Skip to main content
Log in

A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they come at high cost and, in most cases, cannot shield against routing attacks. To face this problem, we propose a secure routing protocol which adopts the geographical routing principle to cope with the network dimensions, and relies on a distributed trust model for the detection and avoidance of malicious neighbours. A novel function which adaptively weights location, trust and energy information drives the routing decisions, allowing for shifting emphasis from security to path optimality. The proposed trust model relies on both direct and indirect observations to derive the trustworthiness of each neighboring node, while it is capable of defending against an increased set of routing attacks including attacks targeting the indirect trust management scheme. Extensive simulation results reveal the advantages of the proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akyildiz I. F., Melodia T., & Chowdury K. R. (2007). Wireless multimedia sensor networks: A survey. IEEE Wireless Communications, 14(6), 32–39.

    Google Scholar 

  2. Giruka V. C., Singhal M., Royalty J., Varanasi S. (2008) Security in wireless sensor networks. Wireless Communications and Mobile Computing 8(1): 1–24

    Article  Google Scholar 

  3. Karlof C., Wagner D. (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks 1: 293–315

    Article  Google Scholar 

  4. Kannhavong B., Nakayama H., Nemoto Y., Kato Y., & Jamalipour A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.

    Google Scholar 

  5. Sun Y. L., Han Z., Ray Liu K. J. (2008) Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 25(2): 112–119

    Article  Google Scholar 

  6. Pirzada A. A., McDonald C. (2006) Trust establishment in pure ad-hoc networks. Wireless Personal Communications 37: 139–163

    Article  Google Scholar 

  7. Hur J., Lee Y., Yoon H., Choi D., & Jin S. (2005). Trust evaluation model for wireless sensor networks. In Proceedings of advanced communication technology conference, ICACT 2005, pp.491–496.

  8. Crosby G. V., & Pissinou N. (2007). Cluster-based reputation and trust for wireless sensor networks. In Proceedings of consumer communications and networking conference, CCNC 2007Las Vegas, NV, USA.

  9. Lewis N., & Foukia N. (2007). Using trust for key distribution and route selection in wireless sensor networks. In Proceedings of the global communications conference, Globecom 2007.

  10. Theodorakopoulos G., Baras J. S. (2006) On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areas in Communications (JSAC) 24(2): 318–328. doi:10.1109/JSAC.2005.861390

    Article  Google Scholar 

  11. Ganeriwal S., Balzano L. K., & Srivastava M. (2007). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks.

  12. Han G., Choi D., & Lim W. (2007). A reliable approach of establishing trust for wireless sensor networks. In IFIP Proceedings of international conference on network and parallel computing workshops, IEEE Computer Society Washington, DC, USA.

  13. Tanachaiwiwat S., Dave P., Bhindwale R., & Helmy A. (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In Proceedings of IEEE international conference on performance, computing, and communications.

  14. Li H., & Singhal M. (2006). A secure routing protocol for wireless ad hoc networks. In Proceedings of the 39th Hawaii international conference on system sciences.

  15. Pirzada A. A., & McDonald C. (2007). Trusted greedy perimeter stateless routing. In Proceedings of IEEE international conference on networks, ICON2007.

  16. Kang K. D., Liu K., & Abu-Ghazaleh N. (2006). Securing geographic routing in wireless sensor networks. In 9th annual nys cyber security conference: symposium on information assurance, Albany, New York.

  17. Sun Y., Yu W., Han Z., & Ray Liu K. J. (2006). Information theoretic framework of trust modeling and evaluation for ad hoc networks. In IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks, 24(2).

  18. Crosby G., Pissinou N., Makki K. (2006) Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. International Journal of Network Security 12(2): 107–117

    Google Scholar 

  19. Hung K. S., Lui K. S., & Kwok Y. K. (2007). A trust-based geographical routing scheme in sensor networks. In Proceedings of IEEE wireless communications and networking conference, WCNC 2007, Hong Kong.

  20. Watteyne T., Augé-Blum I., Dohler M., Ubéda S., & Barthel D. (2008). Centroid virtual coordinates—A novel near-shortest path routing paradigm. Elsevier Computer Networks Journal, Special Issue on Autonomic and Self-Organising Systems.

  21. Yu Y., Estrin D., & Govindan R. (2001). Geographical and energy-aware routing: A recursive data dissemination protocol for wireless sensor networks. UCLA Computer Science Department Technical Report, UCLA-CSD TR-01-0023, May 2001.

  22. Audun J., & Roslan I. (2002). The beta reputation system. In 15th Bled electronic commerce conference, Bled, Slovenia.

  23. Karp B., & Kung H. T. (2000). GPSR: greedy perimeter stateless routing for wireless networks. In Proceedings of annual international conference on mobile computing and networking, MobiCom 2000.

  24. Rao A., Ratnasamy S., Papadimitriou C., Shenker S., & Stoica I. (2003). Geographic routing without location information. In Proceedings of annual international conference on mobile computing and networking, MobiCom 2003, San Diego, California.

  25. http://www.ee.teihal.gr/professors/voliotis/digilab_site/ATSR_Home.html.

  26. http://www.xbow.com.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Helen C. Leligou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zahariadis, T., Trakadas, P., Leligou, H.C. et al. A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks. Wireless Pers Commun 69, 805–826 (2013). https://doi.org/10.1007/s11277-012-0613-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0613-7

Keywords

Navigation