Reference Hub15
Communication Trust and Energy-Aware Routing Protocol for WSN Using D-S Theory

Communication Trust and Energy-Aware Routing Protocol for WSN Using D-S Theory

Srinivasan Palanisamy, Sankar S., Ramasubbareddy Somula, Ganesh Gopal Deverajan
Copyright: © 2021 |Volume: 13 |Issue: 4 |Pages: 13
ISSN: 1938-0259|EISSN: 1938-0267|EISBN13: 9781799860198|DOI: 10.4018/IJGHPC.2021100102
Cite Article Cite Article

MLA

Palanisamy, Srinivasan, et al. "Communication Trust and Energy-Aware Routing Protocol for WSN Using D-S Theory." IJGHPC vol.13, no.4 2021: pp.24-36. http://doi.org/10.4018/IJGHPC.2021100102

APA

Palanisamy, S., Sankar S., Somula, R., & Deverajan, G. G. (2021). Communication Trust and Energy-Aware Routing Protocol for WSN Using D-S Theory. International Journal of Grid and High Performance Computing (IJGHPC), 13(4), 24-36. http://doi.org/10.4018/IJGHPC.2021100102

Chicago

Palanisamy, Srinivasan, et al. "Communication Trust and Energy-Aware Routing Protocol for WSN Using D-S Theory," International Journal of Grid and High Performance Computing (IJGHPC) 13, no.4: 24-36. http://doi.org/10.4018/IJGHPC.2021100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Wireless sensor networks (WSN) deployed in open environments make nodes prone to various security attacks due to their resource constrained nature. The compromised nodes are used to mislead the sensed data and disrupt communication, which can affect the entire decision-making system based on the sensed data. It is also possible to drain the sensor nodes energy and reduce the battery life of the networks. Trust models are the preferred mechanism to secure WSN. In this paper, the authors present communication trust and energy aware (CTEA) routing protocol that make use of the proposed trust model to mitigate the effects of badmouth and energy drain attacks. They use Dempster theory to compute communication trust and also consider the energy metric, to establish the route for data transfer. The simulation result shows that the proposed trust model increases the packet delivery ratio, residual energy, and network lifetime by mitigating the nodes misbehaviour in presence of energy drain and bad mouth attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.