Skip to main content
Erschienen in: Mobile Networks and Applications 6/2021

29.08.2018

Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks

verfasst von: Liangyi Gong, Chundong Wang, Hong Yang, Zhiyuan Li, Zhentang Zhao

Erschienen in: Mobile Networks and Applications | Ausgabe 6/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The trust routing protocol is an important way to solve the security of wireless sensor networks. In previous work, nodes’ trust evaluation granularity is coarse, and routing trust evaluation model is relatively insufficient. In this paper, we propose a high-reliability trust evaluation model for secure routing based on combination inside states of a node with outside interaction behaviors between nodes. Firstly, we leverage a Markov chain prediction model with inside four states to assess trust degree of a routing node. The abnormal node could be found through changes of node power, traffic, response time and network delay. However, a compromised routing node self can change its inside states, so we explore the interaction behaviors between nodes to find abnormal nodes and use an improved Bayesian model to calculate the trust degree of nodes. Finally, this paper proposes a novel trust routing working principle based on a fine-grained trust model. NS2 (Network Simulator version 2) results show that our routing trust evaluation scheme can effectively identify the abnormal and malicious nodes, and reduce the harm caused by malicious nodes to wireless sensor networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Abbas NI, Ilkan M (2015) Fuzzy approach to improving route stability of the aodv routing protocol. EURASIP J Wirel Commun Netw 2015(1):1–11 Abbas NI, Ilkan M (2015) Fuzzy approach to improving route stability of the aodv routing protocol. EURASIP J Wirel Commun Netw 2015(1):1–11
2.
Zurück zum Zitat Ahmed A, Bakar KA, Channa MI, Khan AW, Haseeb K (2017) Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Networking and Applications 14(4):1–22 Ahmed A, Bakar KA, Channa MI, Khan AW, Haseeb K (2017) Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Networking and Applications 14(4):1–22
3.
Zurück zum Zitat Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible ehr sharing in mobile health cloud under static assumptions. Clust Comput 20(3):1–8CrossRef Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible ehr sharing in mobile health cloud under static assumptions. Clust Comput 20(3):1–8CrossRef
4.
Zurück zum Zitat Chen Wang Jian Shen QLYR, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Security and Communication Networks 2018: Article ID 3680851 Chen Wang Jian Shen QLYR, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Security and Communication Networks 2018: Article ID 3680851
5.
Zurück zum Zitat Dhananjayan G, Subbiah J (2016) T2ar: trust-aware ad-hoc routing protocol for manet. SpringerPlus 5 (1):1–16CrossRef Dhananjayan G, Subbiah J (2016) T2ar: trust-aware ad-hoc routing protocol for manet. SpringerPlus 5 (1):1–16CrossRef
6.
Zurück zum Zitat Eissa T, Razak SA, Khokhar RH, Samian N (2013) Trust-based routing mechanism in manet: design and implementation. Mobile Networks and Applications 18(5):666–677CrossRef Eissa T, Razak SA, Khokhar RH, Samian N (2013) Trust-based routing mechanism in manet: design and implementation. Mobile Networks and Applications 18(5):666–677CrossRef
7.
Zurück zum Zitat Estrin D (2002) Tutorial wireless sensor networks part iv: Sensor network protocols. mobicom2002. In: The eight annual international conference on mobile computing and networking atlanta. ACM, Georgia, pp 140–147 Estrin D (2002) Tutorial wireless sensor networks part iv: Sensor network protocols. mobicom2002. In: The eight annual international conference on mobile computing and networking atlanta. ACM, Georgia, pp 140–147
8.
Zurück zum Zitat Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, pp 66–77 Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, pp 66–77
9.
Zurück zum Zitat Gao CZ, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inform Sci 444:72–88MathSciNetCrossRef Gao CZ, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inform Sci 444:72–88MathSciNetCrossRef
10.
Zurück zum Zitat Halim ITA, Fahmy HM, El-Din AMB, El-Shafey MH (2010) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. In: 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–8 Halim ITA, Fahmy HM, El-Din AMB, El-Shafey MH (2010) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. In: 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–8
11.
Zurück zum Zitat Han T, Luo S, Zhu H, Xin Y, Peng Y (2013) A novel trust evaluation model based on grey clustering theory for routing networks. J Comput 8(11):2743–2749CrossRef Han T, Luo S, Zhu H, Xin Y, Peng Y (2013) A novel trust evaluation model based on grey clustering theory for routing networks. J Comput 8(11):2743–2749CrossRef
12.
Zurück zum Zitat Han Ting LS (2013) Study on security routing algorithm based on dynamic adjacent trust. J Commun 6:191–200 Han Ting LS (2013) Study on security routing algorithm based on dynamic adjacent trust. J Commun 6:191–200
13.
Zurück zum Zitat Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inform Sci s 412C413:223–241CrossRef Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inform Sci s 412C413:223–241CrossRef
14.
Zurück zum Zitat Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access 6:1–1CrossRef Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access 6:1–1CrossRef
15.
Zurück zum Zitat Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRef Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501CrossRef
16.
Zurück zum Zitat Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef
17.
Zurück zum Zitat Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRef Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRef
18.
Zurück zum Zitat Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232CrossRef Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232CrossRef
