A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network

被引:47
作者
Ahmed, Adnan [1 ,4 ]
Abu Bakar, Kamalrulnizam [1 ]
Channa, Muhammad Ibrahim [2 ]
Khan, Abdul Waheed [3 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Skudai, Johor Bahru, Malaysia
[2] Quaid E Awam Univ Engn Sci & Technol, Dept Informat Technol, Nawabshah, Pakistan
[3] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Rabigh, Saudi Arabia
[4] Quaid E Awam Univ Engn Sci & Technol, Dept Comp Syst, Nawabshah, Pakistan
关键词
Node misbehavior; Trust; Energy efficiency; Wireless sensor networks; AUTHENTICATION; ARCHITECTURE; MANAGEMENT; MODEL;
D O I
10.1007/s11036-016-0683-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of sensor nodes, reliable data delivery in WSNs is nontrivial. To counter node misbehavior attacks, traditional cryptographic and authentication based solutions have proved to be inappropriate due to high cost and incapability factors. Recently, trust based solutions have appeared to be viable solutions to address nodes' misbehavior attacks. However, the existing trust based solutions incur high cost in trust estimation and network-wide dissemination which significantly increases traffic congestion and undermines network lifetime. This paper presents a Trust and Energy aware Secure Routing Protocol (TESRP) for WSN that exploits a distributed trust model for discovering and isolating misbehaving nodes. TESRP employs a multi-facet routing strategy that takes into consideration the trust level, residual energy, and hop-counts of neighboring nodes while making routing decisions. This strategy not only ensures data dissemination via trusted nodes but also balances out energy consumption among trusted nodes while traversing through shorter paths. Demonstrated by simulation results in NS-2, TESRP achieves improved performance in terms of energy consumption, throughput and network lifetime as compared to existing solutions.
引用
收藏
页码:272 / 285
页数:14
相关论文
共 42 条
[1]  
Abusalah L., 2006, In Proceedings of the 49th IEEE Global Telecommunications Conference, GLOBECOM '06, P1
[2]  
[Anonymous], 2010, INT J AD HOC SENSOR, DOI DOI 10.5121/ijasuc.2010.1301
[3]  
[Anonymous], 2001, P 2 ACM INT S MOB AD
[4]  
[Anonymous], 2011, 2011 IEEE INT C COMM
[5]  
[Anonymous], 2002, P 1 ACM WORKSH WIR S
[6]  
[Anonymous], 2012, Introduction to network simulator NS2
[7]  
Becher A, 2006, TECHNICAL REPORT
[8]   A Survey of Trust Management in WSNs, Internet of Things and Future Internet [J].
Chang, Kai-Di ;
Chen, Jiann-Liang .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01) :5-23
[9]  
Channa Muhammad Ibrahim, 2011, Journal of Communications, V6, P549, DOI 10.4304/jcm.6.7.549-557
[10]   Dealing with dishonest recommendation: The trials in reputation management court [J].
Chen, Shenlong ;
Zhang, Yuqing ;
Liu, Qixu ;
Feng, Jingyu .
AD HOC NETWORKS, 2012, 10 (08) :1603-1618