Skip to main content
Log in

Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The trust routing protocol is an important way to solve the security of wireless sensor networks. In previous work, nodes’ trust evaluation granularity is coarse, and routing trust evaluation model is relatively insufficient. In this paper, we propose a high-reliability trust evaluation model for secure routing based on combination inside states of a node with outside interaction behaviors between nodes. Firstly, we leverage a Markov chain prediction model with inside four states to assess trust degree of a routing node. The abnormal node could be found through changes of node power, traffic, response time and network delay. However, a compromised routing node self can change its inside states, so we explore the interaction behaviors between nodes to find abnormal nodes and use an improved Bayesian model to calculate the trust degree of nodes. Finally, this paper proposes a novel trust routing working principle based on a fine-grained trust model. NS2 (Network Simulator version 2) results show that our routing trust evaluation scheme can effectively identify the abnormal and malicious nodes, and reduce the harm caused by malicious nodes to wireless sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abbas NI, Ilkan M (2015) Fuzzy approach to improving route stability of the aodv routing protocol. EURASIP J Wirel Commun Netw 2015(1):1–11

    Google Scholar 

  2. Ahmed A, Bakar KA, Channa MI, Khan AW, Haseeb K (2017) Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Networking and Applications 14(4):1–22

    Google Scholar 

  3. Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible ehr sharing in mobile health cloud under static assumptions. Clust Comput 20(3):1–8

    Article  Google Scholar 

  4. Chen Wang Jian Shen QLYR, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Security and Communication Networks 2018: Article ID 3680851

  5. Dhananjayan G, Subbiah J (2016) T2ar: trust-aware ad-hoc routing protocol for manet. SpringerPlus 5 (1):1–16

    Article  Google Scholar 

  6. Eissa T, Razak SA, Khokhar RH, Samian N (2013) Trust-based routing mechanism in manet: design and implementation. Mobile Networks and Applications 18(5):666–677

    Article  Google Scholar 

  7. Estrin D (2002) Tutorial wireless sensor networks part iv: Sensor network protocols. mobicom2002. In: The eight annual international conference on mobile computing and networking atlanta. ACM, Georgia, pp 140–147

  8. Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, pp 66–77

  9. Gao CZ, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inform Sci 444:72–88

    Article  MathSciNet  Google Scholar 

  10. Halim ITA, Fahmy HM, El-Din AMB, El-Shafey MH (2010) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. In: 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–8

  11. Han T, Luo S, Zhu H, Xin Y, Peng Y (2013) A novel trust evaluation model based on grey clustering theory for routing networks. J Comput 8(11):2743–2749

    Article  Google Scholar 

  12. Han Ting LS (2013) Study on security routing algorithm based on dynamic adjacent trust. J Commun 6:191–200

    Google Scholar 

  13. Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inform Sci s 412C413:223–241

    Article  Google Scholar 

  14. Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access 6:1–1

    Article  Google Scholar 

  15. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501

    Article  Google Scholar 

  16. Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96

    Article  Google Scholar 

  17. Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26

    Article  Google Scholar 

  18. Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232

    Article  Google Scholar 

  19. Li Ji LJ (2006) The research on securitym echanism based on aodv routing protocol in mobile ad hoc network. J Electron 2:272–276

    Google Scholar 

  20. Peng S, Jia W, Wang G (2008) Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In: IEEE/IFIP international conference on embedded and ubiquitous computing, 2008. EUC’08, vol. 2. IEEE, pp 3–9

  21. Peng S, Yang A, Cao L, Yu S, Xie D (2016) Social influence modeling using information theory in mobile social networks. Inf Sci 379:146–159

    Article  Google Scholar 

  22. Qian Zhihong WY (2013) Internet of things-oriented wireless sensor networks review. J Electron Inf Technol 1:215–227

    Google Scholar 

  23. Qiang L, Xiaohong H, Supeng L, Longjiang L, Yuming M (2011) Deployment strategy of wireless sensor networks for internet of things. China Commun 8(8):111–120

    Google Scholar 

  24. RahimiZadeh K, Kabiri P (2014) Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks. Secur Commun Netw 7(11):1746–1763

    Article  Google Scholar 

  25. Rathnamma MV, Reddy PC (2017) A power efficient trust based securerouting scheme for mobile ad-hoc networks. Int J Soft Comput 12(4):247–252

    Google Scholar 

  26. Salehi M, Boukerche A, Darehshoorzadeh A (2016) Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw 50:88–101

    Article  Google Scholar 

  27. Sethuraman P, Kannan N (2016) Refined trust energy-ad hoc on demand distance vector (rete-aodv) routing algorithm for secured routing in manet. Wirel Netw 23(7):1–11

    Google Scholar 

  28. Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123

    Article  Google Scholar 

  29. Vaseer G, Ghai G, Patheja PS (2017) A novel intrusion detection algorithm: an aodv routing protocol case study. In: IEEE international symposium on nanoelectronic and information systems, pp 111–116

  30. Venkanna U, Agarwal JK, Velusamy RL (2015) A cooperative routing for manet based on distributed trust and energy management. Wirel Pers Commun 81(3):961–979

    Article  Google Scholar 

  31. Yadav S, Trivedi MC, Singh VK, Kolhe ML (2017) Securing aodv routing protocol against black hole attack in manet using outlier detection scheme. In: IEEE Uttar Pradesh section international conference on electrical, computer and electronics, pp 1–4

  32. Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99

    Article  Google Scholar 

  33. Zhang F, Jia ZP, Xia H, Li X, Edwin HMS (2012) Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov scgm (1, 1) model. Comput Commun 35(5):589–596

    Article  Google Scholar 

  34. Zhang G, Chen Z, Tian L, Zhang D (2015) Using trust to establish a secure routing model in cognitive radio network. Plos One 10(9):e0139326

    Article  Google Scholar 

  35. Zhang X, Tan YA, Liang C, Li Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access PP(99):1–1

    Article  Google Scholar 

  36. Zhang X, Yang Z, Liu Y, Li J, Ming Z (2017) Toward efficient mechanisms for mobile crowdsensing. IEEE Trans Veh Technol 66(2):1760–1771

    Article  Google Scholar 

Download references

Acknowledgments

Our work was supported by the General Project of Tianjin Municipal Science and Technology Commission under Grant(No.15JCYBJC15600), the Major Project of Tianjin Municipal Science and Technology Commission under Grant(No.15ZXDSGX00030), and NSFC:The United Foundation of General Technology and Fundamental Research (No.U1536122). The authors would like to give thanks to all the pioneers in this field, and also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chundong Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gong, L., Wang, C., Yang, H. et al. Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks. Mobile Netw Appl 26, 2515–2524 (2021). https://doi.org/10.1007/s11036-018-1106-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1106-z

Keywords

Navigation