A secure routing protocol with regional partitioned clustering and Beta trust management in smart home

被引:10
作者
Hong, Zhen [1 ,2 ,3 ]
Shao, Qian [2 ]
Liao, Xiaojing [4 ]
Beyah, Raheem [3 ]
机构
[1] Zhejiang Univ Technol, Inst Cyberspace Secur, Hangzhou 310023, Peoples R China
[2] Zhejiang Sci Tech Univ, Fac Mech Engn & Automat, Hangzhou 310018, Peoples R China
[3] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[4] Indiana Univ Bloomington, Dept Comp Sci, Bloomington, IN 47408 USA
基金
中国国家自然科学基金;
关键词
Beta trust management; Hierarchical routing protocol; Internal attack; Regional partitioned clustering; Smart home; WIRELESS SENSOR NETWORKS;
D O I
10.1007/s11276-018-01916-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the emergence of the Internet of Things (IoT) in recent years, the security has been significantly called more and more people's attention on wireless communication between the devices and the human-beings, as well as the devices to devices. Smart home (SH), as a small-scale example of the smart application-based field, has benefited from the concept of IoT since it uses an indoor data-centric sensor network. In SH, routing schemes are widely utilized for data aggregation purposes. However, there are three main issues, which can considerably affect the current execution of routing protocol in SH: (1) lack of technical methods for precisely regional division of the network, (2) the difficulty of differentiating data among various functional regions, and (3) the vulnerability of network with advanced internal routing attacks. To address the aforementioned issues, in this paper, a two-layer cluster-based network model for indoor structured SH and a novel Beta-based trust management (BTM) scheme are proposed to defend various types of internal attacks by integrating the variation of trust value, threshold, and evaluation. The proposed structure forms a secure hierarchical routing protocol called SH-PCNBTM to effectively support the data transmission service in SH networks. The performance of SH-PCNBTM is thoroughly evaluated by using a set of comprehensive simulations. We will show that the proposed routing protocol not only ensures the even distribution of cluster-heads in each sub-region, but it also identifies and isolates the malicious sensor nodes accurately and rapidly compared with other trust-based hierarchical routing protocols.
引用
收藏
页码:3805 / 3823
页数:19
相关论文
共 32 条
[22]   Internet of things: Smart things network and communication [J].
Pascual Espada, Jordan ;
Yager, Ronald R. ;
Guo, Bin .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 :118-119
[23]   A Graphical-based educational simulation tool for Wireless Sensor Networks [J].
Sabor, Nabil ;
Sasaki, Shigenobu ;
Abo-Zahhad, Mohammed ;
Ahmed, Sabah M. .
SIMULATION MODELLING PRACTICE AND THEORY, 2016, 69 :55-79
[24]   A Survey of Technologies in Internet of Things [J].
Tan, Jasper ;
Koo, Simon G. M. .
2014 IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS 2014), 2014, :269-274
[25]  
Tümer AE, 2014, 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), P432, DOI 10.1109/SPIN.2014.6776992
[26]  
UmaRani V., 2016, PROC INT C INF COMMU, P1
[27]  
Wang WC, 2009, 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, P3330
[28]   Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures [J].
Yu, Yanli ;
Li, Keqiu ;
Zhou, Wanlei ;
Li, Ping .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :867-880
[29]  
Yun Li, 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P223, DOI 10.1109/INFCOMW.2011.5928813
[30]   Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs [J].
Zhan, Guoxing ;
Shi, Weisong ;
Deng, Julia .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) :184-197