Combining trust with location information for routing in wireless sensor networks

被引:24
作者
Leligou, H. C. [1 ]
Trakadas, P. [2 ]
Maniatis, S. [2 ]
Karkazis, P. [1 ]
Zahariadis, T. [1 ]
机构
[1] TEI Chalkis, Dept Elect Engn, Psahna, Greece
[2] Hellen Author Commun Secur & Privacy ADAE, Athens, Greece
关键词
wireless sensor networks; trust management; secure routing protocol; location-based routing; geographical routing; performance evaluation;
D O I
10.1002/wcm.1038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the applications of wireless sensor networks proliferate, the efficiency in supporting large sensor networks and offering security guarantees becomes an important requirement in the design of the relevant networking protocols. Geographical routing has been proven to efficiently cope with large network dimensions while trust management schemes have been shown to assist in defending against routing attacks. Once trust information is available for all network nodes, the routing decisions can take it into account, i.e. routing can be based on both location and trust attributes. In this paper, we investigate different ways to incorporate trust in location-based routing schemes and we propose a novel way of balancing trust and location information. Computer simulations show that the proposed routing rule exhibits excellent performance in terms of delivery ratio, latency time and path optimality. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:1091 / 1103
页数:13
相关论文
共 29 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2005, AD HOC NETWORK ELSEV
[3]  
[Anonymous], 2001, TR010023 UCLACSD
[4]  
Ganeriwal S, 2007, ACM T SENSOR NETWORK
[5]   Security in wireless sensor networks [J].
Giruka, Venkata C. ;
Singhal, Mukesh ;
Royalty, James ;
Varanasi, Srilekha .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01) :1-24
[6]  
Haider R, 2007, FUTURE GENERATION CO
[7]  
Hung K-S, IEEE WCNC 2007
[8]   Trust evaluation model for wireless sensor networks [J].
Hur, J ;
Lee, Y ;
Yoon, H ;
Choi, D ;
Jin, S .
7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, :491-496
[9]  
Kang KD, 2006, 9 ANN NYS CYB SEC C
[10]   A survey of routing attacks in mobile Ad Hoc networks [J].
Kannhavong, Bounpadith ;
Nakayama, Hidehisa ;
Nemoto, Yoshiaki ;
Kato, Nei ;
Jamalipour, Abbas .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) :85-91