• Aug 06, 2018 News! IJIET Vol. 7, No. 1-No. 8 have been indexed by EI (Inspec).   [Click]
  • Oct 10, 2018 News!Vol. 8, No. 12 issue has been published online!   [Click]
  • Sep 11, 2018 News!Vol. 8, No. 11 has been indexed by Crossref.
General Information
    • ISSN: 2010-3689
    • Frequency: Bimonthly (2011-2014); Monthly (Since 2015)
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: EI (INSPEC, IET), Electronic Journals Library, Google Scholar, Crossref and ProQuest
    • E-mail: ijiet@ejournal.net
Prof. Dr. Steve Thatcher
QUniversity, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good-quality papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the related fields.

IJIET 2015 Vol.5(7): 520-526 ISSN: 2010-3689
DOI: 10.7763/IJIET.2015.V5.561

A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks

Omid Naderi, Mahdi Shahedi, and Sayyed Majid Mazinani
Abstract—As wireless sensor networks are characterized by severely constrained node resources, low communication range, low memory capacity and dynamic nature of WSNs, implementing security functionality and detection protocols to protect against adversary nodes becomes a challenging task. It is very likely that the encryption keys in the sensor nodes are accessed by attacker entities. The compromised nodes can launch sinkhole or wormhole attack to prevent the arrival of important information to the base station (BS). Establishing trust among distributed network entities has been recognized as a powerful tool to secure distributed networks such as MANETs and sensor networks. In this paper we first estimate the area in the network where a sinkhole attack has occurred there by considering the energy consumption model in the network. Then we present an entropy-based trust model in which more factors that affect trust computation are introduced. We apply a trust-based routing for providing a high level of security by path selection based on packet trust requirement. So it is needed that a routing protocol classifies the traffic packets according to their requested security and then routs the packets related to each class through the path that fulfills the security requirements of them. Our proposed approach that purposes to cover the mentioned problem is a resource efficient security protocol. This means that a trust value is allocated to the area suspected of sinkhole; the area is located by analyzing the energy of networks nodes and the packet is forwarded through low risk paths.

Index Terms—Wireless sensor networks, sinkhole attack, trust model, secure routing.

Omid Naderi and Mehdi Shahedi are with the Department of Computer, Science and Research Branch, Islamic Azad University, South Khorasan, Birjand, Iran (e-mail: omid_naderi85@yahoo.com, MhdShahedi@Gmail.com).
Sayyed majid Mazinani is with the Electrical Engineering Department, Imam Reza International University, Mashhad, Iran (e-mail: smajid_mizinani@yahoo.com).


Cite: Omid Naderi, Mahdi Shahedi, and Sayyed Majid Mazinani, "A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks," International Journal of Information and Education Technology vol. 5, no. 7, pp. 520-526, 2015.

Copyright © 2008-2018. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net