SlideShare a Scribd company logo
1 of 20
Trust Based Routing In
wireless sensor
Network
About Sensor Network


Characteristics:          Applications:
   Temporarily formed        Military battlefield
   Nodes act as routers      networks.
   Infrastructure-less       Personal Area Networks

   Limited resources         Disaster and rescue

    wireless medium          operation
Attacks on Wireless Networks

Passive attacks
  Do not change the routing information
  Listen to get valuable information


Active attacks
  Use its energy to manipulate the routing
  information
Passive attack


passive attack "attempts to learn or make use
of information from the system but does not
affect system resources"
Traffic analysis
 each message is encrypted because it is not important whether the
data is
 readable(understandable) to the attacker. Here, the adversary attempts
to
 find patterns in the communication between two node, which might allow
 the adversary to derive certain assumptions based on these patterns.
Passive attack


Traffic analysis


                      Attacker




    Node                            Node
Active Attack




Active attacks include security threats in which an node tries
to manipulate code or data while it is transmitted between
nodes. The most common examples of this kind of attack are
alterations, in which an data is deleted or tampered with by
 an intruder .
Active Attacks

Modification:
  Malicious node can modify routing information

Fabrication:
  Generating false routing message

Impersonation:
  Initiate attack by masquerading as another
  node
Active attack




A                    B




           C
    Malicious Node
Existing Security Solutions

Intrusion prevention
   Encryption, authentication.

Nodes are required to have pre-shared keys or digital
certificates.

Central trust authority or pre configuration is not practical
for ad-hoc networks
Dynamic Source Routing (DSR) Protocol

On demand protocol: route information
discovered only as needed.
Source routing: entire path to destination
supplied by source in packet header.
Procedure:
  •Route discovery
  •Route maintenance
  •Routing
Route Discovery

.
    Route Request:
    Source broadcasts Route Request message for specified
    destination
    Intermediate node adds itself to path in message and
    forwards message toward destination




            A       A,B       A,B,C       A,B,C,D

        A       B         C           D             E
DSR Based Model

Trust Based Routing

To compute the direct trust in a node. In doing so we measure the
accuracy and sincerity of the immediate neighboring nodes by monitoring
their participation in the packet forwarding.


As soon as it hears its immediate neighbour forwarding the packet, the
node
 checks the integrity of the packet by verifying it for requisite
modifications.
 If the integrity check passes, it confirms that the node has acted in a
benevolent manner and so its direct trust counter is incremented. Similarly, if
the integrity check fails or the forwarding node does not transmit the packet,
its
corresponding direct trust measure is decremented.
Trust Calculation
Trust Propagation




To propagate trust information beyond a single hop, piggyback the direct
 trust value of nodes along with the ROUTE REQUEST packets.

Before forwarding a ROUTE REQUEST packet, appends the direct trust
value of the preceding node from which it had received the ROUTE
REQUEST packet.

When the ROUTE REQUEST packet is propagated, it also spreads the trust
information of other nodes in the network.
Trust Propagation

                                Tba,
             Tax
                                Tax
     A               B


                           Tcx,
              Tcx
                           Tdc

X     C              D                 Y

                         Tex,
                         Tfe
               Tex
         E           F
References

1.TRUST-BASED ROUTING FOR AD-HOC WIRELESS NETWORKS , Asad Amir Pirzada., Amitava
Datta, Chris McDonald School of Computer Science & Software Engineering, The University of
Western Australia Crawley, WA 6009, Australia

2. An Intrusion Detection System for Wireless Sensor NetworksIlker Onat Ali Miri School of Information
Technology and Engineering University of Ottawa, Canada
e-mail: ionat@site.uottawa.ca, samiri@site.uottawa.ca

3. Intrusion Detection Techniques for Mobile Wireless Networks ,Yongguang Zhang ,HRL Laboratories
LLC, Malibu, California Wenke Lee,College of Computing, Georgia Institute of Technology
E-mail: wenke@cc.gatech.edu
Yi-An Huang,College of Computing, Georgia Institute of Technology
E-mail: yian@cc.gatech.edu
Thank you

More Related Content

What's hot

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
1crore projects
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay Networks
Editor IJCATR
 
Hop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copyHop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copy
Selva Raj
 

What's hot (18)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
C0363012014
C0363012014C0363012014
C0363012014
 
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
 
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANETA SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Ensure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay NetworksEnsure Security and Scalable Performance in Multiple Relay Networks
Ensure Security and Scalable Performance in Multiple Relay Networks
 
Hop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copyHop by-hop message authentication and source privacy in wire-copy-copy
Hop by-hop message authentication and source privacy in wire-copy-copy
 

Similar to Trust Based Routing In wireless sensor Network

Detection and elemination of block hole attack
Detection and elemination of block hole attackDetection and elemination of block hole attack
Detection and elemination of block hole attack
Maalolan Narasimhan
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
1crore projects
 
Trusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFTrusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARF
Editor IJMTER
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
sourabhshivtiwari
 

