skip to main content
10.1145/3291533.3291544acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

Secure and trust-aware routing in wireless sensor networks

Published: 29 November 2018 Publication History

Abstract

Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. As a consequence, several secure routing methods have been proposed during the last decade, whereas trust management models and corresponding routing protocols have also been recently suggested as an even more effective security mechanism for WSNs. In this paper, we present a detailed survey on such routing protocols along with a proper classification according to their basic features. We first distinguish between secure multipath protocols and trust evaluation based protocols. The former are then distinguished to share and non share-based ones, whereas the latter are categorized according to their cluster-based structure or not. A comprehensive analysis is presented, accompanied by proper comparison and summarization tables for the most significant ones, as well as corresponding discussion and conclusions. Main emphasis is given to their novelty, basic methodology, pros and cons, kinds of faced attacks and complexity.

References

[1]
G. Han, J. Jiang, L. Shu, J. Niu, H.-C. Chao, Management and applications of trust in Wireless Sensor Networks: A survey, Journal of Computer and System Sciences, Volume 80, Issue 3, pp. 602--617, 2014.
[2]
Stavrou, E., & Pitsillides, A. (2010). A survey on secure multipath routing protocols in WSNs. Computer Networks, 54(13), 2215--2238.
[3]
Zin, S. M., Anuar, N. B., Kiah, M. L. M., & Ahmedy, I. (2015). Survey of secure multipath routing protocols for WSNs. Journal of Network and Computer Applications, 55, 123--153.
[4]
Deng, J., Han, R., & Mishra, S. (2006). INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications, 29(2), 216--23
[5]
Nasser, N., & Chen, Y. (2007). SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer communications, 30(11-12), 2401--2412.
[6]
Hayajneh, T., Doomun, R., Al-Mashaqbeh, G., & Mohd, B. J. (2014). An energy-efficient and security aware route selection protocol for wireless sensor networks. Security and Communication Networks, 7(11), 2015--2038.
[7]
Zhou, J. (2013). Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks. International Journal of Distributed Sensor Networks, 9(4), 108968.
[8]
Wenjing Lou and Younggoo Kwon, "H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks," in IEEE Transactions on Vehicular Technology, vol. 55, no. 4, pp. 1320--1330, July 2006.
[9]
Shu, T., Krunz, M., & Liu, S. (2010). Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE transactions on mobile computing, 9(7), 941--954.
[10]
Liu, A., Zheng, Z., Zhang, C., Chen, Z., & Shen, X. (2012). Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Transactions on Vehicular Technology, 61(7), 3255--3265.
[11]
Challal, Y., Ouadjaout, A., Lasla, N., Bagaa, M., & Hadjidj, A. (2011). Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. J. of Network and Computer Applications, 34(4), 1380--1397.
[12]
K. Liu, N. Abu-Ghazaleh, K.D. Kang, Location verification and trust management for resilient geographic routing, Journal of Parallel and Distributed Computing 67(2), 215--228, 2007.
[13]
I. Maarouf, U. Baroudi, A.R. Naseer, Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks, IET Communications 3(5), 846--858, 2009.
[14]
N. Lewis, N. Foukia, An efficient reputation-based routing mechanism for wireless sensor networks: Testing the impact of mobility and hostile nodes, in: Sixth Annual Conference on Privacy, Security and Trust, pp.151--155, 2008.
[15]
H. Deng, Y. Yang, G. Jin, R. Xu, W. Shi, Building a trust-aware dynamic routing solution for wireless sensor networks, in: IEEE Globecom 2010 Workshop on Heterogeneous, Multi-Hop Wireless and Mobile Networks, pp.153--157, 2010.
[16]
Zhan, W. Shi, and J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 184--197, Mar./Apr. 2012.
