Adaptive Trust Model for Secure Geographic Routing in Wireless Sensor Networks P. Raghu Vamsi and Krishna Kant Department of Computer Science and Engineering Jaypee Institute of Information Technology, Noida, India. prvonline@yahoo.co.in, k.kant@yahoo.co.in Abstract—Adaptive Trust Model (ATM) for secure geographic routing has been presented in this paper. Unlike conventional weight based trust models, ATM adjusts the weights associated with the network activities. In this model, direct trust has been considered to restrict the reputation based attacks. Due to the flexibility of weights adjustment, ATM dynamically identifies malicious nodes and directs the route towards trustworthy nodes. This ATM has been integrated into Greedy Perimeter Stateless Routing (GPSR) protocol. Simulation results using the network simulator ns-2 have shown that GPSR with ATM is robust in detecting malicious nodes. KeywordsTrust, Adaptive trust model, security attacks, secure routing. I. I NTRODUCTION Wireless Sensor Networks (WSNs) are a special class of wireless networks in which the network is composed by tiny and low-cost sensor nodes (SNs) having limited resources in-terms of processing, memory and energy. Applications of WSNs include temperature and humidity monitoring, pollu- tion monitoring in environmental applications, supply chain management applications, body area networks, pressure and speed monitoring in automotive, pungent gas or chemical detection in industries, target detection in military etc. [1]. In general, these networks are deployed in open, unattended and hostile environments to monitor and report the events. Due to the openness of SNs in WSNs, they are subject to eavesdropping, physical tampering, etc., which leads to various security attacks. Research studies in Mobile Adhoc Networks (MANETs), which is regarded as the predecessor of WSNs, have shown that packet delivery percentage can substantially decrease when malicious activities are present in the network. Cryptography methods can be utilized to mitigate security attacks posed by malicious nodes in the network and to provide authentication and secrecy. However, these methods require thousands of multiplication and addition operations to implement a single security operation. In addition, they are not efficient in identifying security attacks posed by an adversary from outside of the network. In other words, cryptography can aid communication security rather than routing security. Due to this reason, cryptography methods are not suited for routing in resource constrained sensor networks. For routing security a human behavioral pattern called trust has been widely used by the researchers. Trust is the measure of belief about the behavior of other entities (or nodes). Each node in the network assesses the trust of the neighboring nodes based on cooperation and coordination received in the network activities such as packet forwarding, maintaining packet integrity etc. [2]. The trust level will be incremented by one unit for every positive experience and decremented by one unit for every negative experience. In addition, special value called weight is assigned to every network activity. Trust models compute the total trust of a node by combining weights and trust opinions. These trust models are integrated with routing protocols to make efficient routing decisions. Among all routing protocols, geographic routing offers guaranteed packet delivery in a dense network. These routing protocols perform routing based on the location information. A node forwards the packet to a node which is situated nearer to the destination. Whenever malicious nodes are present in the network, they modify or tamper the packet integrity so that a benign node drops the packets as invalid. To mitigate such malicious activities, numerous researchers have devel- oped trust models to facilitate routing protocols. Weighted statistical model to identify malicious nodes is presented in [3]. Reputation based trust models that compute total trust by combining direct and indirect trust opinions is proposed in [4-8]. Trust model based on behavior of neighboring nodes has suggested in [9][10]. In addition, heuristic frameworks for trust management have been evolved in recent years [11]. Most of these models apply weights to compute total trust value. However, these weights are heuristic assignments. However, there is no proper mechanism to fix weight values. In human behavior pattern, trust on a person will be formed based on the number of conversations made and increases with the number of positive experiences with him. This implies that in order to gain trust and to provide weightage to a person there should be adequate number of interactions. With this analogy, an Adaptive Trust Model (ATM) has been presented in this paper. In this model, a node will dynamically adjust the weights based on the experiences gained and interactions held with its neighboring nodes. Weights are associated with expectations of various network activities to compute total trust value. Finally, during routing process, the packets are routed to nodes having the highest trust value. After explaining preliminaries and related work in Section II, network model and assumptions for ATM are presented in Section III. Section IV describes the ATM. Simulation study to validate the ATM is presented in Section V. Finally, Section VI concludes the paper. 978-1-4799-5173-4/14/$31.00 ©2014 IEEE 394