Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks

被引:15
作者
Anita, X. [1 ]
Manickam, J. Martin Leo [2 ]
Bhagyaveni, M. A. [1 ]
机构
[1] Anna Univ, Dept ECE, Madras 600025, Tamil Nadu, India
[2] St Josephs Coll Engn, Dept ECE, Madras 600119, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2013年
关键词
SECURITY;
D O I
10.1155/2013/952905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is an inherent and challenging task in Wireless Sensor Networks (WSNs) characterized by multihop routing and stringent resource constraints such as limited processing capability, storage capacity, communication bandwidth, and energy. Most of the existing trust-based routing schemes require the support of promiscuous mode of operation and gather a large number of recommendations from the neighbors for trust derivation. These result in higher energy consumption, higher communication overhead, and larger memory requirements in a resource constrained sensor network. In this paper, we propose a new two-way acknowledgment-based trust (2-ACKT) framework with individual (2-ACKT-I) and group (2-ACKT-G) acknowledgment to minimize the communication overhead and memory requirement for trust establishment in WSNs. The 2-ACKT protocol calculates the direct trust using a link layer acknowledgment and a two-hop acknowledgment from a downstream neighbor. The simulation and theoretical results indicate that 2-ACKT scheme significantly outperforms the conventional multihop and trust-based routing schemes in terms of packet delivery ratio, network lifetime, communication overhead, and memory requirements.
引用
收藏
页数:14
相关论文
共 32 条
[1]  
Aivaloglou Efthimia, 2008, International Journal of Systems of Systems Engineering, V1, P128, DOI 10.1504/IJSSE.2008.018135
[2]  
[Anonymous], 2004, INPROCEEDINGS ACM
[3]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[4]  
[Anonymous], 2006, INPROCEEDINGS 3
[5]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[6]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[7]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[8]   Agent-based trust management model for Wireless Sensor Networks [J].
Chen, Haiguang ;
Wu, Huafeng ;
Hu, Jinchu ;
Ga, Chuanshan .
MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, :150-+
[9]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[10]   Instrumenting the World with wireless sensor networks [J].
Estrin, D ;
Girod, L ;
Pottie, G ;
Srivastava, M .
2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING - VOL IV: SIGNAL PROCESSING FOR COMMUNICATIONS; VOL V: SIGNAL PROCESSING EDUCATION SENSOR ARRAY & MULTICHANNEL SIGNAL PROCESSING AUDIO & ELECTROACOUSTICS; VOL VI: SIGNAL PROCESSING THEORY & METHODS STUDENT FORUM, 2001, :2033-2036