SlideShare a Scribd company logo
Trust Based Routing In
wireless sensor
Network
About Sensor Network


Characteristics:          Applications:
   Temporarily formed        Military battlefield
   Nodes act as routers      networks.
   Infrastructure-less       Personal Area Networks

   Limited resources         Disaster and rescue

    wireless medium          operation
Attacks on Wireless Networks

Passive attacks
  Do not change the routing information
  Listen to get valuable information


Active attacks
  Use its energy to manipulate the routing
  information
Passive attack


passive attack "attempts to learn or make use
of information from the system but does not
affect system resources"
Traffic analysis
 each message is encrypted because it is not important whether the
data is
 readable(understandable) to the attacker. Here, the adversary attempts
to
 find patterns in the communication between two node, which might allow
 the adversary to derive certain assumptions based on these patterns.
Passive attack


Traffic analysis


                      Attacker




    Node                            Node
Active Attack




Active attacks include security threats in which an node tries
to manipulate code or data while it is transmitted between
nodes. The most common examples of this kind of attack are
alterations, in which an data is deleted or tampered with by
 an intruder .
Active Attacks

Modification:
  Malicious node can modify routing information

Fabrication:
  Generating false routing message

Impersonation:
  Initiate attack by masquerading as another
  node
Active attack




A                    B




           C
    Malicious Node
Existing Security Solutions

Intrusion prevention
   Encryption, authentication.

Nodes are required to have pre-shared keys or digital
certificates.

Central trust authority or pre configuration is not practical
for ad-hoc networks
Dynamic Source Routing (DSR) Protocol

On demand protocol: route information
discovered only as needed.
Source routing: entire path to destination
supplied by source in packet header.
Procedure:
  •Route discovery
  •Route maintenance
  •Routing
Route Discovery

.
    Route Request:
    Source broadcasts Route Request message for specified
    destination
    Intermediate node adds itself to path in message and
    forwards message toward destination




            A       A,B       A,B,C       A,B,C,D

        A       B         C           D             E
  Trust Based  Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network
DSR Based Model

Trust Based Routing

To compute the direct trust in a node. In doing so we measure the
accuracy and sincerity of the immediate neighboring nodes by monitoring
their participation in the packet forwarding.


As soon as it hears its immediate neighbour forwarding the packet, the
node
 checks the integrity of the packet by verifying it for requisite
modifications.
 If the integrity check passes, it confirms that the node has acted in a
benevolent manner and so its direct trust counter is incremented. Similarly, if
the integrity check fails or the forwarding node does not transmit the packet,
its
corresponding direct trust measure is decremented.
Trust Calculation
Trust Propagation




To propagate trust information beyond a single hop, piggyback the direct
 trust value of nodes along with the ROUTE REQUEST packets.

Before forwarding a ROUTE REQUEST packet, appends the direct trust
value of the preceding node from which it had received the ROUTE
REQUEST packet.

When the ROUTE REQUEST packet is propagated, it also spreads the trust
information of other nodes in the network.
Trust Propagation

                                Tba,
             Tax
                                Tax
     A               B


                           Tcx,
              Tcx
                           Tdc

X     C              D                 Y

                         Tex,
                         Tfe
               Tex
         E           F
References

1.TRUST-BASED ROUTING FOR AD-HOC WIRELESS NETWORKS , Asad Amir Pirzada., Amitava
Datta, Chris McDonald School of Computer Science & Software Engineering, The University of
Western Australia Crawley, WA 6009, Australia

2. An Intrusion Detection System for Wireless Sensor NetworksIlker Onat Ali Miri School of Information
Technology and Engineering University of Ottawa, Canada
e-mail: ionat@site.uottawa.ca, samiri@site.uottawa.ca

3. Intrusion Detection Techniques for Mobile Wireless Networks ,Yongguang Zhang ,HRL Laboratories
LLC, Malibu, California Wenke Lee,College of Computing, Georgia Institute of Technology
E-mail: wenke@cc.gatech.edu
Yi-An Huang,College of Computing, Georgia Institute of Technology
E-mail: yian@cc.gatech.edu
Thank you

