DOI QR코드

DOI QR Code

Trust-aware secure routing protocol for wireless sensor networks

  • Hu, Huangshui (College of Computer Science and Engineering, Changchun University of Technology) ;
  • Han, Youjia (College of Computer Science and Engineering, Changchun University of Technology) ;
  • Wang, Hongzhi (College of Computer Science and Engineering, Jilin University of Architecture and Technology) ;
  • Yao, Meiqin (College of Computer Science and Engineering, Changchun University of Technology) ;
  • Wang, Chuhang (College of Computer Science and Technology, Changchun Normal University)
  • Received : 2020.04.28
  • Accepted : 2020.08.03
  • Published : 2021.08.01

Abstract

A trust-aware secure routing protocol (TSRP) for wireless sensor networks is proposed in this paper to defend against varieties of attacks. First, each node calculates the comprehensive trust values of its neighbors based on direct trust value, indirect trust value, volatilization factor, and residual energy to defend against black hole, selective forwarding, wormhole, hello flood, and sinkhole attacks. Second, any source node that needs to send data forwards a routing request packet to its neighbors in multi-path mode, and this continues until the sink at the end is reached. Finally, the sink finds the optimal path based on the path's comprehensive trust values, transmission distance, and hop count by analyzing the received packets. Simulation results show that TSRP has lower network latency, smaller packet loss rate, and lower average network energy consumption than ad hoc on-demand distance vector routing and trust based secure routing protocol.

Keywords

Acknowledgement

"Thirteenth Five-Year" Science and Technology Project of Education Department of Jilin Province, Grant/Award Number: JJKH20181166KJ; Province Development and Reform Commission Project, Grant/Award Number: 2019C054-4

References

  1. Y. Ren et al., A trust-based minimum cost and quality aware data collection scheme in P2P network, Peer-to-Peer Netw. Appl. 13 (2020), 2300-2323, doi: https://doi.org/10.1007/s12083-020-00898-2
  2. Y. Liu et al., ActiveTrust: Secure and trustable routing in wireless sensor networks, IEEE Trans. Inf. Forensics Secur. 11 (2016), 2013-2027. https://doi.org/10.1109/TIFS.2016.2570740
  3. H. Lazrag, R. Saadane, D. Aboutajdine, A game theoretic approach for optimal and secure routing in WSN, in Proc. Int. AfroEur. Conf. Industrial Adv. (Marrakesh, Morocco), Nov. 2016, pp. 218-228.
  4. Y. M. Zhou and L. Y. Li, A trust-aware and location-based secure routing protocol for WSN, Appl. Mechan. Mater. 373-375 (2013), 1931-1934. https://doi.org/10.4028/www.scientific.net/AMM.373-375.1931
  5. M. Al-Shalabi et al., Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm, Inf. Sci. 500 (2019), 259-273. https://doi.org/10.1016/j.ins.2019.05.094
  6. M. Elhoseny et al., Optimizing K-coverage of mobile WSNs, Expert Syst. Appl. 92 (2018), 142-153. https://doi.org/10.1016/j.eswa.2017.09.008
  7. Z. Sun et al., Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks, Appl. Soft Comput. 77 (2019), 366-375. https://doi.org/10.1016/j.asoc.2019.01.034
  8. M. Selvi et al., An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks, Wirel. Pers. Commun. 105 (2019), 1475-1490. https://doi.org/10.1007/s11277-019-06155-x
  9. T. Li et al., Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things, Trans Emerging Telecommun. Technol. (2020), e3956, https://doi.org/10.1002/ett.3956.
  10. L. Yao, F. X. Gao, and L. Cong, Research on static game theory based secure routing algorithm in WSN, Appl. Mechan. Mater. 571-572 (2014), 1030-1036. https://doi.org/10.4028/www.scientific.net/AMM.571-572.1030
  11. G. Zhang et al., Using trust to establish a secure routing model in cognitive radio network, PLoS One 10 (2015), no. 9, e0139326, doi: https://doi.org/10.1371/journal.pone.0139326
  12. P. Gong, T. M. Chen, and Q. Xu, ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks, J. Sensors 2015 (2015), 1-10.
  13. O. Alfarraj, A. A. Alzubi, and A. Tolba, Trust-based neighbor selection using activation function for secure routing in wireless sensor networks, J. Ambient Intell. Humanized Comput. (2018), 1-11, doi: https://doi.org/10.1007/s12652-018-0885-1.
  14. G. Dhand and S. S. Tyagi, SMEER: Secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks, Wirel. Pers. Commun. 105 (2019), 17-35. https://doi.org/10.1007/s11277-018-6101-y
  15. Ahmed et al., Energy-aware and secure routing with trust for disaster response wireless sensor network, Peer-to-peer Netw. Applicat. 10 (2017), 216-237. https://doi.org/10.1007/s12083-015-0421-4
  16. U. S. Kumaran and P. Ilango, Secure authentication and integrity techniques for randomized secured routing in WSN, Wirel. Netw. 21 (2015), 443-451. https://doi.org/10.1007/s11276-014-0792-0
  17. M. Elhoseny et al., A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption, J. King Saud Univ.-Comput. Inf. Sci. Archive 28 (2016), 262-275.
  18. M. Elhoseny et al., An energy efficient encryption method for secure dynamic WSN, Secur. Commun. Netw. 9 (2016), 2024-2031. https://doi.org/10.1002/sec.1459
  19. H. Bashirpour et al., An improved digital signature protocol to multi-user broadcast authentication based on elliptic curve cryptography in wireless sensor networks (WSNs), Math. Comput. Appl. 23 (2018), 1-15.
  20. B. Jiang et al., Trust based energy efficient data collection with unmanned aerial vehicle in edge network, Trans. Emerging Telecommun. Technol. (2020), e3942, doi: https://doi.org/10.1002/ett.3942.
  21. B. Priayoheswari et al., Beta reputation and direct trust model for secure communication in wireless sensor networks, in Proc. Int. Conf. Inf. Analytics (Pondicherry, India), Aug. 2016, 73:1-11, doi: https://doi.org/10.1145/2980258.2980413
  22. D. Airehrour, J. Gutierrez, and S. K. Ray, Gradetrust: A secure trust based routing protocol for MANETs, in Proc. Int. Telecommun. Netw. Appl. Conf. (Sydney, Australia), Nov. 2015. pp. 65-70.
  23. T. Wang et al., A trusted and energy efficient approach for cluster-based wireless sensor networks, Int. J. Distrib. Sensor Netw. 12 (2016), 1-13.
  24. S. Raza et al., Trust based energy preserving routing protocol in multi-hop WSN, in Networked Systems, vol. 9466, Springer, Cham, Switzerland, 2015, pp. 518-523, doi: https://doi.org/10.1007/978-3-319-26850-7_42
  25. D. Qin et al., Research on trust sensing based secure routing mechanism for wireless sensor network, Int. Conf. Commun. 5 (2017), 9599-9609.
  26. A. Ahmed et al., Countering node misbehavior attacks using trust based secure routing protocol, TELKOMNIKA Telecommun. Comput. Electron. Contr. 13 (2015), 260-268.
  27. E. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing, in Proc. IEEE Workshop Mobile Comput. Syst. Appl. (New Orleans, LA, USA), Feb. 1999, pp. 90-100, doi: https://doi.org/10.1109/MCSA.1999.749281.
  28. W. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proc. Annu. Hawaii Int. Conf. Syst. Sci. (Maui, HI, USA), Jan. 2000, pp. 3005-3014.