Skip to main content
Top
Published in: Wireless Personal Communications 1/2015

01-01-2015

Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks

Authors: X. Anita, M. A. Bhagyaveni, J. Martin Leo Manickam

Published in: Wireless Personal Communications | Issue 1/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The cooperative multi-hop communication in a remote infrastructureless networking environment poses a serious security threat for the design of wireless sensor networks (WSNs). Because of their vulnerability to attacks, the intrinsic and demanding assignment of WSNs is security. Earlier security solutions aimed at thwarting different types of malicious threats but failed to consider the resource constrained nature of sensor nodes. The stringent resource constraints of WSNs require a lightweight trust-based routing scheme. In this paper, we propose a collaborative lightweight trust-based (CLT) routing protocol for WSNs with minimal overhead in regard to memory and energy consumption. It does not use promiscuous mode of operation to monitor the neighboring nodes for trust derivation. CLT employs a novel trust counselor that monitors and warns the neighboring nodes whose trust falls below a warning threshold. The warning message alarms a sensor node to check and correct the packet forwarding behavior to improve its trust relationship with its neighbors. Theoretical analysis and simulation results of CLT protocol demonstrate higher packet delivery ratio, higher network lifetime, lower end-to-end delay, lower memory and energy consumption than the traditional and existing trust-based routing schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef
2.
go back to reference Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys and Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys and Tutorials, 8(2), 2–23.CrossRef
3.
go back to reference Maarouf, I. K., & Naseer, A. R. (2007). WSNodeRater—An optimized reputation system framework for security aware energy efficient geographic routing in WSNs. In International conference on computer systems and applications, pp. 258–265. Maarouf, I. K., & Naseer, A. R. (2007). WSNodeRater—An optimized reputation system framework for security aware energy efficient geographic routing in WSNs. In International conference on computer systems and applications, pp. 258–265.
4.
go back to reference Doddapaneni, K., Ever, E., Gemikonakli, O., Mostarda, L., & Navarra, A. (2012). Effects of IDSs on the WSNs lifetime: Evidence of the need of new approaches. In 11th international conference on trust, security and privacy in computing and communications, pp. 907–912. Doddapaneni, K., Ever, E., Gemikonakli, O., Mostarda, L., & Navarra, A. (2012). Effects of IDSs on the WSNs lifetime: Evidence of the need of new approaches. In 11th international conference on trust, security and privacy in computing and communications, pp. 907–912.
5.
go back to reference Tanachaiwiwat, S., Dave, P., Bhindwale, R., & Helmy, A. (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In IEEE workshop on energy-efficient wireless communications and networks (EWCN) in conjunction with IEEE international conference on performance, computing and communications (IPCCC), Phoenix, AZ, pp. 463–469. Tanachaiwiwat, S., Dave, P., Bhindwale, R., & Helmy, A. (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In IEEE workshop on energy-efficient wireless communications and networks (EWCN) in conjunction with IEEE international conference on performance, computing and communications (IPCCC), Phoenix, AZ, pp. 463–469.
6.
go back to reference Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefMATH Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefMATH
7.
go back to reference Srinivasan, A., & Wu, J. (2007). A novel k-parent flooding tree for secure and reliable broadcasting in sensor networks. In IEEE international conference on communications, pp. 1497–1502. Srinivasan, A., & Wu, J. (2007). A novel k-parent flooding tree for secure and reliable broadcasting in sensor networks. In IEEE international conference on communications, pp. 1497–1502.
8.
go back to reference Srinivasan, A., & Wu, J. (2009). Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks, 2(3), 239–253.CrossRef Srinivasan, A., & Wu, J. (2009). Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Security and Communication Networks, 2(3), 239–253.CrossRef
9.
go back to reference Hu, J., Chen, H., & Gao, C. (2008). Agent-based trust management model for wireless sensor network. In 2nd international conference on multimedia and ubiquitous engineering (MUE 2008), pp. 150–154. Hu, J., Chen, H., & Gao, C. (2008). Agent-based trust management model for wireless sensor network. In 2nd international conference on multimedia and ubiquitous engineering (MUE 2008), pp. 150–154.
10.
go back to reference Li, F., Srinivasan, A., & Wu, J. (2008). A novel CDS-based reputation monitoring system for wireless sensor networks. In 28th international conference on distributed computing systems workshop, pp. 364–369. Li, F., Srinivasan, A., & Wu, J. (2008). A novel CDS-based reputation monitoring system for wireless sensor networks. In 28th international conference on distributed computing systems workshop, pp. 364–369.
11.
go back to reference Maarouf, I., Baroudi, U., & Naseer, A. (2009). Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications, 3(5), 846–858.CrossRef Maarouf, I., Baroudi, U., & Naseer, A. (2009). Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Communications, 3(5), 846–858.CrossRef
12.
go back to reference Ahmed, R., Jameel, H., d’Auriol., B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712. Ahmed, R., Jameel, H., d’Auriol., B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
13.
go back to reference Zhan, G., & Shi, W. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef Zhan, G., & Shi, W. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.CrossRef
14.
go back to reference He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedical, 16(4), 623–632.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedical, 16(4), 623–632.CrossRef
15.
go back to reference Bao, F., Chen, I.-R., Chan, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef Bao, F., Chen, I.-R., Chan, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef
16.
go back to reference Zhang, J., Shankaran, R., Orgun, M. A., Varadharajan, V., & Sattar, A. (2010). A trust management architecture for hierarchical wireless sensor networks. In 35th annual IEEE conference on local computer networks, pp. 264–267. Zhang, J., Shankaran, R., Orgun, M. A., Varadharajan, V., & Sattar, A. (2010). A trust management architecture for hierarchical wireless sensor networks. In 35th annual IEEE conference on local computer networks, pp. 264–267.
17.
go back to reference Rahhal, H. A., Ali, I. A., & Shaheen, S. I. (2011). A novel trust-based cross-layer model for wireless sensor networks. In 28th national radio science conference, C5, pp. 1–10. Rahhal, H. A., Ali, I. A., & Shaheen, S. I. (2011). A novel trust-based cross-layer model for wireless sensor networks. In 28th national radio science conference, C5, pp. 1–10.
18.
go back to reference Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensic and Security, 8(6), 924–935.CrossRef Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensic and Security, 8(6), 924–935.CrossRef
19.
go back to reference Anita, X., Martin Leo Manickam, J., & Bhagyaveni, M. A. (2013). Two-way acknowledgment-based trust framework for wireless sensor network. In International Journal of Distributed Sensor Networks, Article ID 952905. Anita, X., Martin Leo Manickam, J., & Bhagyaveni, M. A. (2013). Two-way acknowledgment-based trust framework for wireless sensor network. In International Journal of Distributed Sensor Networks, Article ID 952905.
20.
go back to reference Rumsey, D. J. (2011). Statistics for dummies (2nd ed.). London: Wiley. Rumsey, D. J. (2011). Statistics for dummies (2nd ed.). London: Wiley.
21.
go back to reference Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM conference on computer and communication security (CCS ’03), pp. 62–72. Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM conference on computer and communication security (CCS ’03), pp. 62–72.
22.
go back to reference Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of IEEE symposium on security and privacy, pp. 197–213. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of IEEE symposium on security and privacy, pp. 197–213.
23.
go back to reference Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of second international conference on embedded networked sensor systems (SenSys ’04), pp. 162–175. Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of second international conference on embedded networked sensor systems (SenSys ’04), pp. 162–175.
24.
go back to reference Perkin, C. E., & Royer, E. M. (1999). Ad hoc on demand distance vector routing. In Second IEEE workshop on mobile computing, systems and applications, pp. 90–100. Perkin, C. E., & Royer, E. M. (1999). Ad hoc on demand distance vector routing. In Second IEEE workshop on mobile computing, systems and applications, pp. 90–100.
25.
go back to reference Chen, J., Du, X., & Fang, B. (2012). An efficient anonymous communication protocol for wireless sensor networks. Wireless Communication & Mobile Computing, 12(14), 1302–1312.CrossRef Chen, J., Du, X., & Fang, B. (2012). An efficient anonymous communication protocol for wireless sensor networks. Wireless Communication & Mobile Computing, 12(14), 1302–1312.CrossRef
Metadata
Title
Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks
Authors
X. Anita
M. A. Bhagyaveni
J. Martin Leo Manickam
Publication date
01-01-2015
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2015
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1998-2

Other articles of this Issue 1/2015

Wireless Personal Communications 1/2015 Go to the issue