Centralized Trust Based Secure Routing in Wireless Networks

Centralized Trust Based Secure Routing in Wireless Networks

ABSTRACT:

Wireless networks are vulnerable to various network attacks. To cope with these security issues, trust-based routing schemes have emerged. Typically, trust routing schemes are mainly focused on detection of packet drop attacks, because this type of an attack is simple and obviously a malicious behavior. However, there are more advanced attacks, such as, false trust reporting or compromised attacks, where trust-based routing to defend these attacks is more difficult because of their ambiguous behavior. In order to ensure data transmission reliability even against such attacks, in this letter a centralized trust based secure routing (CSR) scheme is proposed for wireless networks. Simulation results show that the CSR scheme provides a better performance compared to the ATR and SPR schemes.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS: 

  • System : Pentium Dual Core.
  • Hard Disk : 120 GB.
  • Monitor : 15’’ LED
  • Input Devices : Keyboard, Mouse
  • Ram : 1 GB

SOFTWARE REQUIREMENTS: 

  • Operating system : Windows XP/UBUNTU.
  • Implementation : NS2
  • NS2 Version : 2.28
  • Front End : OTCL (Object Oriented Tool Command  Language)
  • Tool : Cygwin (To simulate in Windows OS)

REFERENCE:

Jusik Yun, Sunho Seo, and Jong-Moon Chung, Senior Member, IEEE, “Centralized Trust Based Secure Routing in Wireless Networks”, IEEE Wireless Communications Letters, 2018.

About the Author