[17]
H.A. Rahhal, I.A. Ali, S. Shaheen, A novel trust-based cross-layer model for wireless sensor networks, in: 28th National Radio Science Conference, NRSC, pp. 1--10, 2011.
[18]
N. Poolsappasit, S. Madria, A secure data aggregation based trust management approach for dealing with untrustworthy motes in sensor network, in: 2011 International Conference on Parallel Processing, pp.138--147, 2011.
[19]
Y. Liu, M. Dong, K. Ota, and A. Liu, ActiveTrust: Secure and trustable routing in wireless sensor networks, IEEE Trans. Inf. Forensics Security, vol. 11, no. 9, pp. 2013--2027, 2016.
[20]
X. Liu, N. Xiong, N. Zhang, A. Liu, H. Shen, C. Huang, A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network, Published in: IEEE Access (Volume: 6), pp.3882--3898 2018.
[21]
A. Ahmed, K. A. Bakar, M. I. Channa, K. Haseeb, and A.W. Khan, A trust aware routing protocol for energy constrained wireless sensor network, Telecommun. Syst., vol. 61, no. 1, pp. 123_140, 2016.
[22]
J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, TSRF: A trust-aware secure routing framework in wireless sensor networks, Int. J. Distrib. Sensor Netw., 2014(3):1--14, 2014.
[23]
H. Xia, Z. Jia, X. Li, L. Ju, and E. H.-M. Sha, Trust prediction and trust based source routing in mobile ad hoc networks, Ad Hoc Netw., vol. 11, no. 7, pp. 2096--2114, 2013.
[24]
T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, A novel trust-aware geographical routing scheme for wireless sensor networks, Wireless Pers. Commun., vol. 69, no. 2, pp. 805_826, 2013.
[25]
Crosby, G. V., Pissinou, N., & Gadze, J. (2006). A framework for trust-based cluster head election in wireless sensor networks. In Proceedings of the 2nd IEEE Workshop on dependability and security in sensor networks and systems, pp. 10--22, 2006.
[26]
Raje, R. A., & Sakhare, A. V. (2014). Routing in wireless sensor network using fuzzy based trust model. In Proceedings of 4th international conference on communication systems and network technologies (CSNT'14) (pp. 7--9).
[27]
F. Song, B. Zhao, Trust based LEACH protocol for wireless sensor networks, Proceedings of the 2nd International Conference on Future Generation Communication and Networking, 2008, pp.202--207.
[28]
J.Wang, L. Li, Z. Chen, A routing algorithm based on trust worthy core tree for WSN, Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC, 2010, pp.763--770.
[29]
N. Durrani, N, Kafi, J. Shamsi, W. Haider, A. Abbsi, Secure Multi-hop Routing Protocols in Wireless Sensor Networks: Requirements, Challenges and Solutions, in Proc. 8th Int. Conf. Dig. Inf. Manag., 2013, pp. 41--48.
[30]
T. Senthil and B. Kannapiran, ECTMRA: Energy Conserving Trustworthy Multipath Routing Algorithm Based on Cuckoo Search Algorithm, Wireless Pers. Commun. (2017) 94: 2239--2258.
[31]
B. Sun and D. Li, A Comprehensive Trust-Aware Routing Protocol with MultiAttributes for WSNs, IEEE Access, Vol. 6, 2018, pp. 4725--4741.

Index Terms

  1. Secure and trust-aware routing in wireless sensor networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    PCI '18: Proceedings of the 22nd Pan-Hellenic Conference on Informatics
    November 2018
    336 pages
    ISBN:9781450366106
    DOI:10.1145/3291533
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 November 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. multipath routing
    2. secure routing
    3. trust models
    4. trust-based routing
    5. wireless sensor networks

    Qualifiers

    • Research-article

    Conference

    PCI '18
    PCI '18: 22nd Pan-Hellenic Conference on Informatics
    November 29 - December 1, 2018
    Athens, Greece

    Acceptance Rates

    PCI '18 Paper Acceptance Rate 57 of 105 submissions, 54%;
    Overall Acceptance Rate 190 of 390 submissions, 49%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 79
      Total Downloads
    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media