Abstract

Wireless Sensor Networks (WSNs) are emerging networks that are being utilized in a variety of applications, such as remote sensing images, military, healthcare, and traffic monitoring. Those critical applications require different levels of security; however, due to the limitation of the sensor networks, security is a challenge where traditional algorithms cannot be used. In addition, sensor networks are considered as the core of the Internet of Things (IoT) and smart cities, where security became one of the most significant problems with IoT and smart cities applications. Therefore, this paper proposes a novel and light trust algorithm to satisfy the security requirements of WSNs. It considers sensor nodes’ limitations and cross-layer information for efficient secure routing in WSNs. It proposes a Tow-ACKs Trust (TAT) Routing protocol for secure routing in WSNs. TAT computes the trust values based on direct and indirect observation of the nodes. TAT uses the first-hand and second-hand information from the Data Link and the Transmission Control Protocol layers to modify the trust’s value. The suggested TATs’ protocols performance is compared to BTRM and Peertrust models in terms of malicious detection ratio, accuracy, average path length, and average energy consumption. The proposed algorithm is compared to BTRM and Peertrust models, the most recent algorithms that proved their efficiency in WSNs. The simulation results indicate that TAT is scalable and provides excellent performance over both BTRM and Peertrust models, even when the number of malicious nodes is high.

Highlights

  • The standardization process for the Narrowband Internet of Things (NB-IoT) has been completed, and Wireless Sensor Networks (WSNs) are being considered as a critical component for sensing and collecting information [1]

  • To effectiveness of of thethe suggested methods, we put our new model to thetotest test against a number of random-topology

  • To evaluate theand performance of the proposed modelsize andisverify its effectiveness, simulations were conducted in twoof different scenarios: sensors on the suggested technique, First, we study the impact the misbehaving i.e., In wethe evaluate the suggested technique percent of the sensors first scenario, we studied the impactwhen of thethe network density onmisbehaving the performance of the proposed protocol

Read more

Summary

Introduction

The standardization process for the Narrowband Internet of Things (NB-IoT) has been completed, and Wireless Sensor Networks (WSNs) are being considered as a critical component for sensing and collecting information [1]. Customers do not want to share their information with unauthorized persons since the data may be misused This additional consideration is of greater importance in wireless environments, because anybody may eavesdrop on unencrypted communication. Both external and interior security threats are significant threats to information security in WSNs. Creating a secure path in these networks must guarantee that all nodes used to send data packets are trusted nodes. Because sensor nodes have limited resources, especially battery power, the amount of energy used by sensor nodes is critical Since these networks are designed to operate unattended in hostile environments for several years, energy replenishment is almost impossible under these conditions.

Related Work
Problem Definition
Description of the Proposed Technique
Mathematical Framework
Flowchart and Pseudocode for TAT
5.5.Results
Conclusions and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.