• Login
    View Item 
    •   MUT Repository
    • Journal Articles
    • School of Computing and IT (JA)
    • Journal Articles (CI)
    • View Item
    •   MUT Repository
    • Journal Articles
    • School of Computing and IT (JA)
    • Journal Articles (CI)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A TRUST-BASED MULTIPATH CONGESTION-AWARE ROUTING TECHNIQUE TO CURB WORMHOLE ATTACKS FOR MOBILE NODES IN WSNS

    Thumbnail
    View/Open
    A TRUST-BASED MULTIPATH CONGESTION-AWARE.pdf (783.6Kb)
    Date
    2025
    Author
    Mata, Fortine Mwihaki
    Muketha, Geoffrey M.
    Kamau, Gabriel N.
    Metadata
    Show full item record
    Abstract
    Wireless Sensor Networks (WSNs) have emerged as a critical technology in diverse applications, ranging from environmental monitoring to precision agriculture. However, the inherent limitations of WSNs, such as constrained energy resources and limited bandwidth, pose significant challenges for reliable data transmission. Furthermore, the increasing vulnerability of WSNs to security threats, such as malicious node attacks and data breaches, necessitates robust security mechanisms. This paper proposes a novel composite routing technique for WSNs that integrates trust attributes and congestion-aware information to enhance network performance, security, and energy efficiency. The proposed approach leverages trust metrics to evaluate the trustworthiness of nodes based on their past behaviour, communication patterns, and adherence to network protocols. By incorporating trust assessment into the routing decision-making process, the technique aims to mitigate the impact of wormhole attacks and ensure data delivery through reliable paths. Additionally, the proposed routing protocol considers network congestion levels to select routes with minimal traffic, thereby improving data throughput and reducing packet delays. The congestion-aware component dynamically adapts to changing network conditions, ensuring efficient resource utilization and maximizing network lifetime. Simulation results demonstrate that the proposed composite routing technique outperforms existing approaches in terms of packet delivery ratio by 92.1%, energy efficiency by 3.1j, end-to-end latency by 85%, route disjointedness by 88.7 and resilience to various attacks, making it a promising solution for secure and efficient communication in resource-constrained WSN environments.
    URI
    10.5121/ijnsa.2025.17101
    http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6749
    Collections
    • Journal Articles (CI) [141]

    MUT Library copyright © 2017-2025  MUT Library Website
    Contact Us | Send Feedback
     

     

    Browse

    All of Research ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    MUT Library copyright © 2017-2025  MUT Library Website
    Contact Us | Send Feedback