Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks

被引:88
作者
Liu, Xiao [1 ]
Liu, Anfeng [1 ]
Wang, Tian [2 ]
Ota, Kaoru [3 ]
Dong, Mianxiong [3 ]
Liu, Yuxin [1 ]
Cai, Zhiping [4 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Fujian, Peoples R China
[3] Muroran Inst Technol, Dept Informat & Elect Engn, Muroran, Hokkaido 0508585, Japan
[4] Natl Univ Def Technol, Sch Comp, Dept Network Engn, Changsha 410073, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Energy harvesting networks; Security; Disjoint routing; Marking probability; Network lifetime; POWER ALLOCATION; INTERNET; THINGS; IOT; PROTOCOL; FOG;
D O I
10.1016/j.jpdc.2019.08.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To improve the data arrival ratio and the transmission delay and considering that the capacity for determining malicious nodes and energy are limited, a security disjoint routing-based verified message (SDRVM) scheme is proposed. The main contributions of SDRVM are as follows: (a) two connected dominating sets (a data CDS and a v-message CDS) are created for disseminating data and verified messages (v-messages), respectively, based on the remaining energy of nodes. (b) Nodes record the ID information in data packets with a specified probability, namely, the marking probability, which is adjusted according to the remaining energy of the nodes. (c) The duty cycle of the nodes is adjusted, and the energy of the nodes is divided into three levels. In the data CDS, the duty cycle of the sensor nodes is the longest and the duty cycle of the nodes that do not belong to either of the CDSs is the shortest. (d) If the energy of the sensor nodes is sufficient, data packets are transmitted several times and the v-messages that are stored in the nodes are transmitted to the destination nodes. The proposed scheme has been evaluated using different parameters where the results obtained prove its effectiveness in comparison to the existing solutions. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:140 / 155
页数:16
相关论文
共 41 条
[1]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[2]  
[Anonymous], GLOB IEEE GLOB COMM
[3]  
[Anonymous], 2013 IEEE 3 INT C IN
[4]   Energy Provisioning in Solar-Powered Wireless Mesh Networks [J].
Badawy, Ghada H. ;
Sayegh, Amir A. ;
Todd, Terence D. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (08) :3859-3871
[5]   IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges [J].
Cai, Hongming ;
Xu, Boyi ;
Jiang, Lihong ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :75-87
[6]   Modelling and simulation of Opportunistic IoT Services with Aggregate Computing [J].
Casadei, Roberto ;
Fortino, Giancarlo ;
Pianini, Danilo ;
Russo, Wilma ;
Savaglio, Claudio ;
Viroli, Mirko .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 :252-262
[7]   Distributed duty cycle control for delay improvement in wireless sensor networks [J].
Chen, Zhuangbin ;
Liu, Anfeng ;
Li, Zhetao ;
Choi, Young-june ;
Li, Jie .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (03) :559-578
[8]   Energy-Efficient Power Allocation With Individual and Sum Power Constraints [J].
He, Peter ;
Zhang, Shan ;
Zhao, Lian ;
Shen, Xuemin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (08) :5353-5366
[9]   Recursive Waterfilling for Wireless Links With Energy Harvesting Transmitters [J].
He, Peter ;
Zhao, Lian ;
Zhou, Sheng ;
Niu, Zhisheng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (03) :1232-1241
[10]   UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City [J].
Hu, Lang ;
Liu, Anfeng ;
Xie, Mande ;
Wang, Tian .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (06) :1550-1574