Call For Papers
Contact Us

  Trustable and Secured Routing in Wireless Sensor Networks  
  Authors : Muneebahmdhyiddeen; Asha Paul; Bastian Babu; Dr. D. Loganathan
  Cite as:


Security is a serious issue in wireless sensor networks. Wireless sensor networks are widely used in variety of applications. In wireless sensor networks all the sensor nodes will works together with a goal to send the data to the destination without any fail. Because of their built in resource-constrained characteristics, they are vulnerable to various security attacks. A black hole attack is one of the serious insider attack in which the attacker compromises a node and drops all packets that are routed through this compromised node. It is a serious security attack which affects data collection. It may result in sensible data that will be eliminated or not able to be transmitted to the receiver node. Because the network makes decisions depending on the nodes’ sensed data, the consequence is that the network will completely fail and, more seriously it will make incorrect decisions. Therefore, how to detect and avoid black hole attack is of great significance for security in WSNs. This paper propose a secure and trustable routing of data using a mobile node. Thus ensures the enhancement of network lifetime and probability of successful routing.


Published In : IJCSN Journal Volume 6, Issue 3

Date of Publication : June 2017

Pages : 332-335

Figures :04

Tables : --


Muneebahmdhyiddeen : received the B.Tech degree in Computer Science and Engineering from Calicut University, Kerala, India, in 2011, and currently doing M.Tech in Computer Science and Engineering in MET’S School of Engineering, Mala – Abdul Kalam Technological University, Kerala, India.

Asha Paul : is an Assistant professor in MET’S School of Engineering Mala, Thrissur, Kerala. Received B.Tech degree in Information Technology from East Point College of Engineering, Bangalore and M.Tech from Karunya University, Coimbatore. She has more than 3 years of teaching experience. Subject of interest are Data Structures, Computer Organization and Design, Object Oriented Programming, C Programming and Digital Data Communication. She has presented paper on International Conferences.

Bastian Babu : is an Assistant Professor in MET’S School of Engineering Mala, Thrissur, Kerala. Received B.Tech degree in Information Technology from Calicut University and M.Tech from Karunya University, Coimbatore. He has Published papers on International conferences.

Dr. D. Loganathan : is a Professor and Head of Computer Science and Engineering department in MET’S School of Engineering, Mala, Trissur, Kerala. After his B.E., and M.E degree, he accomplished a doctoral degree from Anna University, Chennai, India. He has more than 20 years of teaching experience and having 8 years of research experience in engineering field. His research interest includes Wireless Communication, Wireless Ad hoc Networks and Image Processing. He has published several research papers in various international journals.


Black hole attack, network lifetime, security, trust, wireless sensor networks

In this paper, we have proposed a trustable and secure routing mechanism mainly aims at high successful routing probability, security and scalability. Our proposed scheme can quickly detect the nodal trust and then avoid suspicious nodes to quickly achieve a nearly 100% successful routing probability. The proposed scheme also aims at high energy efficiency. It prevent the network being dead by providing a mobile node for the routing. Thus it will enhance the network lifetime. The analysis and result of our paper shows that our mechanism improves the successful routing probability. Further, it will also improves both the energy efficiency and the network security performance. It has important significance for wireless sensor network security.


[1] Anbuchelian, Selvamani. K, Chandarasekar. A “An Energy Efficient Multipath Routing Scheme by Preventing Threats in Wireless Sensor Networks”, Electrical and Computer Engineering (CCECE), IEEE 27th Canadian Conference, 2014. [2] Barleen Shinh “Novel Technique to Detect and Isolate Black hole Attack in MANET”, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 6 June, 2014 Page No. 6513-6519. [3] Liu A, M. Dong, K. Ota, and J. Long, “PHACK: An efficient scheme for selective forwarding attack detection in WSNs,” Sensors, vol. 15, no. 12, pp. 30942–30963, 2015. [4] Lou W, W. Liu, Y. Fang, “SPREAD: Enhancing data confidentiality in mobile ad hoc networks, IEEE INFOCOM 2004, HongKong, China,March 2004 [5] Loganathan, D, Ramamoorthy P,“Performance Enhanced in wireless Ad Hoc Networks Using Multicost Parameters Based Optimized Link State Routing Protocol”, indianjournals.com , Vol. 6, No. 8, pp. 864-872. 2016 [6] Mitali Khandelwal, Sachin Upadhyay, “An Opinion Trust Based Detection and Prevention Method for Defending Black-hole and Gray-hole Attacks in Wireless Sensor Networks” , International Journal Of Scientific & Engineering Research, Volume 7, Issue 7, July-2016 . [7] Shu.T, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, Jul. 2010 [8] Sun H M, C.-M. Chen, and Y.-C. Hsiao, “An efficient countermeasureto the selective forwarding attack in wireless sensor networks,” in Proc.IEEE TENCON, Oct./Nov. 2007, pp. 1–4. [9] Vipul Sharma, KirtiPatil, Ashish Tiwari “Detection and Suppression of Blackhole Attack in Leach based Sensor Network”, International Journal of Computer Technology and Applications, Vol 5 (6),1873-1877, 2014. [10] Yuxin Liu, Mianxiong Dong, Member, IEEE, Kaoru Ota, Member, IEEE, and Anfeng Liu, “ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks” IEEE [11] Zheng Z, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “Energy and memory efficient clone detection in wireless sensor networks,” IEEE Trans. Mobile Comput, vol. 15, no. 5, pp. 1130–1143, May 2016.