Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

被引:41
|
作者
Mahmoud, Mohamed M. E. A. [2 ]
Lin, Xiaodong [3 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Ctr Wireless Commun, Waterloo, ON N2L 3G1, Canada
[2] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[3] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON L1H7K4, Canada
关键词
Securing heterogeneous multihop wireless networks; packet dropping and selfishness attacks; trust systems; secure routing protocols; TRUST MANAGEMENT; SYSTEM;
D O I
10.1109/TPDS.2013.138
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose E-STAR for establishing stable and reliable routes in heterogeneous multihop wireless networks. E-STAR combines payment and trust systems with a trust-based and energy-aware routing protocol. The payment system rewards the nodes that relay others' packets and charges those that send packets. The trust system evaluates the nodes' competence and reliability in relaying packets in terms of multi-dimensional trust values. The trust values are attached to the nodes' public-key certificates to be used in making routing decisions. We develop two routing protocols to direct traffic through those highly-trusted nodes having sufficient energy to minimize the probability of breaking the route. By this way, E-STAR can stimulate the nodes not only to relay packets, but also to maintain route stability and report correct battery energy capability. This is because any loss of trust will result in loss of future earnings. Moreover, for the efficient implementation of the trust system, the trust values are computed by processing the payment receipts. Analytical results demonstrate that E-STAR can secure the payment and trust calculation without false accusations. Simulation results demonstrate that our routing protocols can improve the packet delivery ratio and route stability.
引用
收藏
页码:1140 / 1153
页数:14
相关论文
共 50 条
  • [1] Secure, Reliable and Load Balanced Routing Protocols for Multihop Wireless Networks
    Patil, Mitali, V
    Jadhav, Vaishali
    [J]. PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [2] On Modeling Optimizations and Enhancing Routing Protocols for Wireless Multihop Networks
    Al-Zahrani, Fahad Ahmad
    [J]. IEEE ACCESS, 2020, 8 : 68953 - 68973
  • [3] Modeling and Simulation of Multihop Routing Protocols in Wireless Sensor Networks
    Kacso, Adrian Fr.
    Wismueller, Roland
    [J]. ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 296 - 302
  • [4] A Secure and Reliable Routing Protocol for Wireless Mesh Networks
    黄仁俊
    萧宇凯
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 466 - 475
  • [5] A secure and reliable routing protocol for wireless mesh networks
    Hwang R.-J.
    Hsiao Y.-K.
    [J]. Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) : 466 - 475
  • [6] Secure anonymous routing in clustered multihop wireless ad hoc networks
    Qian, Lijun
    Song, Ning
    Li, Xiangfang
    [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 1629 - 1634
  • [7] Secure and reliable connectivity in heterogeneous wireless sensor networks
    Eletreby, Rashad
    Yagan, Osman
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2880 - 2884
  • [8] A Survey on Conventional and Secure Routing Protocols in Wireless Sensor Networks
    Sreenivasulu, A. L.
    Reddy, P. Chenna
    [J]. INNOVATIONS IN ELECTRONICS AND COMMUNICATION ENGINEERING, 2019, 33 : 467 - 478
  • [9] Reliable and Energy Aware Routing Protocols for Wireless Sensor Networks
    Treplan, Gergely
    Tran-Thanh, Long
    Olah, Andras
    Levendovszky, Janos
    [J]. 2009 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2009, : 171 - +
  • [10] Secure Implementation Of Routing Protocols For Wireless Ad Hoc Networks
    Amutha, S.
    Balasubramanian, Kannan
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 960 - 965