TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing

被引:58
作者
Fang, Weidong [1 ,2 ]
Zhang, Wuxiong [1 ,2 ]
Chen, Wei [3 ]
Liu, Yang [1 ,2 ]
Tang, Chaogang [3 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Key Lab Wireless Sensor Network & Commun, Shanghai 200051, Peoples R China
[2] Shanghai Res Ctr Wireless Commun, Shanghai 201210, Peoples R China
[3] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金; 上海市自然科学基金;
关键词
5G; Industrial wireless sensor network (IWSN); Fog computing; Secure routing protocol; Trust management; MECHANISM;
D O I
10.1007/s11276-019-02129-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on fog computer, an industrial wireless sensor network (F-IWSN) is a novel wireless sensor network in the industry. It not only can more efficiently reduce information transmission latency, but also can more beneficially achieve the real-time control and the rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially those internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the grey decision making is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node, namely, a trust management-based secure routing scheme. In addition, the proposed schemes are also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms. It can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.
引用
收藏
页码:3169 / 3182
页数:14
相关论文
共 43 条
[1]   Efficient Resource Utilization in Cloud-Fog Environment Integrated with Smart Grids [J].
Akram, Junaid ;
Najam, Zeeshan ;
Rafi, Arslan .
2018 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2018), 2018, :188-193
[2]  
[Anonymous], 2004, INPROCEEDINGS ACM
[3]  
[Anonymous], 2005, P 3 ANN C UNC AUG 12
[4]  
[Anonymous], 2013, NETWED RES 2013 ROED
[5]  
Bukhari J, 2018, I C INF COMM TECH CO, P216, DOI 10.1109/ICTC.2018.8539645
[6]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[7]   Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks: An Overview [J].
Chiwewe, Tapiwa M. ;
Mbuya, Colman F. ;
Hancke, Gerhard P. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) :1466-1481
[8]   An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications [J].
Duan, Junqi ;
Gao, Deyun ;
Yang, Dong ;
Foh, Chuan Heng ;
Chen, Hsiao-Hwa .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (01) :58-69
[9]   The use of grey-based methods in multi-criteria decision analysis for the evaluation of sustainable energy systems: A review [J].
Elena Arce, Maria ;
Saavedra, Angeles ;
Miguez, Jose L. ;
Granada, Enrique .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2015, 47 :924-932
[10]  
Fang F, 2013, PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), P3843, DOI 10.1109/MEC.2013.6885659