Skip to main content
Top
Published in: Mobile Networks and Applications 2/2016

01-04-2016

A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network

Authors: Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Abdul Waheed Khan

Published in: Mobile Networks and Applications | Issue 2/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of sensor nodes, reliable data delivery in WSNs is nontrivial. To counter node misbehavior attacks, traditional cryptographic and authentication based solutions have proved to be inappropriate due to high cost and incapability factors. Recently, trust based solutions have appeared to be viable solutions to address nodes’ misbehavior attacks. However, the existing trust based solutions incur high cost in trust estimation and network-wide dissemination which significantly increases traffic congestion and undermines network lifetime. This paper presents a Trust and Energy aware Secure Routing Protocol (TESRP) for WSN that exploits a distributed trust model for discovering and isolating misbehaving nodes. TESRP employs a multi-facet routing strategy that takes into consideration the trust level, residual energy, and hop-counts of neighboring nodes while making routing decisions. This strategy not only ensures data dissemination via trusted nodes but also balances out energy consumption among trusted nodes while traversing through shorter paths. Demonstrated by simulation results in NS-2, TESRP achieves improved performance in terms of energy consumption, throughput and network lifetime as compared to existing solutions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
4.
go back to reference Zhang K, Wang C and Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1–5). IEEE. doi:10.1109/WiCom.2008.889 Zhang K, Wang C and Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1–5). IEEE. doi:10.​1109/​WiCom.​2008.​889
6.
go back to reference Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquit Comput 1(3):1–19CrossRef Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquit Comput 1(3):1–19CrossRef
8.
go back to reference Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRef
9.
go back to reference Becher A, Benenson Z and Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Technical report. Springer Berlin, Heidelberg Becher A, Benenson Z and Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Technical report. Springer Berlin, Heidelberg
13.
go back to reference Zhang C, Zhu X, Song Y and Fang Y (2010). A formal study of trust-based routing in wireless Ad Hoc networks. In: 2010 I.E. proceedings INFOCOM (pp. 1–9) Zhang C, Zhu X, Song Y and Fang Y (2010). A formal study of trust-based routing in wireless Ad Hoc networks. In: 2010 I.E. proceedings INFOCOM (pp. 1–9)
14.
go back to reference Fernandez-Gago MC, Roman R and Lopez J (2007) a survey on the applicability of trust management systems for wireless sensor networks. In: Third IEEE international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2007. SECPerU (pp. 25–30) Fernandez-Gago MC, Roman R and Lopez J (2007) a survey on the applicability of trust management systems for wireless sensor networks. In: Third IEEE international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2007. SECPerU (pp. 25–30)
15.
go back to reference Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed Reputation-based Beacon Trust System. In 2nd IEEE international symposium on dependable, autonomic and secure computing, (pp. 277–283). IEEE. doi:10.1109/DASC.2006.28 Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed Reputation-based Beacon Trust System. In 2nd IEEE international symposium on dependable, autonomic and secure computing, (pp. 277–283). IEEE. doi:10.​1109/​DASC.​2006.​28
17.
go back to reference Michiardi P and Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks. In: Advanced communications and multimedia security (pp. 107–121). Springer US Michiardi P and Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks. In: Advanced communications and multimedia security (pp. 107–121). Springer US
18.
19.
go back to reference Tanachaiwiwat S, Davel P, Bhindwale R and Helmyl A (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: IEEE international conference on performance, computing, and communications. (pp. 463–469). IEEE Tanachaiwiwat S, Davel P, Bhindwale R and Helmyl A (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: IEEE international conference on performance, computing, and communications. (pp. 463–469). IEEE
20.
go back to reference Gheorghe, L, Rughiniș R and Țăpuș N (2012). Trust and energy-aware routing protocol for wireless sensor networks. In: The 8th international conference on wireless and mobile communications (ICWMC) (pp. 388–394) Gheorghe, L, Rughiniș R and Țăpuș N (2012). Trust and energy-aware routing protocol for wireless sensor networks. In: The 8th international conference on wireless and mobile communications (ICWMC) (pp. 388–394)
21.
go back to reference Choudhury S, Roy SD and Singh SA (2008). Trust management in Ad Hoc network for secure DSR routing. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics (pp. 495–500). Springer Choudhury S, Roy SD and Singh SA (2008). Trust management in Ad Hoc network for secure DSR routing. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics (pp. 495–500). Springer
23.
go back to reference Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12(12):1091–1103. doi:10.1002/wcm.1038 CrossRef Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12(12):1091–1103. doi:10.​1002/​wcm.​1038 CrossRef
25.
go back to reference Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Dependable Secure Comput 9(6):785–797CrossRef Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Dependable Secure Comput 9(6):785–797CrossRef
28.
go back to reference Cho J, Swami A, Chen I (2011) A survey on trust management for mobile Ad Hoc networks. IEEE Commun Surv Tutor 13(4):562–583CrossRef Cho J, Swami A, Chen I (2011) A survey on trust management for mobile Ad Hoc networks. IEEE Commun Surv Tutor 13(4):562–583CrossRef
29.
go back to reference Zapata MG and Asokan N (2002) Securing Ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security (pp. 1–10). ACM Zapata MG and Asokan N (2002) Securing Ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security (pp. 1–10). ACM
30.
go back to reference Perrig A, Canetti R, TYgar JD and Song D (2000). Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy (S&P). (pp. 56–73) Perrig A, Canetti R, TYgar JD and Song D (2000). Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy (S&P). (pp. 56–73)
31.
go back to reference Yi S, Naldurg P and Kravets R (2001). Security-aware routing protocol for wireless Ad-hoc networks. In: Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing (pp. 299–302). ACM Yi S, Naldurg P and Kravets R (2001). Security-aware routing protocol for wireless Ad-hoc networks. In: Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing (pp. 299–302). ACM
32.
go back to reference Reddy YB and Srivathsan S (2009) Game theory model for selective forward attacks in wireless sensor networks. In: 17th Mediterranean conference on control and automation, MED’09. (pp. 458–463). IEEE. doi:10.1109/MED.2009.5164584 Reddy YB and Srivathsan S (2009) Game theory model for selective forward attacks in wireless sensor networks. In: 17th Mediterranean conference on control and automation, MED’09. (pp. 458–463). IEEE. doi:10.​1109/​MED.​2009.​5164584
34.
go back to reference Yang R, Lin C and Jiang Y (2011) Trust based access control in infrastructure-centric environment. In: IEEE international conference on communications (ICC) (pp. 1–5). Yang R, Lin C and Jiang Y (2011) Trust based access control in infrastructure-centric environment. In: IEEE international conference on communications (ICC) (pp. 1–5).
35.
go back to reference Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Dependable Secure Comput 9(2):184–197CrossRef Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Dependable Secure Comput 9(2):184–197CrossRef
36.
go back to reference Abusalah L, Khokhar A and Guizani M (2006) Trust aware routing in mobile Ad Hoc networks. In: IEEE global telecommunications conference (GLOBECOM’06) (pp. 1–5) Abusalah L, Khokhar A and Guizani M (2006) Trust aware routing in mobile Ad Hoc networks. In: IEEE global telecommunications conference (GLOBECOM’06) (pp. 1–5)
38.
go back to reference Zhang Y and Lee W (2000) Intrusion detection in wireless Ad-Hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275–283) Zhang Y and Lee W (2000) Intrusion detection in wireless Ad-Hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275–283)
39.
go back to reference Mahmoud ME and Shen XS (2011) Trust-based and energy-aware incentive routing protocol for Multi-hop wireless networks. In: IEEE international conference on communications (ICC) (pp. 1–5). IEEE Mahmoud ME and Shen XS (2011) Trust-based and energy-aware incentive routing protocol for Multi-hop wireless networks. In: IEEE international conference on communications (ICC) (pp. 1–5). IEEE
40.
go back to reference Josang A and Ismail R (2002) The beta reputation system. In: 15th bled electronic commerce conference (pp. 324–337). Bled Slovenia Josang A and Ismail R (2002) The beta reputation system. In: 15th bled electronic commerce conference (pp. 324–337). Bled Slovenia
41.
go back to reference Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688. doi:10.1002/sec CrossRef Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688. doi:10.​1002/​sec CrossRef
42.
go back to reference Issariyakul T and Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer Issariyakul T and Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer
Metadata
Title
A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network
Authors
Adnan Ahmed
Kamalrulnizam Abu Bakar
Muhammad Ibrahim Channa
Abdul Waheed Khan
Publication date
01-04-2016
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 2/2016
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-016-0683-y

Other articles of this Issue 2/2016

Mobile Networks and Applications 2/2016 Go to the issue