DOI QR코드

DOI QR Code

A trust evaluation method for improving nodes utilization for wireless sensor networks

  • Haibo, Shen (School of Computer Science and Engineering, Nanjing University of Science & Technology) ;
  • Kechen, Zhuang (School of Computer Science and Engineering, Nanjing University of Science & Technology) ;
  • Hong, Zhang (School of Computer Science and Engineering, Nanjing University of Science & Technology)
  • Received : 2017.02.14
  • Accepted : 2017.10.21
  • Published : 2018.03.31

Abstract

Existing trust evaluation models for wireless sensor networks can accurately and objectively evaluate trust value of nodes, but the nodes' energy saving problem was ignored. Especially when there are a few malicious nodes in a network, the overall trust value calculation for all nodes would waste lots of energy. Beside that, the network failure caused by nodes death was also not considered. In this paper, we proposed a method for avoiding energy hole which applied trust evaluation models and a trust evaluation method based on information entropy, so as to achieve the purpose of improving nodes utilization. Simulation results show that the proposed method can effectively improve nodes utilization, and it has reasonable detection rate and lower false alert rate compared to other classical methods.

Keywords

References

  1. S. Ganeriwal, L. K. Balzano and M. Srivastava, "Reputation based framework for high integrity sensor networks," ACM Transactions on Sensor Networks, vol. 4, no. 3, pp. 1-37, May, 2008.
  2. R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee and Y. J. Song, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, November, 2009. https://doi.org/10.1109/TPDS.2008.258
  3. A. Boukerche and Xu Li, "An agent-based trust and reputation management scheme for wireless sensor networks," in Proc. of GLOBECOM - IEEE Global Telecommunications Conference, pp. 1857-1861, November 28- December 2, 2005.
  4. Jiang Jinfang, Han Guangjie, Wang Feng, Shu Lei and Guizani Mohsen, "An Efficient Distributed Trust Model for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 5, pp. 1228-1237, May, 2015. https://doi.org/10.1109/TPDS.2014.2320505
  5. J. Zhang, R. Shankaran, M. A. Orgun, V. Varadharajan and A. Sattar, "A trust management architecture for hierarchical wireless sensor networks," in Proc. of the IEEE 35th Conference on Local Computer Networks, pp. 264-267, October 10-14, 2010.
  6. J. Zhang, R. Shankaran, M. A. Orgun, V. Varadharajan, A. Sattar, "A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks," in Proc. of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, pp. 484-491, December 11-13, 2010.
  7. V. R. S. Dhulipala, N. Karthik and R. M. Chandrasekaran, "A Novel Heuristic Approach Based Trust Worthy Architecture for Wireless Sensor Networks," Wireless personal communications, vol. 70, no. 1, pp. 189-205, May, 2013. https://doi.org/10.1007/s11277-012-0688-1
  8. Li Xiaoyong, Zhou Feng and Du Junping, "LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks," IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 924-935, June, 2013. https://doi.org/10.1109/TIFS.2013.2240299
  9. P. Trakadas, S. Maniatis, P. Karkazis, T. Zahariadis, H. C. Leligou and S. Voliotis, "A novel flexible trust management system for heterogeneous wireless sensor networks," in Proc. of International Symposium on Autonomous Decentralized Systems, pp. 369-374, March 23-25, 2009.
  10. T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis and P. Karkazis, "A novel trust-aware geographical routing scheme for wireless sensor networks," Wireless personal communications, vol. 69, no. 2, pp. 805-826, March, 2013. https://doi.org/10.1007/s11277-012-0613-7
  11. Heinzelman W R, Chandrakasan A, Balakrishnan H, "Energy-efficient communication protocol for wireless microsensor networks," in proc. of the 33rd Hawaii International Conference on System Sciences, IEEE Explore, pp. 1-10, January 7, 2010.
  12. A. Manjeshwar and D. P. Agrawal, "TEEN: a routing protocol for enhanced efficiency in wireless sensor networks," in proc. of the 15th International Parallel and Distributed Processing Symposium, pp.30189a, April 23-27, 2001.
  13. A. Manjeshwar and D. P. Agrawal, "APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks," in proc. of the International Parallel and Distributed Processing Symposium, pp.0195b, April 15-19, 2002.
  14. Usman M J, Xing Z, Chiroma H, and Herawan T, "Modified low energy adaptive clustering hierarchy protocol for efficient energy consumption in wireless sensor networks," International Review on Computers and Software, vol. 9, no. 11, pp. 1904-1915, November, 2014.
  15. Shen Haibo, Dong Shengjie, Jian Xu, and Zhang Hong, "Coverage Balancing Based Trust Evaluation Method for Wireless Sensor Networks," International Journal of Security and its Applications, vol. 9, no. 10, pp. 381-394, October, 2015. https://doi.org/10.14257/ijsia.2015.9.10.35
  16. Li Jian and P. Mohapatra, "An Analytical Model For The Energy Hole Problem In Many-To-One Sensor Networks," in Proc. of IEEE Vehicular Technology Conference, pp. 2721-2725, September 28-28, 2005.
  17. Sha Chao, Chen Huan, Yao Chen, Liu Yao, Wang Ruchuan, "A Type of Energy Hole Avoiding Method Based on Synchronization of Nodes in Adjacent Annuluses for Sensor Network," International Journal of Distributed Sensor Networks, vol. 12, no. 3, pp. 1-14, March, 2016.
  18. Olariu Stephan and StojmenovicIvan, "Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting," in Proc. of INFOCOM 2006: 25th IEEE International Conference on Computer Communications, pp. 1-12, April 23-29 2006.
  19. Demertzis, Apostolos and Oikonomou, Konstantinos, "Avoiding Energy Holes in Wireless Sensor Networks with Non-Uniform Energy Distribution," in Proc. of IISA 2014 - 5th International Conference on Information, Intelligence, Systems and Applications, pp. 138-143, July 7-9, 2014.
  20. C. E. Shannon, "A Mathematical Theory of Communication," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 1, pp. 3-55, January, 2001. https://doi.org/10.1145/584091.584093