More Related Content

What's hot (18)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
LeMeniz Infotech
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET Journal
 
PDF
Enhance the Throughput of Wireless Network Using Multicast Routing
IOSR Journals
 
PDF
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
IRJET Journal
 
PDF
An enhancing security for mobile sinks by providing location privacy in wsn
eSAT Publishing House
 
DOCX
Detection and localization of multiple spoofing attackers in wireless networks
JPINFOTECH JAYAPRAKASH
 
PDF
C0363012014
inventionjournals
 
PDF
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
IRJET Journal
 
PDF
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
PDF
Secure and Reliable Data Routing in Wireless Sensor Network
dbpublications
 
PDF
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
IAEME Publication
 
PDF
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
theijes
 
PDF
security in wireless sensor networks
researcherchennai
 
PDF
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
PDF
Ensure Security and Scalable Performance in Multiple Relay Networks
Editor IJCATR
 
PDF
Hop by-hop message authentication and source privacy in wire-copy-copy
Selva Raj
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
Secure data aggregation technique for wireless sensor networks in the presenc...
LeMeniz Infotech
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET Journal
 
Enhance the Throughput of Wireless Network Using Multicast Routing
IOSR Journals
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
IRJET Journal
 
An enhancing security for mobile sinks by providing location privacy in wsn
eSAT Publishing House
 
Detection and localization of multiple spoofing attackers in wireless networks
JPINFOTECH JAYAPRAKASH
 
C0363012014
inventionjournals
 
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
IRJET Journal
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
Secure and Reliable Data Routing in Wireless Sensor Network
dbpublications
 
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
IAEME Publication
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
theijes
 
security in wireless sensor networks
researcherchennai
 
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Editor IJCATR
 
Hop by-hop message authentication and source privacy in wire-copy-copy
Selva Raj
 

Similar to Trust Based Routing In wireless sensor Network (20)

PDF
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET Journal
 
DOCX
Detection and elemination of block hole attack
Maalolan Narasimhan
 
PDF
Ijarcet vol-2-issue-3-875-880
Editor IJARCET
 
PDF
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
iosrjce
 
PDF
A017320105
IOSR Journals
 
PPT
Ad-HOc presentation
Elanthendral Mariappan
 
PDF
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
IJNSA Journal
 
PDF
Gu2412131219
IJERA Editor
 
PDF
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
IRJET Journal
 
PDF
Trusted Routing Path Selection in WSNs through TARF
Editor IJMTER
 
PPTX
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
ketaki19deshmukh
 
PDF
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
IJECEIAES
 
PDF
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
 
PDF
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
 
PDF
A survey on trust based routing in manet
IAEME Publication
 
PDF
A survey on trust based routing in manet
IAEME Publication
 
PDF
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
ijsrd.com
 
PDF
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET Journal
 
PDF
A comparative study on different trust based routing schemes in manet
ijwmn
 
PDF
Improving Network Security in MANETS using IEEACK
ijsrd.com
 
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...
IRJET Journal
 
Detection and elemination of block hole attack
Maalolan Narasimhan
 
Ijarcet vol-2-issue-3-875-880
Editor IJARCET
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
iosrjce
 
A017320105
IOSR Journals
 
Ad-HOc presentation
Elanthendral Mariappan
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
IJNSA Journal
 
Gu2412131219
IJERA Editor
 
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...
IRJET Journal
 
Trusted Routing Path Selection in WSNs through TARF
Editor IJMTER
 
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
ketaki19deshmukh
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
IJECEIAES
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
IJLT EMAS
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
IJNSA Journal
 
A survey on trust based routing in manet
IAEME Publication
 
A survey on trust based routing in manet
IAEME Publication
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
ijsrd.com
 
Secure Data Communications in Mobile Ad-Hoc Networks
IRJET Journal
 
A comparative study on different trust based routing schemes in manet
ijwmn
 
Improving Network Security in MANETS using IEEACK
ijsrd.com
 
Ad

Recently uploaded (20)

