Abstract
Most of the existing trust-based routing schemes requires the support of promiscuous mode of operation and gathers large number of recommendations from the neighbors for trust derivation. In this paper, we propose a new Two-way Acknowledgement-based Trust framework with individual (2-ACKT-I) acknowledgements which calculates the direct trust using a link layer acknowledgement and a two-hop acknowledgement from a downstream neighbor. The simulation results demonstrate that 2-ACKT-I scheme significantly outperforms the conventional multihop routing schemes and promiscuous mode-based trust scheme in terms of packet delivery ratio and network lifetime.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor Network Security: A Survey. IEEE Communications Surveys & Tutorials 11(2), 52–73 (2009)
Wang, Y., Attebury, G., Ramamurthy, B.: A Survey of Security Issues in Wireless Sensor Networks. IEEE Communication Surveys and Tutorials 8(2), 2–23 (2006)
Yu, Y., Li, K., Zhou, W., Li, P.: Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures. Journal of Network and Computer Applications, 867–880 (2012)
Hoffman, K., Zage, D., Rotaru, C.N.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys 42(1), 1–31 (2009)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Journal on Elsevier’s Ad Hoc Networks, Special Issue on Sensor Network Applications and Protocols 1(2-3), 293–315 (2003)
Momani, M., Challa, S., Alhmouz, R.: Can We Trust Trusted Nodes in Wireless Sensor Networks? In: Proceedings of the International Conference on Computer and Communication Engineering, pp. 1227–1232 (2008)
Ganeriwal, S., Srivatsava, M.B.: Reputation-Based Framework for High Integrity Sensor Networks. In: Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, p. 66 (2004)
Boukerche, A., Li, X., EL-Khatib, K.: Trust-Based Security for Wireless Ad Hoc and Sensor Networks. Computer Comm. 30, 2413–2427 (2007)
Ahmed, R., Jameel, H., d’Auriol, B.J., Lee, H., Lee, S., Song, Y.-J.: Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 20(11), 1698–1712 (2009)
Rahhali, H.A., Ali, I.A., Shaheen, S.I.: A Novel Trust-Based Cross-Layer Model for Wireless Sensor Networks. In: 28th National Radio Science Conference, vol. C5, pp. 1–10 (2011)
Perkin, C.E., Royer, E.M.: Ad Hoc On Demand Distance Vector Routing. In: Second IEEE Workshop on Mobile Computing, Systems and Applications, pp. 90–100 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Anita, X., Manickam, J.M.L., Bhagyaveni, M.A. (2014). Acknowledgement-Based Trust Framework for Wireless Sensor Networks. In: Das, V.V., Elkafrawy, P. (eds) Signal Processing and Information Technology. SPIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 117. Springer, Cham. https://doi.org/10.1007/978-3-319-11629-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-11629-7_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11628-0
Online ISBN: 978-3-319-11629-7
eBook Packages: Computer ScienceComputer Science (R0)