Skip to main content

Advertisement

Log in

Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

For the energy limited wireless sensor networks, the critical problem is how to achieve the energy efficiency. Many attackers can consume the limited network energy, by the method of capturing some legal nodes then control them to start DoS and flooding attack, which is difficult to be detected by only the classic cryptography based techniques with common routing protocols in wireless sensor networks (WSNs). We argue that under the condition of attacking, existing routing schemes are low energy-efficient and vulnerable to inside attack due to their deterministic nature. To avoid the energy consumption caused by the inside attack initiated by the malicious nodes, this paper proposes a novel energy efficiency routing with node compromised resistance (EENC) based on Ant Colony Optimization. Under our design, each node computes the trust value of its 1-hop neighbors based on their multiple behavior attributes evaluation and builds a trust management by the trust value. By this way, sensor nodes act as router to achieve dynamic and adaptive routing, where the node can select much energy efficiency and faithful forwarding node from its neighbors according to their remaining energy and trust values in the next process of data collection. Simulation results indicate that the established routing can bypass most compromised nodes in the transmission path and EENC has high performance in energy efficiency, which can prolong the network lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Chen M, Leung V, Mao S, Yuan Y (2007) DGR: directional geographical routing for real-time video communications in wireless sensor networks. Elsevier Comput Commun 30(17):3368–3383

    Google Scholar 

  2. Lin K, Wang L, Li K, Shu L (2010) Multi-attribute data fusion for energy equilibrium routing in wireless sensor networks. KSII Trans Internet Inf Syst 1(1):5–24

    Article  Google Scholar 

  3. Chen M, Leung V, Mao S, Kwon T (2009) RLRR: receiver-oriented load-balancing and reliable routing in in wireless sensor networks. Wirel Commun Mobile Comput 9(3):405–416

    Article  Google Scholar 

  4. Lin K, Chen M, Ge X (2010) Adaptive reliable routing based on cluster hierarchy for wirelessmultimedia sensor networks. EURASIP J Wirel Commun Netw 341–349

  5. Peng M, Xiao Y, Chen H, Hao Q, Vasilakos AV, Wu J (2010) Sensor distribution on coverage in sensor networks. QShine, ID. 567952

  6. Fan Q, Wu Q, Magoules F, Xiong N, Vasilakos AV, He Y (2009) Game and balance multicast architecture algorithms for sensor grid. Sensors 9:7177–7202

    Article  Google Scholar 

  7. Chen M, Kwon T, Yuan Y, Choi Y, Leung V (2007) MADD: mobile-agent-based directed diffusion in wireless sensor networks. EURASIP J Appl Signal Process 2007(1):219–242

    Google Scholar 

  8. Spyropoulos T, Rais R, Turletti T, Obraczka K, Vasilakos AV (2010) Routing for disruption tolerant networks: taxonomy and design. Wirel Netw 16(8):2349–2370

    Article  Google Scholar 

  9. Chen M, Leung V, Mao S, Xiao Y, Chlamtac I (2009) Hybrid geographical routing for flexible energy-delay trade-offs. IEEE Trans Veh Technol 58(9):4976–4988

    Article  Google Scholar 

  10. Chen M, Kwon T, Choi Y (2006) EDDD: energy-efficient differentiated directed diffusion (EDDD) for real-time traffic in wireless sensor networks. Elsevier Comput Commun 29(2):231–245

    Google Scholar 

  11. Chen M, Leung V, Mao S (2009) Directional controlled fusion in wireless sensor networks. Mobile Netw Appl 14(2):220–229

    Article  Google Scholar 

  12. Chen M, Gonzalez S, Leung V (2007) Applications and design issues of mobile agents in wireless sensor networks. Wirel Commun Mag 14(6):20–26

    Article  Google Scholar 

  13. Giridhar A, Kumar PR (2005) Maximizing the functional lifetime of sensor networks. In: Proceedings of the 4th international conference on information processing in sensor networks (IPSN), pp 5–12

  14. Li J, Mohapatra P (2007) Analytical model and mitigation techniques for the energy hole problems in sensor networks. Pervasive Mob Comput 3(8):233–254

    Article  Google Scholar 

  15. Powell O, Leone P, Rolim J (2007) Energy optimal data propagation in wireless sensor networks. J Parallel Distrib Comput 67:302–317

    Article  MATH  Google Scholar 

  16. Efthymiou C, Nikoletseas S, Rolim J (2006) Energy balanced data propagation in wireless sensor networks. Wirel Netw 12:691–707

    Article  Google Scholar 

  17. Mhatre V, Rosenberg C (2004) Design guidelines for wireless sensor networks: communication, clustering and aggregation. Ad Hoc Networks 2:45–63

    Article  Google Scholar 

  18. Wood A, Stankovic J (2002) Denial of service in sensor networks. IEEE Comput 35(10):54–62

    Article  Google Scholar 

  19. Douceur J (2002) The sybil attack. In: Proc. of first international workshop on peer-to-peer systems (IPTPS’02). LNCS 2002, vol. 2429. Cambridge, MA, USA, pp 251–260

  20. Hu Y, Perrig A, Johnson U (2002) Wormhole detection in wireless ad hoc networks. Depmenent of Computer Science, Rice University Tech. Rep. TR01-384

  21. Porras P, Fong M, Valdes A (2002) A mission-impact based approach to infosec alarm correlation. In: Proceedings of the 15th international symposium on recent advances in intrusion detection, Zurich, pp 95–114

  22. Blyth A (1999) Footprinting for intrusion detection and threat assessment. Inf Secur Tech Rep 4(3):43–53

    Article  Google Scholar 

  23. Ren K, Lou W, Zhang Y (2006) LEDS: providing location-aware end-to-end data security in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp. 1–12

  24. Yu Z, Guan Y (2006) A dynamic en-route scheme for filtering false data injection in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1–12

  25. Miller MJ, Vaidya NH (2006) Leveraging channel diversity for key establishment in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1–12

  26. Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communication security, pp 41–47

  27. Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. IEEE Comput Soc 197–213

  28. Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM conf. on computer and communications security. ACM Press, New York, pp 52–61

    Google Scholar 

  29. Camtepe S, Yener B (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Proc. of the computer securityDESORICS. Springer, Berlin, pp 293–308

    Google Scholar 

  30. Zhang Y, Liu W, Lou W, Fang Y (2006) Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J Sel Areas Commun 24(2):247–260

    Article  Google Scholar 

  31. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2–3):293-315

    Article  Google Scholar 

  32. Perrig A, Szewczyk R, Tygar JD, Wen V, Culler D (2002) SPINS: security protocols for sensor networks. Wirel Netw 8(5):521–534

    Article  MATH  Google Scholar 

  33. Dhurandher K, Misra S, Obaidat M, Gupta N (2009) An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Secur Commun Netw 2(2):215–224

    Article  Google Scholar 

  34. Ye F, Luo H, Lu S, Zhang L (2005) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Areas Commun 23(4):839–850

    Article  Google Scholar 

  35. Lee PC, Misra V, Rubenstein D (2007) Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Trans Netw 15(6):1490–1501

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kai Lin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lin, K., Lai, CF., Liu, X. et al. Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks. Mobile Netw Appl 17, 75–89 (2012). https://doi.org/10.1007/s11036-010-0287-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-010-0287-x

Keywords