Abstract
Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication services in post disaster relief operations where field information is exchanged with first responders and nearby emergency centers. However, such application environments expose the nodes to physical capture, damage and misbehaviour attacks. In addition, the compromised nodes potentially increase network congestion by advertizing false information. The loss of critical information due to significant congestion and node misbehavior attacks adversely affect emergency operations. The traditional cryptographic and authentication based secure schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehaviour attacks. Furthermore, existing trust based routing protocols incur high control overheads in trust estimation and dissemination; lead to high number of dead nodes due to adopted route discovery mechanism and suffer from high route instability. In this paper, we present an Energy-aware Secure Routing with Trust (ESRT) scheme that maintains a trusted environment and isolate misbehaving nodes. ESRT incorporates trust, energy, and hop counts for making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Simulation results demonstrate improved performance of the ESRT scheme when compared to existing work.
Similar content being viewed by others
References
Pogkas N, Karastergios GE, Antonopoulos CP, Koubias S, Papadopoulos G (2007) Architecture design and implementation of an ad-hoc network for disaster relief operations. IEEE Trans Ind Inf 3:63–72
Lorincz K, Malan DJ, Fulford-jones TRF, Clavel A, Welsh M, Moulton S (2004) Sensor networks for emergency response: challenges and opportunities. IEEE Pervasive Comput 3:16–23
Haque MM, Pathan A-SK, Hong CS, Huh E-N (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Trans Internet Inf Syst 2:265–279
Hu Y-C, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 1:175–192
Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:21–38
Zhang K, Wang C, Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing. Northeastern Univ. at Qinhuangdao, Qinhuangdao. IEEE, pp 1–5
Mohaisen A (2009) On the insecurity of asymmetric key-based architecture in wireless sensor networks. KSII Trans Internet Inf Syst 3:376–384
Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquitous Comput 1:1–19
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8:1086–1090
Becher A, Benenson Z, Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. Technical report. Springer, Berlin
Cordasco J, Wetzel S (2008) Cryptographic versus trust-based methods for MANET routing security. Electron Notes Theor Comput Sci 197:131–140
Govindan K, Mohapatra P (2012) Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun Surv Tutorials 14:279–298
Yu Y, Li K, Zhou W, Li P (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35:867–880
Chang K-D, Chen J-L (2012) A survey of trust management in WSNs. Internet of things and future internet. KSII Trans Internet Inf Syst 6:5–23
Zhang C, Zhu X, Song Y, Fang Y (2010) A formal study of trust-based routing in wireless ad hoc networks. 2010 I.E. Proceedings INFOCOM 14-19 March. San Diego, CA: IEEE, pp 1–9
Fernandez-Gago MC, Roman R, Lopez J (2007) A survey on the applicability of trust management systems for wireless sensor networks. Third IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU. 19-21 July. Istanbul: IEEE, pp 25–30
Srinivasan A, Teitelbaum J, Wu J (2006) DRBTS: distributed reputation-based beacon trust system. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing 29 Sept–1 Oct. Indianapolis, INL IEEE, pp 277–283
Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw 4:1–37
Michiardi P, Molva R (2002) CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. Advanced Communications and Multimedia Security. 26-27 Sep. Portorož, Slovenia: Springer, pp 107–121
Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2012) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Pers Commun 69:805–826
Tanachaiwiwat S, Davel P, Bhindwale R, Helmyl A (2004) Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. IEEE International Conference on Performance, Computing, and Communications. Los Angeles, CA, USA, IEEE pp 463–469
Gheorghe L, Rughiniş R, Ţăpuş N (2012) Trust and energy-aware routing protocol for wireless sensor networks. The Eighth International Conference on Wireless and Mobile Communications (ICWMC). 24–29 June. Venice, Italy: IARIA. pp 388–394
Choudhury S, Roy SD, Singh SA (2008) Trust management in ad hoc network for secure DSR routing. Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics. Springer, pp 495–500
Channa MI, Ahmed KM (2011) A reliable routing scheme for post-disaster ad hoc communication networks. J Commun 6:549–557
Chen S, Zhang Y, Liu Q, Feng J (2012) Dealing with dishonest recommendation: the trials in reputation management court. Ad Hoc Netw 10:1603–1618
Gong W, You Z, Chen D, Zhao X, Gu M, Lam K-Y (2010) Trust based routing for misbehavior detection in ad hoc networks. J Networks 5:551–558
Cho J, Swami A, Chen I (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13:562–583
