An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs

被引:15
|
作者
Pathak, Aditya [1 ]
Al-Anbagi, Irfan [1 ]
Hamilton, Howard J. [2 ]
机构
[1] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
[2] Univ Regina, Dept Comp Sci, Regina, SK S4S 0A2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Ant colony optimization (ACO); energy efficiency; energy-hole problem; lightweight security; multiobjective wireless sensor network (WSN) optimization problem; network security; Quality of Service (QoS); trust model; WSNs; WIRELESS; NETWORKS; PROTOCOL;
D O I
10.1109/JIOT.2022.3189832
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The limited resources and low computational power of wireless sensor networks (WSNs) make them vulnerable to various security attacks. Conventional security mechanisms require too many resources to allow the reliable operation of WSNs due to their resource-constrained nature. In addition, multihop communication in WSNs creates a requirement for guaranteed Quality of Service (QoS). Therefore, providing security while maintaining QoS and energy efficiency in WSNs are important design considerations. To further increase the performance of WSNs, there is a need to overcome the energy-hole problem, which leads to poor coverage of the field of interest. An energy-hole problem is created because of using poor deployment strategies. In this article, we define a multiobjective WSN optimization problem and present a novel algorithm known as lightweight secure routing (LSR) to manage WSNs that directly addresses the multiobjective WSN optimization problem. Our LSR algorithm uses ant colony optimization (ACO), an adaptive security model based on direct and indirect trust calculations, an adaptive QoS model, a hybrid deployment model based on 2-D Gaussian and uniform distributions, and an adaptive connectivity model that uses an appropriate communicational radius to ensure high connectivity between sensor nodes to solve the multiobjective WSN optimization problem. We divide our simulation results into three analyses, namely, trust model analysis, network scalability analysis, and security risk analysis to show that LSR outperforms the existing techniques in terms of energy consumed to calculate trust values, trust values convergence, network lifetime, average routing delay, and packet delivery ratio.
引用
收藏
页码:23826 / 23840
页数:15
相关论文
共 50 条
  • [31] A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks
    Prabha, K. P. Rama
    Jeyanthi, N.
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (03) : 2959 - 2974
  • [32] Trust-Based Routing Mechanism in MANET: Design and Implementation
    Eissa, Tameem
    Razak, Shukor Abdul
    Khokhar, Rashid Hafeez
    Samian, Normalia
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (05) : 666 - 677
  • [33] A trust-based routing protocol for ad hoc networks
    Xue, XY
    Leneutre, J
    Ben-Othman, J
    MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 251 - 262
  • [34] Secure and Robust Multi-Constrained QoS Aware Routing Algorithm for VANETs
    Eiza, Mahmoud Hashem
    Owens, Thomas
    Ni, Qiang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (01) : 32 - 45
  • [35] A secure localization scheme based on trust assessment for WSNs using blockchain technology
    Goyat, Rekha
    Kumar, Gulshan
    Alazab, Mamoun
    Saha, Rahul
    Thomas, Reji
    Rai, Mritunjay Kumar
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 221 - 231
  • [36] An Improved Trust-based Collaborative Filtering Algorithm
    Yu, Peng
    2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 135 - 142
  • [37] Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET
    Khan, Adnan Shahid
    Balan, Kuhanraj
    Javed, Yasir
    Tarmizi, Seleviawati
    Abdullah, Johari
    SENSORS, 2019, 19 (22)
  • [38] Trust-based security routing mechanism in mobile social networks
    Shuang Yang
    Xingwei Wang
    Shuang Zhang
    Bo Yi
    Min Huang
    Neural Computing and Applications, 2020, 32 : 5609 - 5620
  • [39] Trust-based security routing mechanism in mobile social networks
    Yang, Shuang
    Wang, Xingwei
    Zhang, Shuang
    Yi, Bo
    Huang, Min
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (10) : 5609 - 5620
  • [40] Trust-based Anonymous Communication: Adversary Models and Routing Algorithms
    Johnson, Aaron
    Syverson, Paul
    Dingledine, Roger
    Mathewson, Nick
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 175 - 186