Abstract
The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehavior attacks. Recently, trust based solutions have proved to be more effective to address nodes’ misbehavior attacks. Apart from isolating misbehaving nodes, the existing trust based schemes lacks the capability to minimize link failure notifications due to transient transmission disruption which consequently give rise to frequent route breakages thereby undermining throughput and route stability. Moreover, the existing solutions give rise to high energy consumption and control overhead in pursuit of trust estimation and network-wide dissemination which not only adds to network congestion but also undermines network lifetime. In this paper, we present a Trust and Energy aware Routing Protocol (TERP) that makes use of a distributed trust model for the detection and isolation of misbehaving nodes. TERP incorporates a composite routing function that encompasses trust, residual-energy, and hop count of neighbor nodes in making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Moreover, TERP intelligently evaluates the actual link breakage thereby avoiding unnecessary route discoveries. Simulation results demonstrate improved throughput, network lifetime and route stability of TERP when compared to existing work.
Similar content being viewed by others
References
Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175–192. doi:10.1016/S1570-8705(03)00019-2.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38. doi:10.1007/s11276-004-4744-y.
Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510. doi:10.1002/ett.2635.
Momani, M., & Challa, S. (2010). Survey of trust Models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(3), 1–19.
Das, M. L. (2009). Two-factor user Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 1–14. doi:10.1155/2014/209436.
Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140. doi:10.1016/j.entcs.2007.12.022.
Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298. doi:10.1109/SURV.2011.042711.00083.
Ishmanov, F., Malik, A. S., Kim, S. W., & Begalov, B. (2013). Trust management system in wireless sensor networks: Design considerations and research challenges. Transactions on Emerging Telecommunications Technologies, pp. 1–24. doi:10.1002/ett.2674.
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880. doi:10.1016/j.jnca.2011.03.005.
Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In Third IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU (pp. 25–30).
Mamoun, M. H. (2011). A new proactive routing protocol for MANET. Advances in Information Sciences and Service Sciences, 3(2), 132–140. doi:10.4156/aiss.
Youn, J. (2006). Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks. Journal of Networks, 1(1), 1–11.
Roy, B., Banik, S., Chaki, N., & Saha, B. (2010). An improved route maintenance strategy for QoS based AODV routing protocol. International Conference on Advances in Recent Technologies in Communication and Computing, pp. 51–55. doi:10.1109/ARTCom.2010.62.
Chakeres, I. D., & Belding-royer, E. M. (2002). The utility of hello messages for determining link connectivity. In The 5th International Symposium on Wireless Personal Multimedia Communications. (pp. 504–508).
Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180. doi:10.1016/j.pmcj.2013.06.004.
Duan, J., Gao, D., Foh, C. H., & Zhang, H. (2013). TC-BAC: A trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Networks, 11(8), 2675–2692. doi:10.1016/j.adhoc.2013.05.005.
Qu, C., Ju, L., Jia, Z., Xu, H., & Zheng, L. (2013). Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 42–49). doi:10.1109/TrustCom.2013.9.
Leligou, H. C., Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2012). Combining trust with location information for routing in wireless sensor networks. Wireless Communications and Mobile Computing, 12(12), 1091–1103. doi:10.1002/wcm.1038.
Sun, Y., Luo, H., & Das, S. K. (2012). A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 9(6), 785–797.
Chen, S., Zhang, Y., Liu, Q., & Feng, J. (2012). Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks, 10(8), 1603–1618. doi:10.1016/j.adhoc.2011.07.014.
Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K.-Y. (2010). Trust based outing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551–558. doi:10.4304/jnw.5.5.551-558.
Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.
Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM.
Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM.
Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2012). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826. doi:10.1007/s11277-012-0613-7.
Eissa, T., Abdul Razak, S., Khokhar, R. H., & Samian, N. (2013). Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Networks and Applications, 18(5), 666–677. doi:10.1007/s11036-011-0328-0.
Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF?: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.
Abusalah, L., Khokhar, A., & Guizani, M. (2006). Trust aware routing in mobile ad Hoc networks. In IEEE Global Telecommunications Conference (GLOBECOM ’06) (pp. 1–5).
Channa, M. I., & Ahmed, K. M. (2011). A reliable routing scheme for post-disaster ad hoc communication networks. Journal of Communications, 6(7), 549–557. doi:10.4304/jcm.6.7.549-557.
Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83. doi:10.1049/iet-ifs.2010.0160.
Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (pp. 275–283).
Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., & Luke, J. A. (2009). Trust-aware in-network aggregation for wireless sensor networks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (pp. 1–8).
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM. doi:10.1145/345910.345955.
Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia.
Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., et al. (2013). Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 6(6), 669–688. doi:10.1002/sec.
Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer.
Yi, Y., & Shakkottai, S. (2007). Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking, 15(1), 133–144.
Issariyakul, T., & Hossain, E. (2012). Introduction to Network Simulator NS2 (2nd ed.). New York: Springer.
Acknowledgments
We are thankful to Universiti Teknologi Malaysia (UTM), Malaysia and Quaid-e-Awam University of Engineering, Science & Technology (Q.U.E.S.T), Pakistan for providing us tools, technical support, research environment and facilities to accomplish this research work.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmed, A., Abu Bakar, K., Channa, M.I. et al. A trust aware routing protocol for energy constrained wireless sensor network. Telecommun Syst 61, 123–140 (2016). https://doi.org/10.1007/s11235-015-0068-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-015-0068-8