Cho J-H, Swami A, Chen I-R (2012) Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J Netw Comput Appl 35:1001–1012
Wei D, Jin Y, Vural S, Moessner K, Tafazolli R (2011) An energy-efficient clustering solution for wireless sensor networks. IEEE Trans Wirel Commun 10:3973–3983
Pantazis NA, Nikolidakis SA, Vergados DD (2013) Energy-efficient routing protocols in wireless sensor networks : a survey. IEEE Commun Surv Tutorials 15:551–591
Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12:1091–1103
Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11:2675–2692
Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Depend Secure Comput 9:785–797
Zhang Q, Yu T, Ning P (2008) A framework for identifying compromised nodes in wireless sensor networks. ACM Trans Inf Syst Secur 11:12
Moya JM, Vallejo JC, Fraga D, Araujo A, Villanueva D, de Goyeneche J-M (2009) Using reputation systems and non-deterministic routing to secure wireless sensor networks. Sensors 9:3958–3980
Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad hoc networks. Proceedings of Computing Research Repository (CoRR). Available at: http://citeseerx.ist.psu.edu/viewdoc/summary? Accessed: 30 March 2012
Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6:77–83
Buchegger S, Le Boudec J-Y (2002) Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness in Dynamic Ad-hoc NeTworks). Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing, 25–27 Feb. New York, NY, USA:ACM, pp 226–236
Qin T, Yu H, Leung C, Shen Z, Miao C (2009) Towards a trust aware cognitive radio architecture. ACM SIGMOBILE Mobile Comput Commun Rev 13:86–95
Ahmed N, Jamshaid K, Khan OZ (2007) SAFIRE: a self organizing architecture for information exchange between first responders. 2nd IEEE Workshop on Networking Technologies for Software Define Radio Networks. 18-21 June. San Diego, CA, USA: IEEE, pp 25–31
Chen D, Liu Z, Wang L, Dou M, Chen J, Li H (2013) Natural disaster monitoring with wireless sensor networks: a case study of data-intensive applications upon low-cost scalable systems. Mobile Netw Appl 18:651–663
George SM, Zhou W, Chenji H, Won M, Lee YO, Pazarloglou A, Stoleru R, Barooah P (2010) DistressNet : a wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Commun Mag 48:128–136
Yi S, Naldurg P, Kravets R (2001) Security-aware routing protocol for wireless ad-hoc networks. Proceedings of the 2nd ACM International Symposium on Mobile Ad hoc Networking & Computing. October. New York, NY, USA. ACM, pp 299–302
Perrig A, Canetti R, Tygar JD, Song D (2000) Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of IEEE Symposium on Security and Privacy. 5–7 Aug. Berkeley, CA: IEEE, pp 56–73
Tajeddine A, Kayssi A, Chehab A, Elhajj I, Itani W (2015) CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors 15:3299–3333
Shaikh RA, D’Auriol BJ, Lee H, Lee S (2010) Privacy and trust management schemes of wireless sensor networks: a survey. Handbook of Research on Developments and Trends in Wireless Sensor Networks - From Principle to Practice. IGI Global, pp 290–309
Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24:318–328
Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164–180
Duan J, Yang D, Zhu H, Zhang S, Zhao J (2014) TSRF: a trust-aware secure routing framework in wireless sensor networks. Int J Distrib Sens Netw 2014:1–14
Deng H, Jin G, Sun K, Xu R, Luke JA (2009) Trust-aware in-network aggregation for wireless sensor networks. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM). 30 Nov – 4 Dec. Honolulu, HI: IEEE, pp 1–8
Al-hamadani A, Allen WH (2014) RAAODV: a reputation-aware AODV for mobile ad hoc networks. Proceedings of the ACM Southeast Regional Conference. March 28 – 29. Kennesaw, GA, USA, pp 1–6
Chen Z, He M, Liang W, Chen K (2014) Trust-aware and low energy consumption security topology protocol of wireless sensor network. J Sens 2014:1–10
Eissa T, Abdul Razak S, Khokhar RH, Samian N (2013) Trust-based routing mechanism in MANET: design and implementation. Mob Networks Appl 18:666–677
Zhan G, Shi W, Deng J (2012) Design and implementation of TARF : a trust-aware routing framework for WSNs. IEEE Trans Depend Secure Comput 9:184–197
Zhang Y, Lee W (2000) Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. 6–11 Aug. Boston, Massachusetts: ACM, pp 275–283
Josang A, Ismail R (2002) The beta reputation system. 15th Bled Electronic Commerce Conference. 7–10 June. Bled Slovenia: ECOM, pp. 324–337
Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6:669–688
Issariyakul T, Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer
Acknowledgments
We are thankful to Universiti Teknologi Malaysia (UTM), Malaysia and Quaid-e-Awam University of Engineering, Science & Technology (Q.U.E.S.T), Pakistan for providing us tools, environment and financial support to accomplish this research work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Ahmed, A., Bakar, K.A., Channa, M.I. et al. Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Netw. Appl. 10, 216–237 (2017). https://doi.org/10.1007/s12083-015-0421-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-015-0421-4