19.
Zurück zum Zitat Li Ji LJ (2006) The research on securitym echanism based on aodv routing protocol in mobile ad hoc network. J Electron 2:272–276 Li Ji LJ (2006) The research on securitym echanism based on aodv routing protocol in mobile ad hoc network. J Electron 2:272–276
20.
Zurück zum Zitat Peng S, Jia W, Wang G (2008) Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In: IEEE/IFIP international conference on embedded and ubiquitous computing, 2008. EUC’08, vol. 2. IEEE, pp 3–9 Peng S, Jia W, Wang G (2008) Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In: IEEE/IFIP international conference on embedded and ubiquitous computing, 2008. EUC’08, vol. 2. IEEE, pp 3–9
21.
Zurück zum Zitat Peng S, Yang A, Cao L, Yu S, Xie D (2016) Social influence modeling using information theory in mobile social networks. Inf Sci 379:146–159CrossRef Peng S, Yang A, Cao L, Yu S, Xie D (2016) Social influence modeling using information theory in mobile social networks. Inf Sci 379:146–159CrossRef
22.
Zurück zum Zitat Qian Zhihong WY (2013) Internet of things-oriented wireless sensor networks review. J Electron Inf Technol 1:215–227 Qian Zhihong WY (2013) Internet of things-oriented wireless sensor networks review. J Electron Inf Technol 1:215–227
23.
Zurück zum Zitat Qiang L, Xiaohong H, Supeng L, Longjiang L, Yuming M (2011) Deployment strategy of wireless sensor networks for internet of things. China Commun 8(8):111–120 Qiang L, Xiaohong H, Supeng L, Longjiang L, Yuming M (2011) Deployment strategy of wireless sensor networks for internet of things. China Commun 8(8):111–120
24.
Zurück zum Zitat RahimiZadeh K, Kabiri P (2014) Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks. Secur Commun Netw 7(11):1746–1763CrossRef RahimiZadeh K, Kabiri P (2014) Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks. Secur Commun Netw 7(11):1746–1763CrossRef
25.
Zurück zum Zitat Rathnamma MV, Reddy PC (2017) A power efficient trust based securerouting scheme for mobile ad-hoc networks. Int J Soft Comput 12(4):247–252 Rathnamma MV, Reddy PC (2017) A power efficient trust based securerouting scheme for mobile ad-hoc networks. Int J Soft Comput 12(4):247–252
26.
Zurück zum Zitat Salehi M, Boukerche A, Darehshoorzadeh A (2016) Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw 50:88–101CrossRef Salehi M, Boukerche A, Darehshoorzadeh A (2016) Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw 50:88–101CrossRef
27.
Zurück zum Zitat Sethuraman P, Kannan N (2016) Refined trust energy-ad hoc on demand distance vector (rete-aodv) routing algorithm for secured routing in manet. Wirel Netw 23(7):1–11 Sethuraman P, Kannan N (2016) Refined trust energy-ad hoc on demand distance vector (rete-aodv) routing algorithm for secured routing in manet. Wirel Netw 23(7):1–11
28.
Zurück zum Zitat Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef
29.
Zurück zum Zitat Vaseer G, Ghai G, Patheja PS (2017) A novel intrusion detection algorithm: an aodv routing protocol case study. In: IEEE international symposium on nanoelectronic and information systems, pp 111–116 Vaseer G, Ghai G, Patheja PS (2017) A novel intrusion detection algorithm: an aodv routing protocol case study. In: IEEE international symposium on nanoelectronic and information systems, pp 111–116
30.
Zurück zum Zitat Venkanna U, Agarwal JK, Velusamy RL (2015) A cooperative routing for manet based on distributed trust and energy management. Wirel Pers Commun 81(3):961–979CrossRef Venkanna U, Agarwal JK, Velusamy RL (2015) A cooperative routing for manet based on distributed trust and energy management. Wirel Pers Commun 81(3):961–979CrossRef
31.
Zurück zum Zitat Yadav S, Trivedi MC, Singh VK, Kolhe ML (2017) Securing aodv routing protocol against black hole attack in manet using outlier detection scheme. In: IEEE Uttar Pradesh section international conference on electrical, computer and electronics, pp 1–4 Yadav S, Trivedi MC, Singh VK, Kolhe ML (2017) Securing aodv routing protocol against black hole attack in manet using outlier detection scheme. In: IEEE Uttar Pradesh section international conference on electrical, computer and electronics, pp 1–4
32.
Zurück zum Zitat Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99CrossRef Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99CrossRef
33.
Zurück zum Zitat Zhang F, Jia ZP, Xia H, Li X, Edwin HMS (2012) Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov scgm (1, 1) model. Comput Commun 35(5):589–596CrossRef Zhang F, Jia ZP, Xia H, Li X, Edwin HMS (2012) Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov scgm (1, 1) model. Comput Commun 35(5):589–596CrossRef
34.
Zurück zum Zitat Zhang G, Chen Z, Tian L, Zhang D (2015) Using trust to establish a secure routing model in cognitive radio network. Plos One 10(9):e0139326CrossRef Zhang G, Chen Z, Tian L, Zhang D (2015) Using trust to establish a secure routing model in cognitive radio network. Plos One 10(9):e0139326CrossRef
35.
Zurück zum Zitat Zhang X, Tan YA, Liang C, Li Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access PP(99):1–1CrossRef Zhang X, Tan YA, Liang C, Li Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access PP(99):1–1CrossRef
36.
Zurück zum Zitat Zhang X, Yang Z, Liu Y, Li J, Ming Z (2017) Toward efficient mechanisms for mobile crowdsensing. IEEE Trans Veh Technol 66(2):1760–1771CrossRef Zhang X, Yang Z, Liu Y, Li J, Ming Z (2017) Toward efficient mechanisms for mobile crowdsensing. IEEE Trans Veh Technol 66(2):1760–1771CrossRef
Metadaten
Titel
Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks
verfasst von
Liangyi Gong
Chundong Wang
Hong Yang
Zhiyuan Li
Zhentang Zhao
Publikationsdatum
29.08.2018
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 6/2021
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1106-z

Weitere Artikel der Ausgabe 6/2021

Mobile Networks and Applications 6/2021 Zur Ausgabe