Skip to main content
Log in

Energy-aware and secure routing with trust for disaster response wireless sensor network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication services in post disaster relief operations where field information is exchanged with first responders and nearby emergency centers. However, such application environments expose the nodes to physical capture, damage and misbehaviour attacks. In addition, the compromised nodes potentially increase network congestion by advertizing false information. The loss of critical information due to significant congestion and node misbehavior attacks adversely affect emergency operations. The traditional cryptographic and authentication based secure schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehaviour attacks. Furthermore, existing trust based routing protocols incur high control overheads in trust estimation and dissemination; lead to high number of dead nodes due to adopted route discovery mechanism and suffer from high route instability. In this paper, we present an Energy-aware Secure Routing with Trust (ESRT) scheme that maintains a trusted environment and isolate misbehaving nodes. ESRT incorporates trust, energy, and hop counts for making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Simulation results demonstrate improved performance of the ESRT scheme when compared to existing work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Pogkas N, Karastergios GE, Antonopoulos CP, Koubias S, Papadopoulos G (2007) Architecture design and implementation of an ad-hoc network for disaster relief operations. IEEE Trans Ind Inf 3:63–72

    Article  Google Scholar 

  2. Lorincz K, Malan DJ, Fulford-jones TRF, Clavel A, Welsh M, Moulton S (2004) Sensor networks for emergency response: challenges and opportunities. IEEE Pervasive Comput 3:16–23

    Article  Google Scholar 

  3. Haque MM, Pathan A-SK, Hong CS, Huh E-N (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Trans Internet Inf Syst 2:265–279

    Article  Google Scholar 

  4. Hu Y-C, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 1:175–192

    Article  Google Scholar 

  5. Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:21–38

    Article  Google Scholar 

  6. Zhang K, Wang C, Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing. Northeastern Univ. at Qinhuangdao, Qinhuangdao. IEEE, pp 1–5

  7. Mohaisen A (2009) On the insecurity of asymmetric key-based architecture in wireless sensor networks. KSII Trans Internet Inf Syst 3:376–384

    Article  Google Scholar 

  8. Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquitous Comput 1:1–19

    Article  Google Scholar 

  9. Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8:1086–1090

    Article  Google Scholar 

  10. Becher A, Benenson Z, Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. Technical report. Springer, Berlin

    Google Scholar 

  11. Cordasco J, Wetzel S (2008) Cryptographic versus trust-based methods for MANET routing security. Electron Notes Theor Comput Sci 197:131–140

    Article  Google Scholar 

  12. Govindan K, Mohapatra P (2012) Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Commun Surv Tutorials 14:279–298

    Article  Google Scholar 

  13. Yu Y, Li K, Zhou W, Li P (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35:867–880

    Article  Google Scholar 

  14. Chang K-D, Chen J-L (2012) A survey of trust management in WSNs. Internet of things and future internet. KSII Trans Internet Inf Syst 6:5–23

    Google Scholar 

  15. Zhang C, Zhu X, Song Y, Fang Y (2010) A formal study of trust-based routing in wireless ad hoc networks. 2010 I.E. Proceedings INFOCOM 14-19 March. San Diego, CA: IEEE, pp 1–9

  16. Fernandez-Gago MC, Roman R, Lopez J (2007) A survey on the applicability of trust management systems for wireless sensor networks. Third IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU. 19-21 July. Istanbul: IEEE, pp 25–30

  17. Srinivasan A, Teitelbaum J, Wu J (2006) DRBTS: distributed reputation-based beacon trust system. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing 29 Sept–1 Oct. Indianapolis, INL IEEE, pp 277–283

  18. Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netw 4:1–37

    Article  Google Scholar 

  19. Michiardi P, Molva R (2002) CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. Advanced Communications and Multimedia Security. 26-27 Sep. Portorož, Slovenia: Springer, pp 107–121

  20. Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2012) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Pers Commun 69:805–826

    Article  Google Scholar 

  21. Tanachaiwiwat S, Davel P, Bhindwale R, Helmyl A (2004) Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. IEEE International Conference on Performance, Computing, and Communications. Los Angeles, CA, USA, IEEE pp 463–469

  22. Gheorghe L, Rughiniş R, Ţăpuş N (2012) Trust and energy-aware routing protocol for wireless sensor networks. The Eighth International Conference on Wireless and Mobile Communications (ICWMC). 24–29 June. Venice, Italy: IARIA. pp 388–394

  23. Choudhury S, Roy SD, Singh SA (2008) Trust management in ad hoc network for secure DSR routing. Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics. Springer, pp 495–500

  24. Channa MI, Ahmed KM (2011) A reliable routing scheme for post-disaster ad hoc communication networks. J Commun 6:549–557

    Article  Google Scholar 

  25. Chen S, Zhang Y, Liu Q, Feng J (2012) Dealing with dishonest recommendation: the trials in reputation management court. Ad Hoc Netw 10:1603–1618

    Article  Google Scholar 

  26. Gong W, You Z, Chen D, Zhao X, Gu M, Lam K-Y (2010) Trust based routing for misbehavior detection in ad hoc networks. J Networks 5:551–558

    Article  Google Scholar 

  27. Cho J, Swami A, Chen I (2011) A survey on trust management for mobile ad hoc networks. IEEE Commun Surv Tutorials 13:562–583

    Article  Google Scholar 

  28. Cho J-H, Swami A, Chen I-R (2012) Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J Netw Comput Appl 35:1001–1012

    Article  Google Scholar 

  29. Wei D, Jin Y, Vural S, Moessner K, Tafazolli R (2011) An energy-efficient clustering solution for wireless sensor networks. IEEE Trans Wirel Commun 10:3973–3983

