Skip to main content

Advertisement

Log in

A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of sensor nodes, reliable data delivery in WSNs is nontrivial. To counter node misbehavior attacks, traditional cryptographic and authentication based solutions have proved to be inappropriate due to high cost and incapability factors. Recently, trust based solutions have appeared to be viable solutions to address nodes’ misbehavior attacks. However, the existing trust based solutions incur high cost in trust estimation and network-wide dissemination which significantly increases traffic congestion and undermines network lifetime. This paper presents a Trust and Energy aware Secure Routing Protocol (TESRP) for WSN that exploits a distributed trust model for discovering and isolating misbehaving nodes. TESRP employs a multi-facet routing strategy that takes into consideration the trust level, residual energy, and hop-counts of neighboring nodes while making routing decisions. This strategy not only ensures data dissemination via trusted nodes but also balances out energy consumption among trusted nodes while traversing through shorter paths. Demonstrated by simulation results in NS-2, TESRP achieves improved performance in terms of energy consumption, throughput and network lifetime as compared to existing solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Haque MM, Pathan A-SK, Hong CS, Huh E-N (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Trans Internet Inf Syst 2(5):265–279. doi:10.3837/tiis.2008.05.004

    Article  Google Scholar 

  2. Hu Y-C, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Netw 1(1):175–192. doi:10.1016/S1570-8705(03)00019-2

    Article  Google Scholar 

  3. Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for Ad Hoc networks. Wirel Netw 11(1–2):21–38. doi:10.1007/s11276-004-4744-y

    Article  Google Scholar 

  4. Zhang K, Wang C and Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1–5). IEEE. doi:10.1109/WiCom.2008.889

  5. Mohaisen A (2009) On the insecurity of asymmetric key-based architecture in wireless sensor networks. KSII Trans Internet Inf Syst 3(4):376–384. doi:10.3837/tiis.2009.04.003

    Article  Google Scholar 

  6. Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquit Comput 1(3):1–19

    Article  Google Scholar 

  7. Cordasco J, Wetzel S (2008) Cryptographic versus trust-based methods for MANET routing security. Electron Notes Theor Comput Sci 197(2):131–140. doi:10.1016/j.entcs.2007.12.022

    Article  Google Scholar 

  8. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090

    Article  Google Scholar 

  9. Becher A, Benenson Z and Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Technical report. Springer Berlin, Heidelberg

  10. Govindan K, Mohapatra P (2012) Trust computations and trust dynamics in mobile Ad Hoc networks: a survey. IEEE Commun Surv Tutor 14(2):279–298. doi:10.1109/SURV.2011.042711.00083

    Article  Google Scholar 

  11. Yu Y, Li K, Zhou W, Li P (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35(3):867–880. doi:10.1016/j.jnca.2011.03.005

    Article  Google Scholar 

  12. Chang K-D, Chen J-L (2012) A survey of trust management in WSNs, internet of things and future internet. KSII Trans Internet Inf Syst 6(1):5–23. doi:10.3837/tiis.2012.01.001

    Google Scholar 

  13. Zhang C, Zhu X, Song Y and Fang Y (2010). A formal study of trust-based routing in wireless Ad Hoc networks. In: 2010 I.E. proceedings INFOCOM (pp. 1–9)

  14. Fernandez-Gago MC, Roman R and Lopez J (2007) a survey on the applicability of trust management systems for wireless sensor networks. In: Third IEEE international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2007. SECPerU (pp. 25–30)

  15. Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed Reputation-based Beacon Trust System. In 2nd IEEE international symposium on dependable, autonomic and secure computing, (pp. 277–283). IEEE. doi:10.1109/DASC.2006.28

  16. Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netws 4(3):1–37. doi:10.1145/1362542.1362546

    Article  Google Scholar 

  17. Michiardi P and Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks. In: Advanced communications and multimedia security (pp. 107–121). Springer US

  18. Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2012) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Pers Commun 69(2):805–826. doi:10.1007/s11277-012-0613-7

    Article  Google Scholar 

  19. Tanachaiwiwat S, Davel P, Bhindwale R and Helmyl A (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: IEEE international conference on performance, computing, and communications. (pp. 463–469). IEEE

