A Trust-based Secure Routing Algorithm for Wireless Sensor Networks

被引:0
作者
Liu Wei [1 ]
Ye Qing [1 ]
Yang Nan [2 ]
机构
[1] Naval Univ Engn, Dept Informat Secur, Wuhan 430033, Peoples R China
[2] Mil Representat Off Chengdu, Chengdu 610036, Peoples R China
来源
2015 34TH CHINESE CONTROL CONFERENCE (CCC) | 2015年
关键词
wireless sensor networks; mu TESLA algorithm; trust degree; improved D-S evidence theory;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To overcome the threats of internal malicious nodes in wireless sensor networks(WSNs), a trust-based secure routing algorithm is proposed in this paper. It uses TESLA(micro Timed, Efficient, Streaming, Loss tolerant Authentication) algorithm to ensure that the data should not be tampered by malicious nodes. Using the improved D-S evidence theory to evaluate the trust degree of internal nodes and obtain the optimal route selection. The experimental results show that the algorithm can effectively find and successfully keep away from the malicious nodes in the networks. Moreover, the algorithm can reduce the number of data packets dropped, providing reliable data transmission.
引用
收藏
页码:7726 / 7729
页数:4
相关论文
共 50 条
[31]   Design and analysis of a secure routing protocol algorithm for wireless sensor networks [J].
Cheng, Hongbing ;
Rong, Chunming ;
Yang, Geng .
25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011), 2011, :475-480
[32]   Secure Routing in Cluster-Based Wireless Sensor Networks [J].
Mezrag, Fares ;
Bitam, Salim ;
Mellouk, Abdelhamid .
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
[33]   A Survey of Secure Routing in Wireless Sensor Networks [J].
LI ZhiyuanWANG RuchuanCollege of ComputerNanjing University of Posts and TelecommunicationsNanjing ChinaState Key Laboratory for Novel Software TechnologyNanjing UniversityNanjing China .
南京邮电大学学报(自然科学版), 2010, 30 (01) :77-87
[34]   An energy efficient and trust aware framework for secure routing in leach for wireless sensor networks [J].
Miglani A. ;
Bhatia T. ;
Sharma G. ;
Shrivastava G. .
Scalable Computing, 2017, 18 (03) :207-218
[35]   A Secure Routing Protocol for Wireless Sensor Networks [J].
Sen, Jaydip ;
Ukil, Arijit .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 3, PROCEEDINGS, 2010, 6018 :277-290
[36]   Multiobjective, trust-aware, artificial hummingbird algorithm-based secure clustering and routing with mobile sink for wireless sensor networks [J].
Naik, Anil Kumar Jemla ;
Parameswarappa, Manjunatha ;
Ramachandra, Mohan Naik .
ETRI JOURNAL, 2024, 46 (06) :950-964
[37]   Coordinate Based Routing Algorithm for Wireless Sensor Networks [J].
Karna, Anil Kumar .
2012 Third IEEE and IFIP South Central Asian Himalayas Regional International Conference on Internet (AH-ICI 2012), 2012,
[38]   Research on trust sensing based secure routing mechanism for wireless sensor network [J].
Qin D.-Y. ;
Jia S. ;
Yang S.-X. ;
Ma J.-Y. ;
Zhang Y. ;
Ding Q. .
Tongxin Xuebao/Journal on Communications, 2017, 38 (10) :60-70
[39]   Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network [J].
Qin, Danyang ;
Yang, Songxiang ;
Jia, Shuang ;
Zhang, Yan ;
Ma, Jingya ;
Ding, Qun .
IEEE ACCESS, 2017, 5 :9599-9609
[40]   A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks [J].
Wang, Jian ;
Jiang, Shuai ;
Fapojuwo, Abraham O. .
SENSORS, 2017, 17 (06)