Skip to main content

A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 4138))

Abstract

As wireless sensor networks continue to grow, so does the need for effective security mechanisms. The classical mechanisms, namely authentication and encryption, can prevent some outsider attacks; however, these mechanisms are inefficient in detecting selective forwarding attacks on compromised nodes. On the basis of these observations, we build a trust model to evaluate nodes behavior. Based on the trust model, a routing framework, TRUSTEE, is further proposed for secure routing. TRUSTEE provides a flexible and feasible approach to evaluate routes’ quality and chooses route that best meets the security requirements. Keeping into mind the critical resource constraint nature of sensor network, we do not adopt the energy-consuming monitoring and trust recommendations mechanisms. Simulation and analysis verify TRUSTEE’s performance, it not only minimizes resource consumption but also can prevent most outsider attacks, defend selective forwarding attacks and thus significantly increase the network throughput.

Supported by the National High-Tech Research and Development Program of China (Grant No. 2005AA121570, 2002AA1Z2101 and 2003AA1Z2060).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shi, E., Perrig, A.: Designing Secure Sensor Networks. Wireless Networks Journal (December 2004)

    Google Scholar 

  2. Karlof, C., Wagner, D.: Secure Routing in Sensor Networks: Attacks and Countermeasures. Elsevier AdHoc Networks journal (May 2003)

    Google Scholar 

  3. Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM (2004)

    Google Scholar 

  4. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: Proceedings of IPTPS (March 2002)

    Google Scholar 

  5. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (September 2002)

    Google Scholar 

  6. Karlof, C., Sastry, N., Wagner, D.: TinySec: Link Layer Encryption for Tiny Devices. In: Proceedings of ACM SenSys (2004)

    Google Scholar 

  7. Deng, J., Han, R., Mishra, S.: The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In: The Proceedings of IPSN (April 2003)

    Google Scholar 

  8. Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology. In: Second workshop on Security in Sensor and Ad-hoc Networks (2004)

    Google Scholar 

  9. Eschenauer, L., Gligor, V.D.: A Key Management Scheme for Distributed Sensor Networks. In: Proceedings of ACM CCS (November 2002)

    Google Scholar 

  10. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of IEEE Symposium on Security and Privacy (2003)

    Google Scholar 

  11. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of ACM CCS (October 2003)

    Google Scholar 

  12. Tanachaiwiwat, S., Dave, P., Bhindwale, R., Helmy, A.: Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. In: IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN 2004), in conjunction with IEEE IPCCC (April 2004)

    Google Scholar 

  13. Ganeriwal, S., Srivastava, M.: Reputation-based Framework for High Integrity Sensor Networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (2004)

    Google Scholar 

  14. AbuGhazaleh, N., Don Kang, K., Liu, K.: Towards Resilient Geographic Routing in WSNs. In: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, Montreal, Quebec, Canada, vol. 10, pp. 71–78 (2005)

    Google Scholar 

  15. Yan, Z., Zhang, P., Virtanen, T.: Trust Evaluation Based Security Solution in Ad Hoc Networks. In: Proceedings of the Seventh Nordic Workshop on Secure IT Systems (2003)

    Google Scholar 

  16. Ren, K., Li, T., Wan, Z., Bao, F., Deng, R.H., Kim, K.: Highly Reliable Trust Establishment Scheme in Ad Hoc Networks. Computer Networks: The International Journal of Computer and Telecommunications Networking 45, 687–699 (2004)

    MATH  Google Scholar 

  17. Liu, Z.Y., Joy, A.W., Thompson, R.A., Thompson, R.A.: A dynamic Trust Model for Mobile Ad Hoc Networks. In: The 10th IEEE Intl.Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), May 2004, pp. 80–85 (2004)

    Google Scholar 

  18. Rebahi, Y., Vicente, E., Mujica, V., Sisalem, D.: A Reputation-Based Trust Mechanism for Ad Hoc Networks. In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), June 27-30 (2005)

    Google Scholar 

  19. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. ACM MobiCOM (August 2000)

    Google Scholar 

  20. Ye, W., Heidemann, J., Estrin, D.: An Energy-Efficient MAC Protocol for Wireless Sensor Networks. In: Proc 21st Int’1 Annual Joint Conf IEEE Computer and Communication Societies(INFOCOM 2002), New York, (June 2002)

    Google Scholar 

  21. Van Dam, T., Langendoen, K.: An adaptive energy-efficient MAC protocol Wireless Sensor Networks. In: Proc 1st Int’1 Conf on Embedded Networked Sensor Systems (SenSys), Los Angeles, CA, November 5-7 (2003)

    Google Scholar 

  22. IEEE Computer Society LAN MAN Standards Committee. IEEE Std 802.11-1999, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification (1999)

    Google Scholar 

  23. Shah, R.C., Rabaey, J.: Energy Aware Routing for Low Energy Ad Hoc Sensor Networks. In: IEEE Wireless Communications and Networking Conference (WCNC), Orlando, FL, March 17-21 (2002)

    Google Scholar 

  24. Yu, Y., Govindan, R., Estrin, D.: Geographical and Energy Aware Routing: A recursive Data Dissemination Protocol for Wireless Sensor Networks. Technical Report UCLA/CSD-TR-01-0023, UCLA, Department of Computer Science (May 2001)

    Google Scholar 

  25. Bell, D., LaPadula, L.: Secure Computer Systems: Mathematical Foundations and Model, Technical Report MTR 2547 v2, MITRE (November 1973)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weifang, C., Xiangke, L., Changxiang, S., Shanshan, L., Shaoliang, P. (2006). A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks. In: Cheng, X., Li, W., Znati, T. (eds) Wireless Algorithms, Systems, and Applications. WASA 2006. Lecture Notes in Computer Science, vol 4138. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814856_46

Download citation

  • DOI: https://doi.org/10.1007/11814856_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37189-2

  • Online ISBN: 978-3-540-37190-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics