A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network

被引:47
作者
Ahmed, Adnan [1 ,4 ]
Abu Bakar, Kamalrulnizam [1 ]
Channa, Muhammad Ibrahim [2 ]
Khan, Abdul Waheed [3 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Skudai, Johor Bahru, Malaysia
[2] Quaid E Awam Univ Engn Sci & Technol, Dept Informat Technol, Nawabshah, Pakistan
[3] King Abdulaziz Univ, Fac Comp & Informat Technol Rabigh, Rabigh, Saudi Arabia
[4] Quaid E Awam Univ Engn Sci & Technol, Dept Comp Syst, Nawabshah, Pakistan
关键词
Node misbehavior; Trust; Energy efficiency; Wireless sensor networks; AUTHENTICATION; ARCHITECTURE; MANAGEMENT; MODEL;
D O I
10.1007/s11036-016-0683-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of sensor nodes, reliable data delivery in WSNs is nontrivial. To counter node misbehavior attacks, traditional cryptographic and authentication based solutions have proved to be inappropriate due to high cost and incapability factors. Recently, trust based solutions have appeared to be viable solutions to address nodes' misbehavior attacks. However, the existing trust based solutions incur high cost in trust estimation and network-wide dissemination which significantly increases traffic congestion and undermines network lifetime. This paper presents a Trust and Energy aware Secure Routing Protocol (TESRP) for WSN that exploits a distributed trust model for discovering and isolating misbehaving nodes. TESRP employs a multi-facet routing strategy that takes into consideration the trust level, residual energy, and hop-counts of neighboring nodes while making routing decisions. This strategy not only ensures data dissemination via trusted nodes but also balances out energy consumption among trusted nodes while traversing through shorter paths. Demonstrated by simulation results in NS-2, TESRP achieves improved performance in terms of energy consumption, throughput and network lifetime as compared to existing solutions.
引用
收藏
页码:272 / 285
页数:14
相关论文
共 42 条
[31]  
Srinivasan A, 2006, DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, P277
[32]   A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks [J].
Sun, Yan ;
Luo, Hong ;
Das, Sajal K. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) :785-797
[33]  
Tanachaiwiwat S, 2004, IEEE IPCCC, P463
[34]   Trust based routing for misbehavior detection in Ad hoc networks [J].
Gong W. ;
You Z. ;
Chen D. ;
Zhao X. ;
Gu M. ;
Lam K.-Y. .
Journal of Networks, 2010, 5 (05) :551-558
[35]  
Yih-Chun H., 2003, AD HOC NETW, V1, P175, DOI DOI 10.1016/S1570-8705(03)00019-2
[36]   Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures [J].
Yu, Yanli ;
Li, Keqiu ;
Zhou, Wanlei ;
Li, Ping .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :867-880
[37]   Mining Discriminative Co-occurrence Patterns for Visual Recognition [J].
Yuan, Junsong ;
Yang, Ming ;
Wu, Ying .
2011 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2011, :1-8
[38]   A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks [J].
Zahariadis, Theodore ;
Trakadas, Panagiotis ;
Leligou, Helen C. ;
Maniatis, Sotiris ;
Karkazis, Panagiotis .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (02) :805-826
[39]   Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs [J].
Zhan, Guoxing ;
Shi, Weisong ;
Deng, Julia .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (02) :184-197
[40]  
Zhang C., 2010, INFOCOM, 2010 Proceedings IEEE, P1