A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

被引:57
|
作者
Tang, Jiawei [1 ]
Liu, Anfeng [1 ]
Zhang, Jian [1 ]
Xiong, Neal N. [2 ]
Zeng, Zhiwen [1 ]
Wang, Tian [3 ]
机构
[1] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Northeastern State Univ, Dept Math & Comp Sci, Tahlequah, OK 74464 USA
[3] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
wireless energy harvesting networks; security; disjoint routing; marking; network lifetime; DELAY; MARKING; NODES;
D O I
10.3390/s18030751
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.
引用
收藏
页数:43
相关论文
共 50 条
  • [1] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    [J]. 2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [2] Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik
    Seo, Sunho
    Chung, Jong-Moon
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (06) : 1066 - 1069
  • [3] Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach
    Reddy, Yenumula B.
    Selmic, Rastko
    [J]. PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, : 218 - 223
  • [4] Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm
    Han, Youjia
    Hu, Huangshui
    Guo, Yuxin
    [J]. IEEE ACCESS, 2022, 10 : 11538 - 11550
  • [5] A trust-based geographical routing scheme in sensor networks
    Hung, Ka-Shun
    Lui, King-Shan
    Kwok, Yu-Kwong
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3125 - 3129
  • [6] Trust-based secure aggregation in wireless sensor networks
    Hur, Junbeom
    Lee, Yoonho
    Hong, Seongmin
    Yoon, Hyunsoo
    [J]. 3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 1 - 6
  • [7] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39
  • [8] An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks
    Zahedi, Abdulhamid
    Parma, Faryad
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 167 - 176
  • [9] An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks
    Abdulhamid Zahedi
    Faryad Parma
    [J]. Peer-to-Peer Networking and Applications, 2019, 12 : 167 - 176
  • [10] A trust-based routing framework in energy-constrained wireless sensor networks
    Cheng Weifang
    Liao Xiangke
    Shen Changxiang
    Li Shanshan
    Peng Shaoliang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 478 - 489