scispace - formally typeset
Search or ask a question
Author

Shaik Sahil Babu

Bio: Shaik Sahil Babu is an academic researcher from Jadavpur University. The author has contributed to research in topics: Handover & Routing protocol. The author has an hindex of 8, co-authored 12 publications receiving 123 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper presents a direct trust dependent link state routing using route trusts which protects WSNs against routing attacks by eliminating the un-trusted nodes before making routes and finding best trustworthy route among them.
Abstract: The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth It is not economic and feasible because, depending on the application, WSN nodes are high-volume in number (hence, limited resources at each node), deployment area may be hazardous, unattended and/or hostile and sometimes dangerous As WSNs are characterized by severely constrained resources and requirement to operate in an ad-hoc manner, security functionality implementation to protect nodes from adversary forces and secure routing of message from source node to base station has become a challenging task In this paper, we present a direct trust dependent link state routing using route trusts which protects WSNs against routing attacks by eliminating the un-trusted nodes before making routes and finding best trustworthy route among them We compare our work with the most prevalent routing protocols and show its benefits over them

26 citations

Proceedings ArticleDOI
01 Dec 2011
TL;DR: A new geometric mean based trust management system is proposed by evaluating direct trust from the QoS characteristics (trust metrics) and indirect trust from recommendations by neighbour nodes, which allows for trusted nodes only to participate in routing.
Abstract: The Wireless Sensor Network (WSN) nodes are high-volume in number, and their deployment environment may be hazardous, unattended and/or hostile and sometimes dangerous. The traditional cryptographic and security mechanisms in WSNs cannot detect the node physical capture, and due to the malicious or selfish nodes even total breakdown of network may take place. Also, the traditional security mechanisms in WSNs requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth at node. Hence, they are not sufficient for secure routing of message from source to destination in WSNs. Alternatively, trust management schemes consist a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). In this paper, we propose a new geometric mean based trust management system by evaluating direct trust from the QoS characteristics (trust metrics) and indirect trust from recommendations by neighbour nodes, which allows for trusted nodes only to participate in routing.

22 citations

Journal ArticleDOI
TL;DR: TENCR is a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish.
Abstract: In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are not sufficient to select appropriate nodes among many neighbouring nodes for secure packet routing from source to sink. Alternatively, trust management schemes are tools to evaluate the trust of a node and thereby choosing a node for routing, and also detecting their unexpected node behaviour (either faulty or malicious). In this paper, we propose TENCR: a new Trust Evaluation method based on the Node’s QoS Characteristics (trust metrics) and neighbouring nodes' Recommendations. The proposed new technique detects the malicious and selfish nodes very efficiently than the arithmetic mean based methods, and allows trustworthy nodes in routing, thereby eliminating malicious/selfish nodes. Our proposed trust evaluation method is adaptive and energy efficient that separates the trustworthy nodes and qualify them to take the participation in routing, and disqualify the other nodes as malicious/selfish. Hence, trustworthy nodes only be allowed in routing, and malicious/selfish nodes will be eliminated automatically.

21 citations

Proceedings ArticleDOI
01 Dec 2011
TL;DR: A link state routing protocol based on trust is presented which protects the WSN against routing attacks by eliminating the un-trusted nodes beforehand and forms the routes and finds the best trustworthy route among them by comparing the values of all the calculated route trusts.
Abstract: Several methods exist for the assignment of trust to the nodes present in a Wireless Sensor Network (WSN) In this paper we develop a new algorithm for calculation of trust of individual nodes using both Direct and Indirect Trusts and thereby use the calculated trusts for determination of the different route trusts (RTs) to the Base Station We present a link state routing protocol based on trust which protects the WSN against routing attacks by eliminating the un-trusted nodes beforehand It then forms the routes and finds the best trustworthy route among them by comparing the values of all the calculated route trusts as for each and every route present in the network This paper also shows the advantage of inclusion of Indirect Trusts in addition to the Direct Trusts Finally, we compare our work with the most prevalent routing protocols and show its benefits over them

