Secured routing in wireless sensor networks using fault-free and trusted nodes

被引:9
作者
Devanagavi, Geetha D. [1 ]
Nalini, N. [2 ]
Biradar, Rajashekhar C. [3 ]
机构
[1] Jain Univ, Reva Inst Technol & Management, Bangalore 560064, Karnataka, India
[2] Nitte Meenakshi Inst Technol & Management, Dept Comp Sci & Engn, Bangalore, Karnataka, India
[3] Reva Inst Technol & Management, Dept Informat Sci & Engn, Bangalore 560064, Karnataka, India
关键词
wireless sensor networks; active nodes; battery power model; interference model; software agents; trust model; message authentication code; secured routing;
D O I
10.1002/dac.2810
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor network (WSN) should be designed such that it is able to identify the faulty nodes, rectify the faults, identify compromised nodes from various security threats, and transmit the sensed data securely to the sink node under faulty conditions. In this paper, we propose an idea of integrating fault tolerance and secured routing mechanism in WSN named as fault tolerant secured routing: an integrated approach (FASRI) that establishes secured routes from source to sink node even under faulty node conditions. Faulty nodes are identified using battery power and interference models. Trustworthy nodes (non-compromised) among fault-free nodes are identified by using agent-based trust model. Finally, the data are securely routed through fault-free non-compromised nodes to sink. Performance evaluation through simulation is carried out for packet delivery ratio, hit rate, computation overhead, communication overhead, compromised node detection ratio, end-to-end delay, memory overhead, and agent overhead. We compared simulation results of FASRI with three schemes, namely multi-version multi-path (MVMP), intrusion/fault tolerant routing protocol (IFRP) in WSN, and active node-based fault tolerance using battery power and interference model (AFTBI) for various measures and found that there is a performance improvement in FASRI compared with MVMP, IFRP, and AFTBI. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:170 / 193
页数:24
相关论文
共 28 条
[1]  
[Anonymous], 2011, INT J APPL GRAPH THE
[2]  
Babu A. Raha, 2011, Wireless Sensor Netw., V3, P125, DOI [10.4236/wsn.2011.34015, DOI 10.4236/WSN.2011.34015]
[3]   Accuracy, latency, and energy cross-optimization in wireless sensor networks through infection spreading [J].
Bai, Fan ;
Munasinghe, Kumudu S. ;
Jamalipour, Abbas .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (05) :628-646
[4]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[5]  
Chen M, 2006, J COMPUT, V1, P14
[6]   Analyzing the techniques that improve fault tolerance of aggregation trees in sensor networks [J].
Chitnis, Laukik ;
Dobra, Alin ;
Ranka, Sanjay .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2009, 69 (12) :950-960
[7]   INSENS: Intrusion-tolerant routing for wireless sensor networks [J].
Deng, J ;
Han, R ;
Mishra, S .
COMPUTER COMMUNICATIONS, 2006, 29 (02) :216-230
[8]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3152, P494
[9]   Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach [J].
Geeta, D. D. ;
Nalini, N. ;
Biradar, Rajashekhar C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (04) :1174-1185
[10]  
Geetha D. D., 2013, P IEEE INT C ADV RES, P112