Skip to main content

Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Abstract

Compared to conventional Wireless Sensor Networks (WSNs), Software-Defined WSNs (SD-WSNs) introduce the software defined networking (SDN) paradigm to offer more adaptivity, flexibility and scalability. Research on reliable and trusted routing for SD-WSNs is a fundamental but very challenging task due to their unstable wireless connectivity, low security assurance and diverse inner adversaries. Hence, we propose a trusted link-separation multipath selection method for SD-WSNs in adversarial environments by jointly considering routing efficiency and security. Specifically, we introduce a Bayesian model to evaluate the nodes’ trustworthiness based on their communication behaviors. After that, we formulate the trusted link-separation multipath selection as a multi-objective optimization problem. Then, we generate k trusted link-separation paths by solving the optimization problem using a greedy algorithm. Comparative experiments using six different topologies, including three random networks (Waxman, ER random graphs, and WS small-world topologies) and three real ones (Cernet, Bandcon, and DFN), validate the superior performance of the proposed method compared with the delay-first and the trust-first baseline routing schemes.

The corresponding author of this paper is Qiang Liu. The work is supported by National Key Research and Development Program of China (No. 2018YFB0204301), National Natural Science Foundation of China (No. 61702539 and U1811462), Hunan Provincial Natural Science Foundation of China (No. 2018JJ3611), and NUDT Research Project (No. ZK-18-03-47).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Access URL: http://www.topology-zoo.org/files/Cernet.gml.

  2. 2.

    Access URL: http://www.topology-zoo.org/files/Bandcon.gml.

  3. 3.

    Access URL: http://www.topology-zoo.org/files/Dfn.gml.

References

  1. Alrawi, O., Lever, C., Antonakakis, M., Monrose, F.: Sok: Security evaluation of home-based iot deployments. In: 2019 IEEE Symposium on Security and Privacy (SP). pp. 1362–1380, IEEE (2019)

    Google Scholar 

  2. Baranov, N., Bashkin, V., Bashkin, M.: A lightweight cryptographic scheme of route hiding for the on-demand route discovery algorithms. In: 2018 7th Mediterranean Conference on Embedded Computing (MECO). pp. 1–4, IEEE (2018)

    Google Scholar 

  3. Boychev, I.Z.: Research algorithms to optimize the drone route used for security. In: 2018 IEEE XXVII International Scientific Conference Electronics-ET. pp. 1–4, IEEE (2018)

    Google Scholar 

  4. Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surveys Tuts. 13(4), 562–583 (2010)

    Article  Google Scholar 

  5. Duan, J., Wang, Z., Wu, C.: Responsive multipath tcp in sdn-based datacenters. In: IEEE International Conference on Communications (2015)

    Google Scholar 

  6. Javed, M., Zeadally, S.: Repguide: Reputation-based route guidance using internet of vehicles. IEEE Commun. Mag. 2(4), 81–87 (2018)

    Google Scholar 

  7. Koerner, M., Kao, O.: Evaluating sdn based rack-to-rack multi-path switching for data-center networks. Procedia Comput. Sci. 34, 118–125 (2014)

    Article  Google Scholar 

  8. Vinoth Kumar, V., Ramamoorthy, S.: Secure adhoc on-demand multipath distance vector routing in MANET. In: Mandal, J.K., Saha, G., Kandar, D., Maji, A.K. (eds.) Proceedings of the International Conference on Computing and Communication Systems. LNNS, vol. 24, pp. 49–63. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-6890-4_5

    Chapter  Google Scholar 

  9. Liu, K.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305–317 (2006)

    Article  Google Scholar 

  10. Luckie, M., Beverly, R., Koga, R., Keys, K., Kroll, J.A., claffy, k.: Network hygiene, incentives, and regulation: Deployment of source address validation in the internet. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. pp. 465–480 (2019)

    Google Scholar 

  11. Meng, Y., Li, W., Kwok, L.: Evaluation of detecting malicious nodes using bayesian model in wireless intrusion detection. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 40–53. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38631-2_4

    Chapter  Google Scholar 

  12. Paasch, C., Ferlin, S., Alay, O., Bonaventure, O.: Experimental evaluation of multipath tcp schedulers. In: Proceedings of the 2014 ACM SIGCOMM workshop on Capacity sharing workshop. pp. 27–32, ACM (2014)

    Google Scholar 

  13. Rajeswari, A.R., Kulothungan, K., Ganapathy, S., Kannan, A.: A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer Peer Netw. Appl. 12(5), 1076–1096 (2019). https://doi.org/10.1007/s12083-019-00766-8

    Article  Google Scholar 

  14. Shin, D., Yun, K., Kim, J., Astillo, P.V., Kim, J.N., You, I.: A security protocol for route optimization in dmm-based smart home iot networks. IEEE Access 7, 142531–142550 (2019)

    Article  Google Scholar 

  15. Sommer, R., Paxson, V.: Outside the closed world: On using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy (2010)

    Google Scholar 

  16. Valente, J., Wynn, M.A., Cardenas, A.A.: Stealing, spying, and abusing: consequences of attacks on internet of things devices. IEEE Secur. Priv. 17(5), 10–21 (2019)

    Article  Google Scholar 

  17. Wang, X.: Study on the Technology and Prototype of Software-Defined Mobile Ad-Hoc Networking. Ph.D. thesis, Nanjing University of Posts and Telecommunications (2015)

    Google Scholar 

  18. Zhang, T., Yan, L., Yang, Y.: Trust evaluation method for clustered wireless sensor networks based on cloud model. Wirel. Netw. 24(3), 777–797 (2016). https://doi.org/10.1007/s11276-016-1368-y

    Article  Google Scholar 

  19. Zhao, P., Zhao, W., Liu, Q.: Multi-objective link-separation multipath selection using k max-min for software-defined manets. In: Proceedings of the 15th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2019). pp. 259–264, IEEE (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, P., Zhao, W., Liu, Q., Wang, A. (2020). Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics