Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.01.2015

Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks

verfasst von: X. Anita, M. A. Bhagyaveni, J. Martin Leo Manickam

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The cooperative multi-hop communication in a remote infrastructureless networking environment poses a serious security threat for the design of wireless sensor networks (WSNs). Because of their vulnerability to attacks, the intrinsic and demanding assignment of WSNs is security. Earlier security solutions aimed at thwarting different types of malicious threats but failed to consider the resource constrained nature of sensor nodes. The stringent resource constraints of WSNs require a lightweight trust-based routing scheme. In this paper, we propose a collaborative lightweight trust-based (CLT) routing protocol for WSNs with minimal overhead in regard to memory and energy consumption. It does not use promiscuous mode of operation to monitor the neighboring nodes for trust derivation. CLT employs a novel trust counselor that monitors and warns the neighboring nodes whose trust falls below a warning threshold. The warning message alarms a sensor node to check and correct the packet forwarding behavior to improve its trust relationship with its neighbors. Theoretical analysis and simulation results of CLT protocol demonstrate higher packet delivery ratio, higher network lifetime, lower end-to-end delay, lower memory and energy consumption than the traditional and existing trust-based routing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef
2.
Zurück zum Zitat Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys and Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys and Tutorials, 8(2), 2–23.CrossRef
3.
Zurück zum Zitat Maarouf, I. K., & Naseer, A. R. (2007). WSNodeRater—An optimized reputation system framework for security aware energy efficient geographic routing in WSNs. In International conference on computer systems and applications, pp. 258–265. Maarouf, I. K., & Naseer, A. R. (2007). WSNodeRater—An optimized reputation system framework for security aware energy efficient geographic routing in WSNs. In International conference on computer systems and applications, pp. 258–265.
4.
Zurück zum Zitat Doddapaneni, K., Ever, E., Gemikonakli, O., Mostarda, L., & Navarra, A. (2012). Effects of IDSs on the WSNs lifetime: Evidence of the need of new approaches. In 11th international conference on trust, security and privacy in computing and communications, pp. 907–912. Doddapaneni, K., Ever, E., Gemikonakli, O., Mostarda, L., & Navarra, A. (2012). Effects of IDSs on the WSNs lifetime: Evidence of the need of new approaches. In 11th international conference on trust, security and privacy in computing and communications, pp. 907–912.
5.
Zurück zum Zitat Tanachaiwiwat, S., Dave, P., Bhindwale, R., & Helmy, A. (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In IEEE workshop on energy-efficient wireless communications and networks (EWCN) in conjunction with IEEE international conference on performance, computing and communications (IPCCC), Phoenix, AZ, pp. 463–469. Tanachaiwiwat, S., Dave, P., Bhindwale, R., & Helmy, A. (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In IEEE workshop on energy-efficient wireless communications and networks (EWCN) in conjunction with IEEE international conference on performance, computing and communications (IPCCC), Phoenix, AZ, pp. 463–469.
6.
Zurück zum Zitat Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefMATH Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefMATH
7.
Zurück zum Zitat Srinivasan, A., & Wu, J. (2007). A novel k-parent flooding tree for secure and reliable broadcasting in sensor networks. In IEEE international conference on communications, pp. 1497–1502. Srinivasan, A., & Wu, J. (2007). A novel k-parent flooding tree for secure and reliable broadcasting in sensor networks. In IEEE international conference on communications, pp. 1497–1502.
8.
Zurück zum Zitat Srinivasan, A., & Wu, J. (2009). Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks, 2(3), 239–253.CrossRef Srinivasan, A., & Wu, J. (2009). Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks, 2(3), 239–253.CrossRef
9.
Zurück zum Zitat Hu, J., Chen, H., & Gao, C. (2008). Agent-based trust management model for wireless sensor network. In 2nd international conference on multimedia and ubiquitous engineering (MUE 2008), pp. 150–154. Hu, J., Chen, H., & Gao, C. (2008). Agent-based trust management model for wireless sensor network. In 2nd international conference on multimedia and ubiquitous engineering (MUE 2008), pp. 150–154.
10.
Zurück zum Zitat Li, F., Srinivasan, A., & Wu, J. (2008). A novel CDS-based reputation monitoring system for wireless sensor networks. In 28th international conference on distributed computing systems workshop, pp. 364–369. Li, F., Srinivasan, A., & Wu, J. (2008). A novel CDS-based reputation monitoring system for wireless sensor networks. In 28th international conference on distributed computing systems workshop, pp. 364–369.
11.
Zurück zum Zitat Maarouf, I., Baroudi, U., & Naseer, A. (2009). Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications, 3(5), 846–858.CrossRef Maarouf, I., Baroudi, U., & Naseer, A. (2009). Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications, 3(5), 846–858.CrossRef
12.
Zurück zum Zitat Ahmed, R., Jameel, H., d’Auriol., B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712. Ahmed, R., Jameel, H., d’Auriol., B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
13.
Zurück zum Zitat Zhan, G., & Shi, W. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef Zhan, G., & Shi, W. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef
14.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedical, 16(4), 623–632.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedical, 16(4), 623–632.CrossRef
15.
Zurück zum Zitat Bao, F., Chen, I.-R., Chan, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef Bao, F., Chen, I.-R., Chan, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef
16.
Zurück zum Zitat Zhang, J., Shankaran, R., Orgun, M. A., Varadharajan, V., & Sattar, A. (2010). A trust management architecture for hierarchical wireless sensor networks. In 35th annual IEEE conference on local computer networks, pp. 264–267. Zhang, J., Shankaran, R., Orgun, M. A., Varadharajan, V., & Sattar, A. (2010). A trust management architecture for hierarchical wireless sensor networks. In 35th annual IEEE conference on local computer networks, pp. 264–267.
17.
Zurück zum Zitat Rahhal, H. A., Ali, I. A., & Shaheen, S. I. (2011). A novel trust-based cross-layer model for wireless sensor networks. In 28th national radio science conference, C5, pp. 1–10. Rahhal, H. A., Ali, I. A., & Shaheen, S. I. (2011). A novel trust-based cross-layer model for wireless sensor networks. In 28th national radio science conference, C5, pp. 1–10.
18.
Zurück zum Zitat Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensic and Security, 8(6), 924–935.CrossRef Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensic and Security, 8(6), 924–935.CrossRef
19.
Zurück zum Zitat Anita, X., Martin Leo Manickam, J., & Bhagyaveni, M. A. (2013). Two-way acknowledgment-based trust framework for wireless sensor network. In International Journal of Distributed Sensor Networks, Article ID 952905. Anita, X., Martin Leo Manickam, J., & Bhagyaveni, M. A. (2013). Two-way acknowledgment-based trust framework for wireless sensor network. In International Journal of Distributed Sensor Networks, Article ID 952905.
20.
Zurück zum Zitat Rumsey, D. J. (2011). Statistics for dummies (2nd ed.). London: Wiley. Rumsey, D. J. (2011). Statistics for dummies (2nd ed.). London: Wiley.
21.
Zurück zum Zitat Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM conference on computer and communication security (CCS ’03), pp. 62–72. Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM conference on computer and communication security (CCS ’03), pp. 62–72.
22.
Zurück zum Zitat Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of IEEE symposium on security and privacy, pp. 197–213. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of IEEE symposium on security and privacy, pp. 197–213.
23.
Zurück zum Zitat Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of second international conference on embedded networked sensor systems (SenSys ’04), pp. 162–175. Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of second international conference on embedded networked sensor systems (SenSys ’04), pp. 162–175.
24.
Zurück zum Zitat Perkin, C. E., & Royer, E. M. (1999). Ad hoc on demand distance vector routing. In Second IEEE workshop on mobile computing, systems and applications, pp. 90–100. Perkin, C. E., & Royer, E. M. (1999). Ad hoc on demand distance vector routing. In Second IEEE workshop on mobile computing, systems and applications, pp. 90–100.
25.
Zurück zum Zitat Chen, J., Du, X., & Fang, B. (2012). An efficient anonymous communication protocol for wireless sensor networks. Wireless Communication & Mobile Computing, 12(14), 1302–1312.CrossRef Chen, J., Du, X., & Fang, B. (2012). An efficient anonymous communication protocol for wireless sensor networks. Wireless Communication & Mobile Computing, 12(14), 1302–1312.CrossRef
Metadaten
Titel
Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks
verfasst von
X. Anita
M. A. Bhagyaveni
J. Martin Leo Manickam
Publikationsdatum
01.01.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1998-2

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt