Abstract
Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they come at high cost and, in most cases, cannot shield against routing attacks. To face this problem, we propose a secure routing protocol which adopts the geographical routing principle to cope with the network dimensions, and relies on a distributed trust model for the detection and avoidance of malicious neighbours. A novel function which adaptively weights location, trust and energy information drives the routing decisions, allowing for shifting emphasis from security to path optimality. The proposed trust model relies on both direct and indirect observations to derive the trustworthiness of each neighboring node, while it is capable of defending against an increased set of routing attacks including attacks targeting the indirect trust management scheme. Extensive simulation results reveal the advantages of the proposed model.
Similar content being viewed by others
References
Akyildiz I. F., Melodia T., & Chowdury K. R. (2007). Wireless multimedia sensor networks: A survey. IEEE Wireless Communications, 14(6), 32–39.
Giruka V. C., Singhal M., Royalty J., Varanasi S. (2008) Security in wireless sensor networks. Wireless Communications and Mobile Computing 8(1): 1–24
Karlof C., Wagner D. (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1: 293–315
Kannhavong B., Nakayama H., Nemoto Y., Kato Y., & Jamalipour A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.
Sun Y. L., Han Z., Ray Liu K. J. (2008) Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 25(2): 112–119
Pirzada A. A., McDonald C. (2006) Trust establishment in pure ad-hoc networks. Wireless Personal Communications 37: 139–163
Hur J., Lee Y., Yoon H., Choi D., & Jin S. (2005). Trust evaluation model for wireless sensor networks. In Proceedings of advanced communication technology conference, ICACT 2005, pp.491–496.
Crosby G. V., & Pissinou N. (2007). Cluster-based reputation and trust for wireless sensor networks. In Proceedings of consumer communications and networking conference, CCNC 2007Las Vegas, NV, USA.
Lewis N., & Foukia N. (2007). Using trust for key distribution and route selection in wireless sensor networks. In Proceedings of the global communications conference, Globecom 2007.
Theodorakopoulos G., Baras J. S. (2006) On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areas in Communications (JSAC) 24(2): 318–328. doi:10.1109/JSAC.2005.861390
Ganeriwal S., Balzano L. K., & Srivastava M. (2007). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks.
Han G., Choi D., & Lim W. (2007). A reliable approach of establishing trust for wireless sensor networks. In IFIP Proceedings of international conference on network and parallel computing workshops, IEEE Computer Society Washington, DC, USA.
Tanachaiwiwat S., Dave P., Bhindwale R., & Helmy A. (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In Proceedings of IEEE international conference on performance, computing, and communications.
Li H., & Singhal M. (2006). A secure routing protocol for wireless ad hoc networks. In Proceedings of the 39th Hawaii international conference on system sciences.
Pirzada A. A., & McDonald C. (2007). Trusted greedy perimeter stateless routing. In Proceedings of IEEE international conference on networks, ICON2007.
Kang K. D., Liu K., & Abu-Ghazaleh N. (2006). Securing geographic routing in wireless sensor networks. In 9th annual nys cyber security conference: symposium on information assurance, Albany, New York.
Sun Y., Yu W., Han Z., & Ray Liu K. J. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. In IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks, 24(2).
Crosby G., Pissinou N., Makki K. (2006) Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. International Journal of Network Security 12(2): 107–117
Hung K. S., Lui K. S., & Kwok Y. K. (2007). A trust-based geographical routing scheme in sensor networks. In Proceedings of IEEE wireless communications and networking conference, WCNC 2007, Hong Kong.
Watteyne T., Augé-Blum I., Dohler M., Ubéda S., & Barthel D. (2008). Centroid virtual coordinates—A novel near-shortest path routing paradigm. Elsevier Computer Networks Journal, Special Issue on Autonomic and Self-Organising Systems.
Yu Y., Estrin D., & Govindan R. (2001). Geographical and energy-aware routing: A recursive data dissemination protocol for wireless sensor networks. UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023, May 2001.
Audun J., & Roslan I. (2002). The beta reputation system. In 15th Bled electronic commerce conference, Bled, Slovenia.
Karp B., & Kung H. T. (2000). GPSR: greedy perimeter stateless routing for wireless networks. In Proceedings of annual international conference on mobile computing and networking, MobiCom 2000.
Rao A., Ratnasamy S., Papadimitriou C., Shenker S., & Stoica I. (2003). Geographic routing without location information. In Proceedings of annual international conference on mobile computing and networking, MobiCom 2003, San Diego, California.
http://www.ee.teihal.gr/professors/voliotis/digilab_site/ATSR_Home.html.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zahariadis, T., Trakadas, P., Leligou, H.C. et al. A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks. Wireless Pers Commun 69, 805–826 (2013). https://doi.org/10.1007/s11277-012-0613-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-012-0613-7