PDF
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
Extensions Framework (XaaS) - Enabling Orchestrate Anything
ShapeBlue
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Persuasive AI: risks and opportunities in the age of digital debate
Speck&Tech
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Extensions Framework (XaaS) - Enabling Orchestrate Anything
ShapeBlue
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Ad

Trust Based Routing In wireless sensor Network

  • 1. Trust Based Routing In wireless sensor Network
  • 2. About Sensor Network Characteristics: Applications: Temporarily formed Military battlefield Nodes act as routers networks. Infrastructure-less Personal Area Networks Limited resources Disaster and rescue  wireless medium operation
  • 3. Attacks on Wireless Networks Passive attacks Do not change the routing information Listen to get valuable information Active attacks Use its energy to manipulate the routing information
  • 4. Passive attack passive attack "attempts to learn or make use of information from the system but does not affect system resources" Traffic analysis  each message is encrypted because it is not important whether the data is readable(understandable) to the attacker. Here, the adversary attempts to find patterns in the communication between two node, which might allow the adversary to derive certain assumptions based on these patterns.
  • 5. Passive attack Traffic analysis Attacker Node Node
  • 6. Active Attack Active attacks include security threats in which an node tries to manipulate code or data while it is transmitted between nodes. The most common examples of this kind of attack are alterations, in which an data is deleted or tampered with by an intruder .
  • 7. Active Attacks Modification: Malicious node can modify routing information Fabrication: Generating false routing message Impersonation: Initiate attack by masquerading as another node
  • 8. Active attack A B C Malicious Node
  • 9. Existing Security Solutions Intrusion prevention Encryption, authentication. Nodes are required to have pre-shared keys or digital certificates. Central trust authority or pre configuration is not practical for ad-hoc networks
  • 10. Dynamic Source Routing (DSR) Protocol On demand protocol: route information discovered only as needed. Source routing: entire path to destination supplied by source in packet header. Procedure: •Route discovery •Route maintenance •Routing
  • 11. Route Discovery . Route Request: Source broadcasts Route Request message for specified destination Intermediate node adds itself to path in message and forwards message toward destination A A,B A,B,C A,B,C,D A B C D E
  • 15. DSR Based Model Trust Based Routing To compute the direct trust in a node. In doing so we measure the accuracy and sincerity of the immediate neighboring nodes by monitoring their participation in the packet forwarding. As soon as it hears its immediate neighbour forwarding the packet, the node checks the integrity of the packet by verifying it for requisite modifications. If the integrity check passes, it confirms that the node has acted in a benevolent manner and so its direct trust counter is incremented. Similarly, if the integrity check fails or the forwarding node does not transmit the packet, its corresponding direct trust measure is decremented.
  • 17. Trust Propagation To propagate trust information beyond a single hop, piggyback the direct trust value of nodes along with the ROUTE REQUEST packets. Before forwarding a ROUTE REQUEST packet, appends the direct trust value of the preceding node from which it had received the ROUTE REQUEST packet. When the ROUTE REQUEST packet is propagated, it also spreads the trust information of other nodes in the network.
  • 18. Trust Propagation Tba, Tax Tax A B Tcx, Tcx Tdc X C D Y Tex, Tfe Tex E F
  • 19. References 1.TRUST-BASED ROUTING FOR AD-HOC WIRELESS NETWORKS , Asad Amir Pirzada., Amitava Datta, Chris McDonald School of Computer Science & Software Engineering, The University of Western Australia Crawley, WA 6009, Australia 2. An Intrusion Detection System for Wireless Sensor NetworksIlker Onat Ali Miri School of Information Technology and Engineering University of Ottawa, Canada e-mail: [email protected], [email protected] 3. Intrusion Detection Techniques for Mobile Wireless Networks ,Yongguang Zhang ,HRL Laboratories LLC, Malibu, California Wenke Lee,College of Computing, Georgia Institute of Technology E-mail: [email protected] Yi-An Huang,College of Computing, Georgia Institute of Technology E-mail: [email protected]