Abstract
The trust routing protocol is an important way to solve the security of wireless sensor networks. In previous work, nodes’ trust evaluation granularity is coarse, and routing trust evaluation model is relatively insufficient. In this paper, we propose a high-reliability trust evaluation model for secure routing based on combination inside states of a node with outside interaction behaviors between nodes. Firstly, we leverage a Markov chain prediction model with inside four states to assess trust degree of a routing node. The abnormal node could be found through changes of node power, traffic, response time and network delay. However, a compromised routing node self can change its inside states, so we explore the interaction behaviors between nodes to find abnormal nodes and use an improved Bayesian model to calculate the trust degree of nodes. Finally, this paper proposes a novel trust routing working principle based on a fine-grained trust model. NS2 (Network Simulator version 2) results show that our routing trust evaluation scheme can effectively identify the abnormal and malicious nodes, and reduce the harm caused by malicious nodes to wireless sensor networks.













Similar content being viewed by others
References
Abbas NI, Ilkan M (2015) Fuzzy approach to improving route stability of the aodv routing protocol. EURASIP J Wirel Commun Netw 2015(1):1–11
Ahmed A, Bakar KA, Channa MI, Khan AW, Haseeb K (2017) Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Networking and Applications 14(4):1–22
Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible ehr sharing in mobile health cloud under static assumptions. Clust Comput 20(3):1–8
Chen Wang Jian Shen QLYR, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things. Security and Communication Networks 2018: Article ID 3680851
Dhananjayan G, Subbiah J (2016) T2ar: trust-aware ad-hoc routing protocol for manet. SpringerPlus 5 (1):1–16
Eissa T, Razak SA, Khokhar RH, Samian N (2013) Trust-based routing mechanism in manet: design and implementation. Mobile Networks and Applications 18(5):666–677
Estrin D (2002) Tutorial wireless sensor networks part iv: Sensor network protocols. mobicom2002. In: The eight annual international conference on mobile computing and networking atlanta. ACM, Georgia, pp 140–147
Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, pp 66–77
Gao CZ, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inform Sci 444:72–88
Halim ITA, Fahmy HM, El-Din AMB, El-Shafey MH (2010) Agent-based trusted on-demand routing protocol for mobile ad-hoc networks. In: 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–8
Han T, Luo S, Zhu H, Xin Y, Peng Y (2013) A novel trust evaluation model based on grey clustering theory for routing networks. J Comput 8(11):2743–2749
Han Ting LS (2013) Study on security routing algorithm based on dynamic adjacent trust. J Commun 6:191–200
Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inform Sci s 412C413:223–241
Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot. IEEE Access 6:1–1
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501
Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96
Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26
Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232
Li Ji LJ (2006) The research on securitym echanism based on aodv routing protocol in mobile ad hoc network. J Electron 2:272–276
Peng S, Jia W, Wang G (2008) Voting-based clustering algorithm with subjective trust and stability in mobile ad hoc networks. In: IEEE/IFIP international conference on embedded and ubiquitous computing, 2008. EUC’08, vol. 2. IEEE, pp 3–9
Peng S, Yang A, Cao L, Yu S, Xie D (2016) Social influence modeling using information theory in mobile social networks. Inf Sci 379:146–159
Qian Zhihong WY (2013) Internet of things-oriented wireless sensor networks review. J Electron Inf Technol 1:215–227
Qiang L, Xiaohong H, Supeng L, Longjiang L, Yuming M (2011) Deployment strategy of wireless sensor networks for internet of things. China Commun 8(8):111–120
RahimiZadeh K, Kabiri P (2014) Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks. Secur Commun Netw 7(11):1746–1763
Rathnamma MV, Reddy PC (2017) A power efficient trust based securerouting scheme for mobile ad-hoc networks. Int J Soft Comput 12(4):247–252
Salehi M, Boukerche A, Darehshoorzadeh A (2016) Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks. Ad Hoc Netw 50:88–101
Sethuraman P, Kannan N (2016) Refined trust energy-ad hoc on demand distance vector (rete-aodv) routing algorithm for secured routing in manet. Wirel Netw 23(7):1–11
Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123
Vaseer G, Ghai G, Patheja PS (2017) A novel intrusion detection algorithm: an aodv routing protocol case study. In: IEEE international symposium on nanoelectronic and information systems, pp 111–116
Venkanna U, Agarwal JK, Velusamy RL (2015) A cooperative routing for manet based on distributed trust and energy management. Wirel Pers Commun 81(3):961–979
Yadav S, Trivedi MC, Singh VK, Kolhe ML (2017) Securing aodv routing protocol against black hole attack in manet using outlier detection scheme. In: IEEE Uttar Pradesh section international conference on electrical, computer and electronics, pp 1–4
Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99
Zhang F, Jia ZP, Xia H, Li X, Edwin HMS (2012) Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov scgm (1, 1) model. Comput Commun 35(5):589–596
Zhang G, Chen Z, Tian L, Zhang D (2015) Using trust to establish a secure routing model in cognitive radio network. Plos One 10(9):e0139326
Zhang X, Tan YA, Liang C, Li Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access PP(99):1–1
Zhang X, Yang Z, Liu Y, Li J, Ming Z (2017) Toward efficient mechanisms for mobile crowdsensing. IEEE Trans Veh Technol 66(2):1760–1771
Acknowledgments
Our work was supported by the General Project of Tianjin Municipal Science and Technology Commission under Grant(No.15JCYBJC15600), the Major Project of Tianjin Municipal Science and Technology Commission under Grant(No.15ZXDSGX00030), and NSFC:The United Foundation of General Technology and Fundamental Research (No.U1536122). The authors would like to give thanks to all the pioneers in this field, and also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gong, L., Wang, C., Yang, H. et al. Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks. Mobile Netw Appl 26, 2515–2524 (2021). https://doi.org/10.1007/s11036-018-1106-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1106-z