  20. Gheorghe, L, Rughiniș R and Țăpuș N (2012). Trust and energy-aware routing protocol for wireless sensor networks. In: The 8th international conference on wireless and mobile communications (ICWMC) (pp. 388–394)

  21. Choudhury S, Roy SD and Singh SA (2008). Trust management in Ad Hoc network for secure DSR routing. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics (pp. 495–500). Springer

  22. Channa MI, Ahmed KM (2011) A reliable routing scheme for post-disaster Ad Hoc communication networks. J Commun 6(7):549–557. doi:10.4304/jcm.6.7.549-557

    Article  Google Scholar 

  23. Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12(12):1091–1103. doi:10.1002/wcm.1038

    Article  Google Scholar 

  24. Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692. doi:10.1016/j.adhoc.2013.05.005

    Article  Google Scholar 

  25. Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Dependable Secure Comput 9(6):785–797

    Article  Google Scholar 

  26. Chen S, Zhang Y, Liu Q, Feng J (2012) Dealing with dishonest recommendation: the trials in reputation management court. Ad Hoc Netw 10(8):1603–1618. doi:10.1016/j.adhoc.2011.07.014

    Article  Google Scholar 

  27. Gong W, You Z, Chen D, Zhao X, Gu M, Lam K-Y (2010) Trust based routing for misbehavior detection in Ad Hoc networks. J Netw 5(5):551–558. doi:10.4304/jnw.5.5.551-558

    Google Scholar 

  28. Cho J, Swami A, Chen I (2011) A survey on trust management for mobile Ad Hoc networks. IEEE Commun Surv Tutor 13(4):562–583

    Article  Google Scholar 

  29. Zapata MG and Asokan N (2002) Securing Ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security (pp. 1–10). ACM

  30. Perrig A, Canetti R, TYgar JD and Song D (2000). Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy (S&P). (pp. 56–73)

  31. Yi S, Naldurg P and Kravets R (2001). Security-aware routing protocol for wireless Ad-hoc networks. In: Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing (pp. 299–302). ACM

  32. Reddy YB and Srivathsan S (2009) Game theory model for selective forward attacks in wireless sensor networks. In: 17th Mediterranean conference on control and automation, MED’09. (pp. 458–463). IEEE. doi:10.1109/MED.2009.5164584

  33. Eissa T, Abdul Razak S, Khokhar RH, Samian N (2013) Trust-based routing mechanism in MANET: design and implementation. Mob Netw Appl 18(5):666–677. doi:10.1007/s11036-011-0328-0

    Article  Google Scholar 

  34. Yang R, Lin C and Jiang Y (2011) Trust based access control in infrastructure-centric environment. In: IEEE international conference on communications (ICC) (pp. 1–5).

  35. Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Dependable Secure Comput 9(2):184–197

    Article  Google Scholar 

  36. Abusalah L, Khokhar A and Guizani M (2006) Trust aware routing in mobile Ad Hoc networks. In: IEEE global telecommunications conference (GLOBECOM’06) (pp. 1–5)

  37. Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile Ad Hoc networks. IET Inf Secur 6(2):77–83. doi:10.1049/iet-ifs.2010.0160

    Article  Google Scholar 

  38. Zhang Y and Lee W (2000) Intrusion detection in wireless Ad-Hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275–283)

  39. Mahmoud ME and Shen XS (2011) Trust-based and energy-aware incentive routing protocol for Multi-hop wireless networks. In: IEEE international conference on communications (ICC) (pp. 1–5). IEEE

  40. Josang A and Ismail R (2002) The beta reputation system. In: 15th bled electronic commerce conference (pp. 324–337). Bled Slovenia

  41. Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688. doi:10.1002/sec

    Article  Google Scholar 

  42. Issariyakul T and Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer

Download references

Acknowledgments

We are thankful to Universiti Teknologi Malaysia (UTM), Malaysia and Quaid-e-Awam University of Engineering, Science & Technology (Q.U.E.S.T), Nawabshah, Pakistan for providing us tools, environment and financial support to accomplish this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Ahmed.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, A., Bakar, K.A., Channa, M.I. et al. A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network. Mobile Netw Appl 21, 272–285 (2016). https://doi.org/10.1007/s11036-016-0683-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-016-0683-y

Keywords

Navigation