Energy-aware and secure routing with trust for disaster response wireless sensor network

被引:38
作者
Ahmed, Adnan [1 ]
Abu Bakar, Kamalrulnizam [1 ]
Channa, Muhammad Ibrahim [2 ]
Khan, Abdul Waheed [3 ]
Haseeb, Khalid [1 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Skudai 81310, Johor Bahru, Malaysia
[2] Quaid E Awam Univ Engn Sci & Technol, Dept Informat Technol, Nawabshah, Pakistan
[3] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Rabigh, Saudi Arabia
关键词
Emergency response; Trust; Energy awareness; Secure routing; Node misbehavior; AD-HOC; REPUTATION SYSTEMS; ARCHITECTURE; MANAGEMENT; AUTHENTICATION; PROTOCOL; FRAMEWORK;
D O I
10.1007/s12083-015-0421-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication services in post disaster relief operations where field information is exchanged with first responders and nearby emergency centers. However, such application environments expose the nodes to physical capture, damage and misbehaviour attacks. In addition, the compromised nodes potentially increase network congestion by advertizing false information. The loss of critical information due to significant congestion and node misbehavior attacks adversely affect emergency operations. The traditional cryptographic and authentication based secure schemes can't be adopted due to their associated cost and incapability to counter nodes misbehaviour attacks. Furthermore, existing trust based routing protocols incur high control overheads in trust estimation and dissemination; lead to high number of dead nodes due to adopted route discovery mechanism and suffer from high route instability. In this paper, we present an Energy-aware Secure Routing with Trust (ESRT) scheme that maintains a trusted environment and isolate misbehaving nodes. ESRT incorporates trust, energy, and hop counts for making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Simulation results demonstrate improved performance of the ESRT scheme when compared to existing work.
引用
收藏
页码:216 / 237
页数:22
相关论文
共 58 条
[1]   SAFIRE: A self-organizing architecture for information exchange between first responders [J].
Ahmed, Nabeel ;
Jamshaid, Karnran ;
Khan, Omar Zia .
2007 2ND IEEE WORKSHOP ON NETWORKING TECHNOLOGIES FOR SOFTWARE DEFINE RADIO NETWORKS, 2007, :25-31
[2]   Schedulability Analysis of Global Memory-predictable Scheduling [J].
Alhammad, Ahmed ;
Pellizzoni, Rodolfo .
2014 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE (EMSOFT), 2014,
[3]  
[Anonymous], 2010, INT J AD HOC SENSOR, DOI DOI 10.5121/ijasuc.2010.1301
[4]  
[Anonymous], 2001, P 2 ACM INT S MOB AD
[5]  
[Anonymous], 2012, Introduction to network simulator NS2
[6]  
Bansal S, 2003, P COMP RES REP CORR
[7]  
Becher A, 2006, TECHNICAL REPORT
[8]  
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
[9]   A Survey of Trust Management in WSNs, Internet of Things and Future Internet [J].
Chang, Kai-Di ;
Chen, Jiann-Liang .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01) :5-23
[10]  
Channa Muhammad Ibrahim, 2011, Journal of Communications, V6, P549, DOI 10.4304/jcm.6.7.549-557