Trust-based backpressure routing in wireless sensor networks

被引:18
|
作者
Venkataraman, Revathi [1 ]
Moeller, Scott [2 ]
Krishnamachari, Bhaskar [2 ]
Rao, T. Rama [3 ]
机构
[1] SRM Univ, Dept Comp Sci & Engn, Madras 603203, Tamil Nadu, India
[2] Univ So Calif, Dept Elect Engn, Los Angeles, CA 90089 USA
[3] SRM Univ, Dept Telecommun Engn, Madras 603203, Tamil Nadu, India
基金
美国国家科学基金会;
关键词
backpressure routing; floating queues; trust metrics; sensor trust; sensor networks; HOC; PROTOCOL; MODELS;
D O I
10.1504/IJSNET.2015.067591
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we apply a vector autoregression (VAR) based trust model over the backpressure collection protocol (BCP), a collection mechanism based on dynamic backpressure routing in wireless sensor networks (WSNs). The backpressure scheduling is known for being throughput-optimal. In the presence of malicious nodes, the throughput optimality no longer holds. This affects the network performance in collection tree applications of sensor networks. We apply an autoregression based scheme to embed trust into the link weights, so that the trusted links are scheduled. We have evaluated our work in a real sensor network testbed and shown that by carefully setting the trust parameters, substantial benefit in terms of throughput can be obtained with minimal overheads. Our results show that even when 50% of network nodes are malicious, VAR trust offers approximately 73% throughput and ensures reliable routing, with a small trade-off in the end-to-end packet delay and energy consumptions.
引用
收藏
页码:27 / 39
页数:13
相关论文
共 50 条
  • [1] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [2] Trust-based QoS Routing Algorithm for Wireless Sensor Networks
    Wang, Junwei
    Wang, Haifeng
    26TH CHINESE CONTROL AND DECISION CONFERENCE (2014 CCDC), 2014, : 2492 - 2495
  • [3] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
    Buccafurri, Francesco
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Lax, Gianluca
    Nocera, Antonino
    Romano, Luigi
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
  • [4] Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks
    Liangyi Gong
    Chundong Wang
    Hong Yang
    Zhiyuan Li
    Zhentang Zhao
    Mobile Networks and Applications, 2021, 26 : 2515 - 2524
  • [5] A trust-based routing framework in energy-constrained wireless sensor networks
    Cheng Weifang
    Liao Xiangke
    Shen Changxiang
    Li Shanshan
    Peng Shaoliang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 478 - 489
  • [6] Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks
    Gong, Liangyi
    Wang, Chundong
    Yang, Hong
    Li, Zhiyuan
    Zhao, Zhentang
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2515 - 2524
  • [7] Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik
    Seo, Sunho
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (06) : 1066 - 1069
  • [8] A trust-based geographical routing scheme in sensor networks
    Hung, Ka-Shun
    Lui, King-Shan
    Kwok, Yu-Kwong
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3125 - 3129
  • [9] CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Elhajj, Imad
    Itani, Wassim
    SENSORS, 2015, 15 (02) : 3299 - 3333
  • [10] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205