• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2021, Volume: 14, Issue: 41, Pages: 3107-3113

Original Article

Ensuring Secure Routing in Wireless Sensor Network Using Active Trust

Received Date:11 March 2021, Accepted Date:23 November 2021, Published Date:06 December 2021


Objective: Main objective is to provide a secure router for transferring the valuable data being sensed. One of the major security threats in WSN is the Black hole attack, due to which incoming and outgoing traffic is silently discarded without informing the source that the data did not reach its intended recipient. Overcoming the Black hole attack in WSN is a current research topic. So, the proposed method of trust based secure routing will overcome the black hole attack. Method: The method implemented is integrated as Active Trust to the existing AODV routing protocol to avoid the Black hole attack in WSN. ActiveTrust can relevantly maintain the data route success quality and capacity against black hole attacks and can optimize network lifetime. Findings: Packet delivery ratio and Throughput are measured considering the attack and applying the method implemented. It is noticed that packet delivery ratio is less when there is an attack, and it gets increased when the attack is been rectified by Active trust method. Novelty: Trust based secure routing when compared with existing protocol AODV the attack is reduced and the throughput gets increased by reducing the packet loss. Our approach is efficient in terms of throughput and PDR. As trust factor is so important factor while compared to other factors like Node identity, Node Address etc., our proposed system is efficient. Because node identity can also be spoofed and node address can also be modified by an intruder, but the trust calculation based on the activity of the node cannot be modified by any attacker, because it involves the neighbour node to calculate the trust.

Keywords: Black hole attack; AODV; Trust; Secure routing


  1. Sun Z, Wei M, Zhang Z, Qu G. Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks. Applied Soft Computing. 2019;77:366–375. doi: 10.1016/j.asoc.2019.01.034
  2. Selvi M, Thangaramya K, Ganapathy S, Kulothungan K, Khannah Nehemiah H, Kannan A. An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks. Wireless Personal Communications. 2019;105(4):1475–1490. doi: 10.1007/s11277-019-06155-x
  3. Li T, Liu W, Wang T, Ming Z, Li X, Ma M. Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things. Transactions on Emerging Telecommunications Technologies. 2020. doi: 10.1002/ett.3956
  4. Bar RK, Mandal JK, Singh MM. QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack. Procedia Technology. 2013;10:530–537. Available from: https://dx.doi.org/10.1016/j.protcy.2013.12.392
  5. Satyajayantmisra K, Bhattarai G, Xue. BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks. the IEEE International Conference on Communications (ICC). 2011;p. 1–5.
  6. Kompella RR, Yates J, Greenberg AA, Snoeren AC. Detection and Localization of Network Black Holes. IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. 2007;p. 2180–2188. doi: 10.1109/INFCOM.2007.252
  7. Yasin A, Zant MA. Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique. Wireless Communications and Mobile Computing. 2018;2018:1–10. Available from: https://dx.doi.org/10.1155/2018/9812135
  8. Panda N, Pattanayak BK. Defense Against Co-Operative Black-hole Attack and Gray-hole Attack in MANET. International Journal of Engineering & Technology. 2018;7(3.4):84. Available from: https://dx.doi.org/10.14419/ijet.v7i3.4.16752
  9. Jiang B, Huang G, Wang T, Gui J, Zhu X. Trust based energy efficient data collection with unmanned aerial vehicle in edge network. Transactions on Emerging Telecommunications Technologies. 2020;p. 3942. Available from: https://dx.doi.org/10.1002/ett.3942
  10. Priayoheswari B, Kulothungan K, Kannan A. Beta Reputation and Direct Trust Model for Secure Communication in Wireless Sensor Networks. Proceedings of the International Conference on Informatics and Analytics. 2016;73:1–11. Available from: https://doi.org/10.1145/2980258.2980413
  11. Wang T, Zhang G, Yang X, Vajdi A. A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2016;12(4):3815834. doi: 10.1155/2016/3815834
  12. Raza S, Haider W, Durrani NM, Khan NK, Abbasi MA. Trust Based Energy Preserving Routing Protocol in Multi-hop WSN. In: Networked Systems. (Vol. 9466, pp. 518-523) Springer International Publishing. 2015. 10.1007/978-3-319-26850-7_42
  13. Qin D, Yang S, Jia S, Zhang Y, Ma J, Ding Q. Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network. IEEE Access. 2017;5:9599–9609. Available from: https://dx.doi.org/10.1109/access.2017.2706973
  14. Ahmed A, Bakar KA, Channa MI, Haseeb K. Countering Node Misbehavior Attacks using Trust Based Secure Routing Protocol. TELKOMNIKA (Telecommunication Computing Electronics and Control). 2015;13(1):260. Available from: https://dx.doi.org/10.12928/telkomnika.v13i1.1181
  15. Heinzelman WR, Chandrakasan AP, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. (pp. 3005-3014) IEEE Comput. Soc. 2000.
  16. Muzammal SM, Murugesan RK, Jhanjhi NZ. A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches. IEEE Internet of Things Journal. 2021;8(6):4186–4210. Available from: https://dx.doi.org/10.1109/jiot.2020.3031162
  17. Audunjosang. Artificial Reasoning with Subjective Logic. Appears in the Proceedings of the 2nd Australian Workshop on CommonsenseReasoning. 1997. doi:


© 2021 Amudha. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)


Subscribe now for latest articles and news.