13, Issue.4, pp.163–174, 2019.
[3] J. Lopez, R. Roman, I. Agudo, C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, Vol.33, Issue.9, pp.1086–1093, 2010.
[4] A. Rezaeipanah, H. Nazari, M. Abdollahi, "Reducing Energy Consumption in Wireless Sensor Networks Using a Routing Protocol Based on Multi-level Clustering and Genetic Algorithm," International Journal of Wireless and Microwave Technologies, Vol.3, Issue.1, pp.1–16, 2020.
[5] T. Khan, K. Singh, M. Abdel-Basset, H.V. Long, S.P. Singh, M. Manjul, "A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks," IEEE Access, Vol.7, pp.58221–58240, 2019.
[6] T. Zahariadis, H. Leligou, P. Karkazis, P. Trakadas, I. Papaefstathiou, C. Vangelatos, L. Besson, "Design and implementation of a trust-aware routing protocol for large WSNs," International Journal of Network Security & Its Applications (IJNSA), Vol.2, Issue.3, pp.52-68, 2010.
[7] S.S. Babu, A. Raha, M.K. Naskar, "Trustworthy route formation algorithm for WSNs," International Journal of Computer Applications, Vol.975, pp.8887, 2011.
[8] G. Zhan, W. Shi, J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Transactions on dependable and secure computing, Vol.9, Issue.2, pp.184-197, 2011.
[9] G. Zhan, W. Shi, J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Transactions on dependable and secure computing, Vol.9, Issue.2, pp.184-197, 2011.
[10] S. Shen, L. Huang, E. Fan, K. Hu, J. Liu, Q. Cao, "Trust dynamics in WSNs: an evolutionary game-theoretic approach," Journal of Sensors, Vol.2016, pp.1–10, 2016.
[11] N. Marchang, R. Datta, "Light-weight trust-based routing protocol for mobile ad hoc networks," IET Information security, Vol.6, Issue.2, pp.77-83, 2012.
[12] J. Duan, D. Yang, H. Zhu, S. Zhang, J. Zhao, "TSRF: A trust-aware secure routing framework in wireless sensor networks," International Journal of Distributed Sensor Networks, Vol.2014, pp.1–14, 2014.
[13] Y. Liu, M. Dong, K. Ota, A. Liu, "ActiveTrust: Secure and trustable routing in wireless sensor networks," IEEE Transactions on Information Forensics and Security, Vol.11, Issue.9, pp.2013–2027, 2016.
[14] H.C. Chen, "TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks," IEEE Systems Journal, Vol.11, Issue.2, pp.449–459, 2015.
[15] A. Ahmed, K.A. Bakar, M.I. Channa, K. Haseeb, A.W. Khan, "TERP: A trust and energy aware routing protocol for wireless sensor network," IEEE Sensors Journal, Vol.15, Issue.12, pp.6962–6972, 2015.
[16] A. Zahedi, F. Parma, "An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks," Peer-to-Peer Networking and Applications, Vol.12, pp.167–176, 2019.
[17] P.A. Patil, R.S. Deshpande, P.B. Mane, "Trust and Opportunity Based Routing Framework in Wireless Sensor Network Using Hybrid Optimization Algorithm," Wireless Personal Communications, Vol.115, Issue.1, pp.415–437, 2020.
[18] T. Kalidoss, L. Rajasekaran, K. Kanagasabai, G. Sannasi, A. Kannan, "QoS aware trust-based routing algorithm for wireless sensor networks," Wireless Personal Communications, Vol.110, Issue.4, pp.1637–1658, 2020.
[19] M. Shelke, A. Malhotra, P.N. Mahalle, "Congestion-aware opportunistic routing protocol in wireless sensor networks," In smart computing and informatics, pp.63-72, 2018.
[20] E. Rozner, J. Seshadri, Y.A. Mehta, L. Qiu, "SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks," IEEE Transactions on Mobile Computing, Vol.8, Issue.12, pp.1622, 2009.
[21] D. Liu, "Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks," IEEE/ACM Transactions on Networking, Vol.24, Issue.2, pp.662–673, 2016.
[22] D. Qin, S. Yang, S. Jia, Y. Zhang, J. Ma, Q. Ding, "Research on trust sensing based secure routing mechanism for wireless sensor network," IEEE Access, Vol.5, pp.9599–9609, 2017.
[23] M. Mojarad, F. Sarhangnia, A. Rezaeipanah, H. Parvin, S. Nejatian, "Modeling Hereditary Disease Behavior Using an Innovative Similarity Criterion and Ensemble Clustering,” Current Bioinformatics, In Press, 2021.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atΒ  support@isroset.org or view contact page for more details.

Go to Navigation