Skip to main content
Erschienen in: Mobile Networks and Applications 2/2016

01.04.2016

A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network

Erschienen in: Mobile Networks and Applications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of sensor nodes, reliable data delivery in WSNs is nontrivial. To counter node misbehavior attacks, traditional cryptographic and authentication based solutions have proved to be inappropriate due to high cost and incapability factors. Recently, trust based solutions have appeared to be viable solutions to address nodes’ misbehavior attacks. However, the existing trust based solutions incur high cost in trust estimation and network-wide dissemination which significantly increases traffic congestion and undermines network lifetime. This paper presents a Trust and Energy aware Secure Routing Protocol (TESRP) for WSN that exploits a distributed trust model for discovering and isolating misbehaving nodes. TESRP employs a multi-facet routing strategy that takes into consideration the trust level, residual energy, and hop-counts of neighboring nodes while making routing decisions. This strategy not only ensures data dissemination via trusted nodes but also balances out energy consumption among trusted nodes while traversing through shorter paths. Demonstrated by simulation results in NS-2, TESRP achieves improved performance in terms of energy consumption, throughput and network lifetime as compared to existing solutions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
4.
Zurück zum Zitat Zhang K, Wang C and Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1–5). IEEE. doi:10.1109/WiCom.2008.889 Zhang K, Wang C and Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1–5). IEEE. doi:10.​1109/​WiCom.​2008.​889
6.
Zurück zum Zitat Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquit Comput 1(3):1–19CrossRef Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquit Comput 1(3):1–19CrossRef
8.
Zurück zum Zitat Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef
9.
Zurück zum Zitat Becher A, Benenson Z and Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Technical report. Springer Berlin, Heidelberg Becher A, Benenson Z and Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Technical report. Springer Berlin, Heidelberg
12.
13.
Zurück zum Zitat Zhang C, Zhu X, Song Y and Fang Y (2010). A formal study of trust-based routing in wireless Ad Hoc networks. In: 2010 I.E. proceedings INFOCOM (pp. 1–9) Zhang C, Zhu X, Song Y and Fang Y (2010). A formal study of trust-based routing in wireless Ad Hoc networks. In: 2010 I.E. proceedings INFOCOM (pp. 1–9)
14.
Zurück zum Zitat Fernandez-Gago MC, Roman R and Lopez J (2007) a survey on the applicability of trust management systems for wireless sensor networks. In: Third IEEE international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2007. SECPerU (pp. 25–30) Fernandez-Gago MC, Roman R and Lopez J (2007) a survey on the applicability of trust management systems for wireless sensor networks. In: Third IEEE international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2007. SECPerU (pp. 25–30)
15.
Zurück zum Zitat Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed Reputation-based Beacon Trust System. In 2nd IEEE international symposium on dependable, autonomic and secure computing, (pp. 277–283). IEEE. doi:10.1109/DASC.2006.28 Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed Reputation-based Beacon Trust System. In 2nd IEEE international symposium on dependable, autonomic and secure computing, (pp. 277–283). IEEE. doi:10.​1109/​DASC.​2006.​28
17.
Zurück zum Zitat Michiardi P and Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks. In: Advanced communications and multimedia security (pp. 107–121). Springer US Michiardi P and Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks. In: Advanced communications and multimedia security (pp. 107–121). Springer US
18.
Zurück zum Zitat Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2012) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Pers Commun 69(2):805–826. doi:10.1007/s11277-012-0613-7 CrossRef Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2012) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Pers Commun 69(2):805–826. doi:10.​1007/​s11277-012-0613-7 CrossRef
19.
Zurück zum Zitat Tanachaiwiwat S, Davel P, Bhindwale R and Helmyl A (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: IEEE international conference on performance, computing, and communications. (pp. 463–469). IEEE Tanachaiwiwat S, Davel P, Bhindwale R and Helmyl A (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: IEEE international conference on performance, computing, and communications. (pp. 463–469). IEEE
20.
Zurück zum Zitat Gheorghe, L, Rughiniș R and Țăpuș N (2012). Trust and energy-aware routing protocol for wireless sensor networks. In: The 8th international conference on wireless and mobile communications (ICWMC) (pp. 388–394) Gheorghe, L, Rughiniș R and Țăpuș N (2012). Trust and energy-aware routing protocol for wireless sensor networks. In: The 8th international conference on wireless and mobile communications (ICWMC) (pp. 388–394)
