A Trust-based Security Aware Congestion Control Algorithm for Wireless Sensor Networks

被引:1
作者
Pandey, Divya [1 ]
Kushwaha, Vandana [1 ]
机构
[1] Banaras Hindu Univ, Inst Sci, Varanasi 221005, Uttar Pradesh, India
关键词
Wireless sensor networks; trust model; congestion; attacks; beta distribution; transmission; ROUTING PROTOCOL; MANAGEMENT; AVOIDANCE; SYSTEMS;
D O I
10.32908/ahswn.v54.9743
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Congestion in the network may result from natural causes or selfish nodes acting as catalysts. It is possible for malicious sensor nodes in Wireless Sensor Networks (WSNs) to create congestion-like situations by sending redundant fake packets or throwing away data packets. As a result, relying solely on congestion control techniques is insufficient to assure fair delivery. It is, therefore, necessary to first prevent this adversity by separating these types of nodes from the network. Existing congestion control strategies in the literature make the erroneous assumption that all the nodes are authentic and act appropriately which is impractical. For this purpose, a Security-Aware Congestion Control (SACC) algorithm has been proposed that would not only take care of the natural mode of congestion occurrence but would also consider the case in which hostile nodes intentionally try to block packets from reaching their destination. A collaborative effort has been undertaken in this study to alleviate congestion and security challenges utilizing the lightweight energy-efficient trust-based model method. The residual energy of nodes, buffer occupancy, and packet delivery ratio of nodes these network parameters have been taken for setting up trust metrics as they play a vital role in identifying malicious behaviour as well as preventing congestion occurrence. We have also explained the strategic way of how to give weights to these metrics so as to get more accurate trust values. The proposed approach beats existing related solutions in terms of energy efficiency, congestion control, and security due to its strong capacity to withstand numerous internal attacks.
引用
收藏
页码:249 / 290
页数:42
相关论文
共 52 条
[21]   Adaptive Trust-Based Routing Protocol for Large Scale WSNs [J].
Khalid, Nor Azimah ;
Bai, Quan ;
Al-Anbuky, Adnan .
IEEE ACCESS, 2019, 7 :143539-143549
[22]  
Khan Tayyab, 2021, International Journal of Innovative Computing and Applications, V12, P108, DOI 10.1504/IJICA.2021.113750
[23]   ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs [J].
Khan, Tayyab ;
Singh, Karan ;
Hasan, Mohd Hilmi ;
Ahmad, Khaleel ;
Reddy, G. Thippa ;
Mohan, Senthilkumar ;
Ahmadian, Ali .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 :921-943
[24]  
Kushwaha Vandana, 2013, International Journal of Computer Network and Information Security, V6, P1, DOI 10.5815/ijcnis.2014.01.01
[25]   On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks [J].
Labraoui, Nabila ;
Gueroui, Mourad ;
Sekhri, Larbi .
COMPUTER SCIENCE AND ITS APPLICATIONS, CIIA 2015, 2015, 456 :406-415
[26]   Congestion Control Mechanism Based on Dual Threshold DI-RED for WSNs [J].
Li, Suoping ;
Xu, Qianyu ;
Gaber, Jaafar ;
Dou, Zufang ;
Chen, Jinshu .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (03) :2171-2195
[27]   Information-Centric Network Function Virtualization over 5G Mobile Wireless Networks [J].
Liang, Chengchao ;
Yu, F. Richard ;
Zhang, Xi .
IEEE NETWORK, 2015, 29 (03) :68-74
[28]   Distributed Resource Allocation in Blockchain-Based Video Streaming Systems With Mobile Edge Computing [J].
Liu, Mengting ;
Yu, F. Richard ;
Teng, Yinglei ;
Leung, Victor C. M. ;
Song, Mei .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (01) :695-708
[29]   Computation Offloading and Content Caching n Wireless Blockchain Networks With Mobile Edge Computing [J].
Liu, Mengting ;
Yu, F. Richard ;
Teng, Yinglei ;
Leung, Victor C. M. ;
Song, Mei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (11) :11008-11021
[30]   Blockchain and Machine Learning for Communications and Networking Systems [J].
Liu, Yiming ;
Yu, F. Richard ;
Li, Xi ;
Ji, Hong ;
Leung, Victor C. M. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (02) :1392-1431