Skip to main content
Erschienen in: Telecommunication Systems 1/2016

01.01.2016

A trust aware routing protocol for energy constrained wireless sensor network

verfasst von: Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, Abdul Waheed Khan

Erschienen in: Telecommunication Systems | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehavior attacks. Recently, trust based solutions have proved to be more effective to address nodes’ misbehavior attacks. Apart from isolating misbehaving nodes, the existing trust based schemes lacks the capability to minimize link failure notifications due to transient transmission disruption which consequently give rise to frequent route breakages thereby undermining throughput and route stability. Moreover, the existing solutions give rise to high energy consumption and control overhead in pursuit of trust estimation and network-wide dissemination which not only adds to network congestion but also undermines network lifetime. In this paper, we present a Trust and Energy aware Routing Protocol (TERP) that makes use of a distributed trust model for the detection and isolation of misbehaving nodes. TERP incorporates a composite routing function that encompasses trust, residual-energy, and hop count of neighbor nodes in making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Moreover, TERP intelligently evaluates the actual link breakage thereby avoiding unnecessary route discoveries. Simulation results demonstrate improved throughput, network lifetime and route stability of TERP when compared to existing work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510. doi:10.1002/ett.2635.CrossRef Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510. doi:10.​1002/​ett.​2635.CrossRef
4.
Zurück zum Zitat Momani, M., & Challa, S. (2010). Survey of trust Models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(3), 1–19.CrossRef Momani, M., & Challa, S. (2010). Survey of trust Models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(3), 1–19.CrossRef
5.
Zurück zum Zitat Das, M. L. (2009). Two-factor user Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRef Das, M. L. (2009). Two-factor user Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRef
6.
Zurück zum Zitat Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 1–14. doi:10.1155/2014/209436.CrossRef Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 1–14. doi:10.​1155/​2014/​209436.CrossRef
9.
Zurück zum Zitat Ishmanov, F., Malik, A. S., Kim, S. W., & Begalov, B. (2013). Trust management system in wireless sensor networks: Design considerations and research challenges. Transactions on Emerging Telecommunications Technologies, pp. 1–24. doi:10.1002/ett.2674. Ishmanov, F., Malik, A. S., Kim, S. W., & Begalov, B. (2013). Trust management system in wireless sensor networks: Design considerations and research challenges. Transactions on Emerging Telecommunications Technologies, pp. 1–24. doi:10.​1002/​ett.​2674.
11.
Zurück zum Zitat Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In Third IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU (pp. 25–30). Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In Third IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU (pp. 25–30).
12.
Zurück zum Zitat Mamoun, M. H. (2011). A new proactive routing protocol for MANET. Advances in Information Sciences and Service Sciences, 3(2), 132–140. doi:10.4156/aiss.CrossRef Mamoun, M. H. (2011). A new proactive routing protocol for MANET. Advances in Information Sciences and Service Sciences, 3(2), 132–140. doi:10.​4156/​aiss.CrossRef
13.
Zurück zum Zitat Youn, J. (2006). Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks. Journal of Networks, 1(1), 1–11.CrossRef Youn, J. (2006). Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks. Journal of Networks, 1(1), 1–11.CrossRef
14.
Zurück zum Zitat Roy, B., Banik, S., Chaki, N., & Saha, B. (2010). An improved route maintenance strategy for QoS based AODV routing protocol. International Conference on Advances in Recent Technologies in Communication and Computing, pp. 51–55. doi:10.1109/ARTCom.2010.62. Roy, B., Banik, S., Chaki, N., & Saha, B. (2010). An improved route maintenance strategy for QoS based AODV routing protocol. International Conference on Advances in Recent Technologies in Communication and Computing, pp. 51–55. doi:10.​1109/​ARTCom.​2010.​62.
15.
Zurück zum Zitat Chakeres, I. D., & Belding-royer, E. M. (2002). The utility of hello messages for determining link connectivity. In The 5th International Symposium on Wireless Personal Multimedia Communications. (pp. 504–508). Chakeres, I. D., & Belding-royer, E. M. (2002). The utility of hello messages for determining link connectivity. In The 5th International Symposium on Wireless Personal Multimedia Communications. (pp. 504–508).
18.
