Trust Based Routing in Wireless Sensor Network
Madhu Patil1, Goutham M.A2

1Dr. Madhu Patil*, Associate Professor, Department ECE, NMIT Blore.
2Dr. Goutham M.A, Professor and Head of Department, Department of ECE, AIT, Chickmagalur.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 30, 2020. | Manuscript published on April 10, 2020. | PP: 630-632 | Volume-9 Issue-6, April 2020. | Retrieval Number: F3888049620/2020©BEIESP | DOI: 10.35940/ijitee.F3888.0496
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: The nodes are often placed in a hostile or dangerous environment so WSN will be vulnerable to security attacks. Attacks can be active or passive. Passive attack involves unauthorized attackers who listen to the communication channel and monitor its activities. In active attack, the unauthorized attacker’s listens, monitors and alters the data passing through the communication channel. To address security concerns, cryptography approach has been adopted but this alone cannot cope with some of the routing attacks. As sensor devices are resource constrained, existing cryptography approach may not be applicable, due to the computational complexities that it involves [1] [3]. Hence, author present energy efficient trust based routing strategy, which is a viable alternative for WSN. 
Keywords: Direct Trust, Indirect Trust, Malicious Node
Scope of the Article: Routing, Switching and Addressing Techniques