Abstract
For the energy limited wireless sensor networks, the critical problem is how to achieve the energy efficiency. Many attackers can consume the limited network energy, by the method of capturing some legal nodes then control them to start DoS and flooding attack, which is difficult to be detected by only the classic cryptography based techniques with common routing protocols in wireless sensor networks (WSNs). We argue that under the condition of attacking, existing routing schemes are low energy-efficient and vulnerable to inside attack due to their deterministic nature. To avoid the energy consumption caused by the inside attack initiated by the malicious nodes, this paper proposes a novel energy efficiency routing with node compromised resistance (EENC) based on Ant Colony Optimization. Under our design, each node computes the trust value of its 1-hop neighbors based on their multiple behavior attributes evaluation and builds a trust management by the trust value. By this way, sensor nodes act as router to achieve dynamic and adaptive routing, where the node can select much energy efficiency and faithful forwarding node from its neighbors according to their remaining energy and trust values in the next process of data collection. Simulation results indicate that the established routing can bypass most compromised nodes in the transmission path and EENC has high performance in energy efficiency, which can prolong the network lifetime.









Similar content being viewed by others
References
Chen M, Leung V, Mao S, Yuan Y (2007) DGR: directional geographical routing for real-time video communications in wireless sensor networks. Elsevier Comput Commun 30(17):3368–3383
Lin K, Wang L, Li K, Shu L (2010) Multi-attribute data fusion for energy equilibrium routing in wireless sensor networks. KSII Trans Internet Inf Syst 1(1):5–24
Chen M, Leung V, Mao S, Kwon T (2009) RLRR: receiver-oriented load-balancing and reliable routing in in wireless sensor networks. Wirel Commun Mobile Comput 9(3):405–416
Lin K, Chen M, Ge X (2010) Adaptive reliable routing based on cluster hierarchy for wirelessmultimedia sensor networks. EURASIP J Wirel Commun Netw 341–349
Peng M, Xiao Y, Chen H, Hao Q, Vasilakos AV, Wu J (2010) Sensor distribution on coverage in sensor networks. QShine, ID. 567952
Fan Q, Wu Q, Magoules F, Xiong N, Vasilakos AV, He Y (2009) Game and balance multicast architecture algorithms for sensor grid. Sensors 9:7177–7202
Chen M, Kwon T, Yuan Y, Choi Y, Leung V (2007) MADD: mobile-agent-based directed diffusion in wireless sensor networks. EURASIP J Appl Signal Process 2007(1):219–242
Spyropoulos T, Rais R, Turletti T, Obraczka K, Vasilakos AV (2010) Routing for disruption tolerant networks: taxonomy and design. Wirel Netw 16(8):2349–2370
Chen M, Leung V, Mao S, Xiao Y, Chlamtac I (2009) Hybrid geographical routing for flexible energy-delay trade-offs. IEEE Trans Veh Technol 58(9):4976–4988
Chen M, Kwon T, Choi Y (2006) EDDD: energy-efficient differentiated directed diffusion (EDDD) for real-time traffic in wireless sensor networks. Elsevier Comput Commun 29(2):231–245
Chen M, Leung V, Mao S (2009) Directional controlled fusion in wireless sensor networks. Mobile Netw Appl 14(2):220–229
Chen M, Gonzalez S, Leung V (2007) Applications and design issues of mobile agents in wireless sensor networks. Wirel Commun Mag 14(6):20–26
Giridhar A, Kumar PR (2005) Maximizing the functional lifetime of sensor networks. In: Proceedings of the 4th international conference on information processing in sensor networks (IPSN), pp 5–12
Li J, Mohapatra P (2007) Analytical model and mitigation techniques for the energy hole problems in sensor networks. Pervasive Mob Comput 3(8):233–254
Powell O, Leone P, Rolim J (2007) Energy optimal data propagation in wireless sensor networks. J Parallel Distrib Comput 67:302–317
Efthymiou C, Nikoletseas S, Rolim J (2006) Energy balanced data propagation in wireless sensor networks. Wirel Netw 12:691–707
Mhatre V, Rosenberg C (2004) Design guidelines for wireless sensor networks: communication, clustering and aggregation. Ad Hoc Networks 2:45–63
Wood A, Stankovic J (2002) Denial of service in sensor networks. IEEE Comput 35(10):54–62
Douceur J (2002) The sybil attack. In: Proc. of first international workshop on peer-to-peer systems (IPTPS’02). LNCS 2002, vol. 2429. Cambridge, MA, USA, pp 251–260
Hu Y, Perrig A, Johnson U (2002) Wormhole detection in wireless ad hoc networks. Depmenent of Computer Science, Rice University Tech. Rep. TR01-384
Porras P, Fong M, Valdes A (2002) A mission-impact based approach to infosec alarm correlation. In: Proceedings of the 15th international symposium on recent advances in intrusion detection, Zurich, pp 95–114
Blyth A (1999) Footprinting for intrusion detection and threat assessment. Inf Secur Tech Rep 4(3):43–53
Ren K, Lou W, Zhang Y (2006) LEDS: providing location-aware end-to-end data security in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp. 1–12
Yu Z, Guan Y (2006) A dynamic en-route scheme for filtering false data injection in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1–12
Miller MJ, Vaidya NH (2006) Leveraging channel diversity for key establishment in wireless sensor networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings, pp 1–12
Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communication security, pp 41–47
Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. IEEE Comput Soc 197–213
Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM conf. on computer and communications security. ACM Press, New York, pp 52–61
Camtepe S, Yener B (2004) Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Proc. of the computer securityDESORICS. Springer, Berlin, pp 293–308
Zhang Y, Liu W, Lou W, Fang Y (2006) Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J Sel Areas Commun 24(2):247–260
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2–3):293-315
Perrig A, Szewczyk R, Tygar JD, Wen V, Culler D (2002) SPINS: security protocols for sensor networks. Wirel Netw 8(5):521–534
Dhurandher K, Misra S, Obaidat M, Gupta N (2009) An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Secur Commun Netw 2(2):215–224
Ye F, Luo H, Lu S, Zhang L (2005) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Areas Commun 23(4):839–850
Lee PC, Misra V, Rubenstein D (2007) Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Trans Netw 15(6):1490–1501
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lin, K., Lai, CF., Liu, X. et al. Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks. Mobile Netw Appl 17, 75–89 (2012). https://doi.org/10.1007/s11036-010-0287-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-010-0287-x