Secure and Trust-Aware Routing Scheme in Wireless Sensor Networks

被引:46
作者
Beheshtiasl, Azam [1 ]
Ghaffari, Ali [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Tabriz Branch, Tabriz, Iran
关键词
WSNs; Trust model; Secure routing; Security; Fuzzy logic; MOBILE AD-HOC; MANAGEMENT; CONGESTION; MECHANISMS; PROTOCOL;
D O I
10.1007/s11277-019-06357-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Secure and trustable routing is one of the remarkable challenges in wireless sensor networks (WSNs). In this paper, we proposed a secure, trustable and energy-efficient routing method for WSNs. The proposed scheme uses Fuzzy logic to obtain the trust values of the routes. Then, the shortest route from the source to the destination was selected by considering trust and security. The proposed method uses the multidimensional scaling-map (MDS-MAP) optimal routing approach and measures the trust model via fuzzy logic. The proposed method was compared with Trust and Centrality degree Based Access Control (TC-BAC) and Trust-Aware Routing Framework (TARF) protocols. Through simulation experiment result, we show that the proposed scheme performs better than TC-BAC and TARF methods in terms of average packet delivery rate, average end-to-end delay and consumption energy.
引用
收藏
页码:1799 / 1814
页数:16
相关论文
共 33 条
[1]   Energy-aware and secure routing with trust for disaster response wireless sensor network [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Khan, Abdul Waheed ;
Haseeb, Khalid .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) :216-237
[2]  
[Anonymous], 2004, INPROCEEDINGS ACM
[3]  
[Anonymous], 2002, P 1 ACM WORKSH WIR S
[4]   An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks [J].
Ayday, Erman ;
Fekri, Faramarz .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2012, 11 (09) :1514-1531
[5]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[6]   Securing AODV: The A-SAODV secure routing prototype [J].
Cerri, Davide ;
Ghioni, Alessandro .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (02) :120-125
[7]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[8]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[9]   TC-BAC: A trust and centrality degree based access control model in wireless sensor networks [J].
Duan, Junqi ;
Gao, Deyun ;
Foh, Chuan Heng ;
Zhang, Hongke .
AD HOC NETWORKS, 2013, 11 (08) :2675-2692
[10]   Congestion control mechanisms in wireless sensor networks: A survey [J].
Ghaffari, Ali .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 52 :101-115