A Trust-based Security Aware Congestion Control Algorithm for Wireless Sensor Networks

被引:1
作者
Pandey, Divya [1 ]
Kushwaha, Vandana [1 ]
机构
[1] Banaras Hindu Univ, Inst Sci, Varanasi 221005, Uttar Pradesh, India
关键词
Wireless sensor networks; trust model; congestion; attacks; beta distribution; transmission; ROUTING PROTOCOL; MANAGEMENT; AVOIDANCE; SYSTEMS;
D O I
10.32908/ahswn.v54.9743
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Congestion in the network may result from natural causes or selfish nodes acting as catalysts. It is possible for malicious sensor nodes in Wireless Sensor Networks (WSNs) to create congestion-like situations by sending redundant fake packets or throwing away data packets. As a result, relying solely on congestion control techniques is insufficient to assure fair delivery. It is, therefore, necessary to first prevent this adversity by separating these types of nodes from the network. Existing congestion control strategies in the literature make the erroneous assumption that all the nodes are authentic and act appropriately which is impractical. For this purpose, a Security-Aware Congestion Control (SACC) algorithm has been proposed that would not only take care of the natural mode of congestion occurrence but would also consider the case in which hostile nodes intentionally try to block packets from reaching their destination. A collaborative effort has been undertaken in this study to alleviate congestion and security challenges utilizing the lightweight energy-efficient trust-based model method. The residual energy of nodes, buffer occupancy, and packet delivery ratio of nodes these network parameters have been taken for setting up trust metrics as they play a vital role in identifying malicious behaviour as well as preventing congestion occurrence. We have also explained the strategic way of how to give weights to these metrics so as to get more accurate trust values. The proposed approach beats existing related solutions in terms of energy efficiency, congestion control, and security due to its strong capacity to withstand numerous internal attacks.
引用
收藏
页码:249 / 290
页数:42
相关论文
共 52 条
[1]  
[Anonymous], 2009, Wireless Sensor Networks: A Networking Perspective
[2]  
[Anonymous], 2007, Wireless sensor networks: technology, protocols, and applications
[3]  
Babu S. S., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P444, DOI 10.1109/WICT.2011.6141286
[4]   CoAR: Congestion-Aware Routing Protocol for Low Power and Lossy Networks for IoT Applications [J].
Bhandari, Khadak Singh ;
Hosen, A. S. M. Sanwar ;
Cho, Gi Hwan .
SENSORS, 2018, 18 (11)
[5]   When Big Data Meets Software-Defined Networking: SDN for Big Data and Big Data for SDN [J].
Cui, Laizhong ;
Yu, F. Richard ;
Yan, Qiao .
IEEE NETWORK, 2016, 30 (01) :58-65
[6]   A congestion aware routing for lifetime improving in grid-based sensor networks [J].
Das, Himanish Shekhar ;
Bhattacharjee, Sanghita .
Journal of High Speed Networks, 2017, 23 (01) :1-14
[7]   ELPC-Trust Framework for Wireless Sensor Networks [J].
Dharini, N. ;
Duraipandian, N. ;
Katiravan, Jeevaa .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) :1709-1742
[8]  
Donta PK, 2020, 2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), P430
[9]   MEC-Assisted Immersive VR Video Streaming Over Terahertz Wireless Networks: A Deep Reinforcement Learning Approach [J].
Du, Jianbo ;
Yu, F. Richard ;
Lu, Guangyue ;
Wang, Junxuan ;
Jiang, Jing ;
Chu, Xiaoli .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :9517-9529
[10]   Computation Offloading and Resource Allocation in Vehicular Networks Based on Dual-Side Cost Minimization [J].
Du, Jianbo ;
Yu, F. Richard ;
Chu, Xiaoli ;
Feng, Jie ;
Lu, Guangyue .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) :1079-1092