21.
Zurück zum Zitat Choudhury S, Roy SD and Singh SA (2008). Trust management in Ad Hoc network for secure DSR routing. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics (pp. 495–500). Springer Choudhury S, Roy SD and Singh SA (2008). Trust management in Ad Hoc network for secure DSR routing. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics (pp. 495–500). Springer
23.
Zurück zum Zitat Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12(12):1091–1103. doi:10.1002/wcm.1038 CrossRef Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12(12):1091–1103. doi:10.​1002/​wcm.​1038 CrossRef
25.
Zurück zum Zitat Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Dependable Secure Comput 9(6):785–797CrossRef Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Dependable Secure Comput 9(6):785–797CrossRef
28.
Zurück zum Zitat Cho J, Swami A, Chen I (2011) A survey on trust management for mobile Ad Hoc networks. IEEE Commun Surv Tutor 13(4):562–583CrossRef Cho J, Swami A, Chen I (2011) A survey on trust management for mobile Ad Hoc networks. IEEE Commun Surv Tutor 13(4):562–583CrossRef
29.
Zurück zum Zitat Zapata MG and Asokan N (2002) Securing Ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security (pp. 1–10). ACM Zapata MG and Asokan N (2002) Securing Ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security (pp. 1–10). ACM
30.
Zurück zum Zitat Perrig A, Canetti R, TYgar JD and Song D (2000). Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy (S&P). (pp. 56–73) Perrig A, Canetti R, TYgar JD and Song D (2000). Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy (S&P). (pp. 56–73)
31.
Zurück zum Zitat Yi S, Naldurg P and Kravets R (2001). Security-aware routing protocol for wireless Ad-hoc networks. In: Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing (pp. 299–302). ACM Yi S, Naldurg P and Kravets R (2001). Security-aware routing protocol for wireless Ad-hoc networks. In: Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing (pp. 299–302). ACM
32.
Zurück zum Zitat Reddy YB and Srivathsan S (2009) Game theory model for selective forward attacks in wireless sensor networks. In: 17th Mediterranean conference on control and automation, MED’09. (pp. 458–463). IEEE. doi:10.1109/MED.2009.5164584 Reddy YB and Srivathsan S (2009) Game theory model for selective forward attacks in wireless sensor networks. In: 17th Mediterranean conference on control and automation, MED’09. (pp. 458–463). IEEE. doi:10.​1109/​MED.​2009.​5164584
34.
Zurück zum Zitat Yang R, Lin C and Jiang Y (2011) Trust based access control in infrastructure-centric environment. In: IEEE international conference on communications (ICC) (pp. 1–5). Yang R, Lin C and Jiang Y (2011) Trust based access control in infrastructure-centric environment. In: IEEE international conference on communications (ICC) (pp. 1–5).
35.
Zurück zum Zitat Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Dependable Secure Comput 9(2):184–197CrossRef Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Dependable Secure Comput 9(2):184–197CrossRef
36.
Zurück zum Zitat Abusalah L, Khokhar A and Guizani M (2006) Trust aware routing in mobile Ad Hoc networks. In: IEEE global telecommunications conference (GLOBECOM’06) (pp. 1–5) Abusalah L, Khokhar A and Guizani M (2006) Trust aware routing in mobile Ad Hoc networks. In: IEEE global telecommunications conference (GLOBECOM’06) (pp. 1–5)
38.
Zurück zum Zitat Zhang Y and Lee W (2000) Intrusion detection in wireless Ad-Hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275–283) Zhang Y and Lee W (2000) Intrusion detection in wireless Ad-Hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275–283)
39.
Zurück zum Zitat Mahmoud ME and Shen XS (2011) Trust-based and energy-aware incentive routing protocol for Multi-hop wireless networks. In: IEEE international conference on communications (ICC) (pp. 1–5). IEEE Mahmoud ME and Shen XS (2011) Trust-based and energy-aware incentive routing protocol for Multi-hop wireless networks. In: IEEE international conference on communications (ICC) (pp. 1–5). IEEE
40.
Zurück zum Zitat Josang A and Ismail R (2002) The beta reputation system. In: 15th bled electronic commerce conference (pp. 324–337). Bled Slovenia Josang A and Ismail R (2002) The beta reputation system. In: 15th bled electronic commerce conference (pp. 324–337). Bled Slovenia
41.
Zurück zum Zitat Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688. doi:10.1002/sec CrossRef Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688. doi:10.​1002/​sec CrossRef
42.
Zurück zum Zitat Issariyakul T and Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer Issariyakul T and Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer
Metadaten
Titel
A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network
Publikationsdatum
01.04.2016
Erschienen in
Mobile Networks and Applications / Ausgabe 2/2016
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-016-0683-y

Weitere Artikel der Ausgabe 2/2016

Mobile Networks and Applications 2/2016 Zur Ausgabe

Neuer Inhalt