Zurück zum Zitat Qu, C., Ju, L., Jia, Z., Xu, H., & Zheng, L. (2013). Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 42–49). doi:10.1109/TrustCom.2013.9. Qu, C., Ju, L., Jia, Z., Xu, H., & Zheng, L. (2013). Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 42–49). doi:10.​1109/​TrustCom.​2013.​9.
19.
Zurück zum Zitat Leligou, H. C., Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2012). Combining trust with location information for routing in wireless sensor networks. Wireless Communications and Mobile Computing, 12(12), 1091–1103. doi:10.1002/wcm.1038.CrossRef Leligou, H. C., Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2012). Combining trust with location information for routing in wireless sensor networks. Wireless Communications and Mobile Computing, 12(12), 1091–1103. doi:10.​1002/​wcm.​1038.CrossRef
20.
Zurück zum Zitat Sun, Y., Luo, H., & Das, S. K. (2012). A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 9(6), 785–797.CrossRef Sun, Y., Luo, H., & Das, S. K. (2012). A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 9(6), 785–797.CrossRef
23.
Zurück zum Zitat Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRef Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.CrossRef
24.
Zurück zum Zitat Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM. Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM.
25.
Zurück zum Zitat Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM. Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM.
26.
Zurück zum Zitat Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2012). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826. doi:10.1007/s11277-012-0613-7. Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2012). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826. doi:10.​1007/​s11277-012-0613-7.
27.
Zurück zum Zitat Eissa, T., Abdul Razak, S., Khokhar, R. H., & Samian, N. (2013). Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Networks and Applications, 18(5), 666–677. doi:10.1007/s11036-011-0328-0.CrossRef Eissa, T., Abdul Razak, S., Khokhar, R. H., & Samian, N. (2013). Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Networks and Applications, 18(5), 666–677. doi:10.​1007/​s11036-011-0328-0.CrossRef
28.
Zurück zum Zitat Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF?: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF?: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef
29.
Zurück zum Zitat Abusalah, L., Khokhar, A., & Guizani, M. (2006). Trust aware routing in mobile ad Hoc networks. In IEEE Global Telecommunications Conference (GLOBECOM ’06) (pp. 1–5). Abusalah, L., Khokhar, A., & Guizani, M. (2006). Trust aware routing in mobile ad Hoc networks. In IEEE Global Telecommunications Conference (GLOBECOM ’06) (pp. 1–5).
32.
Zurück zum Zitat Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (pp. 275–283). Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (pp. 275–283).
33.
Zurück zum Zitat Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., & Luke, J. A. (2009). Trust-aware in-network aggregation for wireless sensor networks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (pp. 1–8). Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., & Luke, J. A. (2009). Trust-aware in-network aggregation for wireless sensor networks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (pp. 1–8).
34.
Zurück zum Zitat Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM. doi:10.1145/345910.345955. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM. doi:10.​1145/​345910.​345955.
35.
Zurück zum Zitat Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia. Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia.
36.
Zurück zum Zitat Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., et al. (2013). Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 6(6), 669–688. doi:10.1002/sec.CrossRef Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., et al. (2013). Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 6(6), 669–688. doi:10.​1002/​sec.CrossRef
37.
Zurück zum Zitat Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer. Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer.
38.
Zurück zum Zitat Yi, Y., & Shakkottai, S. (2007). Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking, 15(1), 133–144.CrossRef Yi, Y., & Shakkottai, S. (2007). Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking, 15(1), 133–144.CrossRef
39.
Zurück zum Zitat Issariyakul, T., & Hossain, E. (2012). Introduction to Network Simulator NS2 (2nd ed.). New York: Springer.CrossRef Issariyakul, T., & Hossain, E. (2012). Introduction to Network Simulator NS2 (2nd ed.). New York: Springer.CrossRef
Metadaten
Titel
A trust aware routing protocol for energy constrained wireless sensor network
verfasst von
Adnan Ahmed
Kamalrulnizam Abu Bakar
Muhammad Ibrahim Channa
Khalid Haseeb
Abdul Waheed Khan
Publikationsdatum
01.01.2016
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 1/2016
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-015-0068-8

Weitere Artikel der Ausgabe 1/2016

Telecommunication Systems 1/2016 Zur Ausgabe

Neuer Inhalt