    Article  Google Scholar 

  30. Pantazis NA, Nikolidakis SA, Vergados DD (2013) Energy-efficient routing protocols in wireless sensor networks : a survey. IEEE Commun Surv Tutorials 15:551–591

    Article  Google Scholar 

  31. Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12:1091–1103

    Article  Google Scholar 

  32. Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11:2675–2692

    Article  Google Scholar 

  33. Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Depend Secure Comput 9:785–797

    Article  Google Scholar 

  34. Zhang Q, Yu T, Ning P (2008) A framework for identifying compromised nodes in wireless sensor networks. ACM Trans Inf Syst Secur 11:12

    Google Scholar 

  35. Moya JM, Vallejo JC, Fraga D, Araujo A, Villanueva D, de Goyeneche J-M (2009) Using reputation systems and non-deterministic routing to secure wireless sensor networks. Sensors 9:3958–3980

    Article  Google Scholar 

  36. Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad hoc networks. Proceedings of Computing Research Repository (CoRR). Available at: http://citeseerx.ist.psu.edu/viewdoc/summary? Accessed: 30 March 2012

  37. Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf Secur 6:77–83

    Article  Google Scholar 

  38. Buchegger S, Le Boudec J-Y (2002) Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness in Dynamic Ad-hoc NeTworks). Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing, 25–27 Feb. New York, NY, USA:ACM, pp 226–236

  39. Qin T, Yu H, Leung C, Shen Z, Miao C (2009) Towards a trust aware cognitive radio architecture. ACM SIGMOBILE Mobile Comput Commun Rev 13:86–95

    Article  Google Scholar 

  40. Ahmed N, Jamshaid K, Khan OZ (2007) SAFIRE: a self organizing architecture for information exchange between first responders. 2nd IEEE Workshop on Networking Technologies for Software Define Radio Networks. 18-21 June. San Diego, CA, USA: IEEE, pp 25–31

  41. Chen D, Liu Z, Wang L, Dou M, Chen J, Li H (2013) Natural disaster monitoring with wireless sensor networks: a case study of data-intensive applications upon low-cost scalable systems. Mobile Netw Appl 18:651–663

    Article  Google Scholar 

  42. George SM, Zhou W, Chenji H, Won M, Lee YO, Pazarloglou A, Stoleru R, Barooah P (2010) DistressNet : a wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Commun Mag 48:128–136

    Article  Google Scholar 

  43. Yi S, Naldurg P, Kravets R (2001) Security-aware routing protocol for wireless ad-hoc networks. Proceedings of the 2nd ACM International Symposium on Mobile Ad hoc Networking & Computing. October. New York, NY, USA. ACM, pp 299–302

  44. Perrig A, Canetti R, Tygar JD, Song D (2000) Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of IEEE Symposium on Security and Privacy. 5–7 Aug. Berkeley, CA: IEEE, pp 56–73

  45. Tajeddine A, Kayssi A, Chehab A, Elhajj I, Itani W (2015) CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors 15:3299–3333

    Article  Google Scholar 

  46. Shaikh RA, D’Auriol BJ, Lee H, Lee S (2010) Privacy and trust management schemes of wireless sensor networks: a survey. Handbook of Research on Developments and Trends in Wireless Sensor Networks - From Principle to Practice. IGI Global, pp 290–309

  47. Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24:318–328

    Article  Google Scholar 

  48. Wang B, Chen X, Chang W (2014) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob Comput 13:164–180

    Article  Google Scholar 

  49. Duan J, Yang D, Zhu H, Zhang S, Zhao J (2014) TSRF: a trust-aware secure routing framework in wireless sensor networks. Int J Distrib Sens Netw 2014:1–14

    Article  Google Scholar 

  50. Deng H, Jin G, Sun K, Xu R, Luke JA (2009) Trust-aware in-network aggregation for wireless sensor networks. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM). 30 Nov – 4 Dec. Honolulu, HI: IEEE, pp 1–8

  51. Al-hamadani A, Allen WH (2014) RAAODV: a reputation-aware AODV for mobile ad hoc networks. Proceedings of the ACM Southeast Regional Conference. March 28 – 29. Kennesaw, GA, USA, pp 1–6

  52. Chen Z, He M, Liang W, Chen K (2014) Trust-aware and low energy consumption security topology protocol of wireless sensor network. J Sens 2014:1–10

    Google Scholar 

  53. Eissa T, Abdul Razak S, Khokhar RH, Samian N (2013) Trust-based routing mechanism in MANET: design and implementation. Mob Networks Appl 18:666–677

    Article  Google Scholar 

  54. Zhan G, Shi W, Deng J (2012) Design and implementation of TARF : a trust-aware routing framework for WSNs. IEEE Trans Depend Secure Comput 9:184–197

    Article  Google Scholar 

  55. Zhang Y, Lee W (2000) Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. 6–11 Aug. Boston, Massachusetts: ACM, pp 275–283

  56. Josang A, Ismail R (2002) The beta reputation system. 15th Bled Electronic Commerce Conference. 7–10 June. Bled Slovenia: ECOM, pp. 324–337

  57. Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6:669–688

    Article  Google Scholar 

  58. Issariyakul T, Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer

Download references

Acknowledgments

We are thankful to Universiti Teknologi Malaysia (UTM), Malaysia and Quaid-e-Awam University of Engineering, Science & Technology (Q.U.E.S.T), Pakistan for providing us tools, environment and financial support to accomplish this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Ahmed.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, A., Bakar, K.A., Channa, M.I. et al. Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-to-Peer Netw. Appl. 10, 216–237 (2017). https://doi.org/10.1007/s12083-015-0421-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0421-4

Keywords

Navigation