Similar to Trust Based Routing In wireless sensor Network (20)

I1802046780
I1802046780I1802046780
I1802046780
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
Detection and elemination of block hole attack
Detection and elemination of block hole attackDetection and elemination of block hole attack
Detection and elemination of block hole attack
 
AD HOC.doc
AD HOC.docAD HOC.doc
AD HOC.doc
 
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
saasgdggagf   ibsFC ba;D;jBBISifBIBiucbiBIFsaasgdggagf   ibsFC ba;D;jBBISifBIBiucbiBIF
saasgdggagf ibsFC ba;D;jBBISifBIBiucbiBIF
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
Iaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detectionIaetsd an efficient and accurate misbehavior detection
Iaetsd an efficient and accurate misbehavior detection
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Trusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARFTrusted Routing Path Selection in WSNs through TARF
Trusted Routing Path Selection in WSNs through TARF
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
To lie or to comply: Defending against flood attacks in disruption tolerant n...
To lie or to comply: Defending against flood attacks in disruption tolerant n...To lie or to comply: Defending against flood attacks in disruption tolerant n...
To lie or to comply: Defending against flood attacks in disruption tolerant n...
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Trust Based Routing In wireless sensor Network

  • 1. Trust Based Routing In wireless sensor Network
  • 2. About Sensor Network Characteristics: Applications: Temporarily formed Military battlefield Nodes act as routers networks. Infrastructure-less Personal Area Networks Limited resources Disaster and rescue  wireless medium operation
  • 3. Attacks on Wireless Networks Passive attacks Do not change the routing information Listen to get valuable information Active attacks Use its energy to manipulate the routing information
  • 4. Passive attack passive attack "attempts to learn or make use of information from the system but does not affect system resources" Traffic analysis  each message is encrypted because it is not important whether the data is readable(understandable) to the attacker. Here, the adversary attempts to find patterns in the communication between two node, which might allow the adversary to derive certain assumptions based on these patterns.
  • 5. Passive attack Traffic analysis Attacker Node Node
  • 6. Active Attack Active attacks include security threats in which an node tries to manipulate code or data while it is transmitted between nodes. The most common examples of this kind of attack are alterations, in which an data is deleted or tampered with by an intruder .
  • 7. Active Attacks Modification: Malicious node can modify routing information Fabrication: Generating false routing message Impersonation: Initiate attack by masquerading as another node
  • 8. Active attack A B C Malicious Node
  • 9. Existing Security Solutions Intrusion prevention Encryption, authentication. Nodes are required to have pre-shared keys or digital certificates. Central trust authority or pre configuration is not practical for ad-hoc networks
  • 10. Dynamic Source Routing (DSR) Protocol On demand protocol: route information discovered only as needed. Source routing: entire path to destination supplied by source in packet header. Procedure: •Route discovery •Route maintenance •Routing
  • 11. Route Discovery . Route Request: Source broadcasts Route Request message for specified destination Intermediate node adds itself to path in message and forwards message toward destination A A,B A,B,C A,B,C,D A B C D E
  • 12.
  • 13.
  • 14.
  • 15. DSR Based Model Trust Based Routing To compute the direct trust in a node. In doing so we measure the accuracy and sincerity of the immediate neighboring nodes by monitoring their participation in the packet forwarding. As soon as it hears its immediate neighbour forwarding the packet, the node checks the integrity of the packet by verifying it for requisite modifications. If the integrity check passes, it confirms that the node has acted in a benevolent manner and so its direct trust counter is incremented. Similarly, if the integrity check fails or the forwarding node does not transmit the packet, its corresponding direct trust measure is decremented.
  • 17. Trust Propagation To propagate trust information beyond a single hop, piggyback the direct trust value of nodes along with the ROUTE REQUEST packets. Before forwarding a ROUTE REQUEST packet, appends the direct trust value of the preceding node from which it had received the ROUTE REQUEST packet. When the ROUTE REQUEST packet is propagated, it also spreads the trust information of other nodes in the network.
  • 18. Trust Propagation Tba, Tax Tax A B Tcx, Tcx Tdc X C D Y Tex, Tfe Tex E F
  • 19. References 1.TRUST-BASED ROUTING FOR AD-HOC WIRELESS NETWORKS , Asad Amir Pirzada., Amitava Datta, Chris McDonald School of Computer Science & Software Engineering, The University of Western Australia Crawley, WA 6009, Australia 2. An Intrusion Detection System for Wireless Sensor NetworksIlker Onat Ali Miri School of Information Technology and Engineering University of Ottawa, Canada e-mail: ionat@site.uottawa.ca, samiri@site.uottawa.ca 3. Intrusion Detection Techniques for Mobile Wireless Networks ,Yongguang Zhang ,HRL Laboratories LLC, Malibu, California Wenke Lee,College of Computing, Georgia Institute of Technology E-mail: wenke@cc.gatech.edu Yi-An Huang,College of Computing, Georgia Institute of Technology E-mail: yian@cc.gatech.edu