A Secure Energy Efficiency Routing Approach in Wireless Sensor Networks
Anuradha Garg1, Ajay Tiwari2, Hemant Kumar Garg3
1Anuradha Garg, Astt. Prof. Alankar PG Girls College, Jaipur, India.
2Dr.Ajay Tiwari, Astt. Prof. Tirupati College of Technical Education, Jaipur, India.
3Hemant Kumar Garg, Lecturer, Govt. Women Polytechnic College, Jaipur, India.
Manuscript received on January 18, 2013. | Revised Manuscript received on February 07, 2013. | Manuscript published on February 28, 2013. | PP: 521-524 | Volume-2 Issue-3, February 2013. | Retrieval Number: C1213022313/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: For the energy limited wireless sensor networks, the critical problem is how to achieve the energy efficiency. Many attackers can consume the limited network energy, by the method of capturing some legal nodes then control them to start DoS and flooding attack, which is difficult to be detected by only the classic cryptography based techniques with common routing protocols in wireless sensor networks. We argue that under the condition of attacking, existing routing schemes are low energy-efficient and vulnerable to inside attack due to their deterministic nature. To avoid the energy consumption caused by the inside attack initiated by the malicious nodes, this paper proposes a novel energy efficiency routing. Under our design, each node computes the trust value of its 1-hop neighbors based on their multiple behaviors attributes evaluation and builds a trust management by the trust value. By this way, sensor nodes act as router to achieve dynamic and adaptive routing, where the node can select much energy efficiency and faithful forwarding node from its neighbors according to their remaining energy and trust values in the next process of data collection.
Keywords: Wireless Sensor Network, Energy efficiency, node compromised, trust management.