15 citations

01 Jan 2011
TL;DR: This work proposes a method to minimize the handoff failure probability by effectively placing a wireless local area network (WLAN) AP in the handoffs region between two neighboring cells, and performs the channel scanning within the WLAN coverage area, thus minimizing the hand Off failure due to scanning delay.
Abstract: Presently, IEEE 802.11 based wireless local area networks (WLAN) have been widely deployed for business and personal applications. The main issue regarding wireless network technology is handoff or hand over management, especially in urban areas, due to the limited coverage of access points (APs) or base stations (BS). When a mobile station (MS) moves outside the range of its current access point (AP) it needs to perform a link layer handover. This causes data loss and interruption in communication. Many people have applied efficient location management techniques in the literature of next generation wireless system (NGWS). However, seamless handover management still remains an open matter of research. Here we propose a method to minimize the handoff failure probability by effectively placing a wireless local area network (WLAN) AP in the handoff region between two neighboring cells. The WLAN coverage, on one hand, provides an additional coverage in the low signal strength region, and on the other hand, relieves the congestion in the cellular network. Moreover, we perform the channel scanning (required for horizontal handover between the two base stations) within the WLAN coverage area, thus minimizing the handoff failure due to scanning delay.

13 citations


Cited by
More filters
Book ChapterDOI
07 Feb 2008
TL;DR: In this article, product definition for broadband wireless systems technology drivers Evolving Wireless Broadband Market Segments Open Systems and Intelligence at the Edge Radio Network System Engineering References are discussed. But the focus of this paper is not on wireless networks.
Abstract: This chapter contains sections titled: Product Definition for Broadband Wireless Systems Technology Drivers Evolving Wireless Broadband Market Segments Open Systems and Intelligence at the Edge Radio Network System Engineering References

293 citations

Journal ArticleDOI
Danyang Qin1, Songxiang Yang1, Jia Shuang1, Yan Zhang1, Jingya Ma1, Qun Ding1 
TL;DR: Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.
Abstract: Aiming at the serious impact of the typical network attacks caused by the limited energy and the poor deployment environment of wireless sensor network (WSN) on data transmission, a trust sensing-based secure routing mechanism (TSSRM) with the lightweight characteristics and the ability to resist many common attacks simultaneously is proposed in this paper, at the same time the security route selection algorithm is also optimized by taking trust degree and QoS metrics into account. Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.

62 citations

Proceedings ArticleDOI
26 Jul 2012
TL;DR: An attempt has been made to create clusters by considering direction, position and relative speed of the vehicle for managing the scalability issue, and a new algorithm for selecting the most appropriate cluster head (CH) by considering the real time updated position and trust value of vehicles is proposed.
Abstract: Inter-vehicle communication is a promising way to share and disseminate real-time and nearby safety information on the road. Scalability of vehicular ad hoc network is one of the decisive matters for a network designer, which can be solved by clustering. In this paper, as our first algorithm an attempt has been made to create clusters by considering direction, position and relative speed of the vehicle for managing the scalability issue. Moreover, we have proposed a new algorithm for selecting the most appropriate cluster head (CH) by considering the real time updated position and trust value of vehicles. As, evolutionary based routing is a predominant research theme thus we have used the most efficient ant colony routing technique based on trust for the simple highway scenario based VANET. Finally simulation result shows our proposed Trust dependent Ant Colony Routing (TACR) has outperformed the Mobility-aware Ant Colony Optimization Routing (MAR-DYMO) algorithm in terms of routing overhead.

55 citations

Journal ArticleDOI
TL;DR: A novel and efficient trust model is proposed for distributed networks that provides high trust accuracy and provides higher trust accuracy.
Abstract: Distributed networks are networks in which each node can act as a server or client and hence any node can provide service to any other node. In such a scenario, establishing a trust model between the service providing user and the service utilizing user is a challenging task. At present, only a few approaches are available in the past literature to provide this facility. Moreover, the existing approaches do not provide high trust accuracy. Therefore,a novel efficient trust model has been proposed in this article to support the secure dynamic group communication in distributed networks. The main advantage of the proposed work is that it provides higher trust accuracy. Moreover, the proposed work takes less memory for maintaining the trust values and increases the packet delivery ratio in comparison with other existing works which are in the literature. KEywORDS Distributed Network, Group Communication, Security, Trust Accuracy, Trust Management

34 citations

Journal ArticleDOI
TL;DR: An efficient weighted trust‐based malicious node detection (WT‐MND) scheme that can detect malicious nodes in a clustered WSN and sustains its efficient characteristics without significant power consumption overheads is proposed.

28 citations