Browse > Article
http://dx.doi.org/10.3837/tiis.2014.01.005

A Novel Bio-inspired Trusted Routing Protocol for Mobile Wireless Sensor Networks  

Zhang, Mingchuan (State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications)
Xu, Changqiao (State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications)
Guan, Jianfeng (State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications)
Zheng, Ruijuan (Information Engineering College, Henan University of Science and Technology)
Wu, Qingtao (Information Engineering College, Henan University of Science and Technology)
Zhang, Hongke (State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.1, 2014 , pp. 74-90 More about this Journal
Abstract
Routing in mobile wireless sensor networks (MWSNs) is an extremely challenging issue due to the features of MWSNs. In this paper, we present a novel bio-inspired trusted routing protocol (B-iTRP) based on artificial immune system (AIS), ant colony optimization (ACO) and Physarum optimization (PO). For trust mechanism, B-iTRP monitors neighbors' behavior in real time and then assesses neighbors' trusts based on AIS. For routing strategy, each node proactively finds routes to the Sink based on ACO. When a backward ant is on the way to return source, it senses the energy residual and trust value of each node on the discovered route, and calculates the link trust and link energy of the route. Moreover, B-iTRP also assesses the availability of route based on PO to maintain the route table. Simulation results show how B-iTRP can achieve the effective performance compared to existing state-of-the-art algorithms.
Keywords
Bio-inspired; Trusted Routing; Artificial Immune System; MWSNs;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. Li, C. Torres, and K. Thomas, "Slime mold inspired routing protocols for wireless sensor networks," Swarm Intelligence, vol. 5, no. 4, pp. 183-223, November, 2011.   DOI
2 M. Zhang, C. Xu, J. Guan, R. Zheng, Q. Wu, and H. Zhang, "P-iRP: Physarum-inspired Routing Protocol for Wireless Sensor Networks," in Proc. of VTC, September, 2013.
3 M. Zhang, C. Xu, J. Guan, R. Zheng, Q. Wu, and H. Zhang, "A Novel Physarum-Inspired Routing Protocol for Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 2013, Article ID 483581, 12 pages, 2013.
4 C. Xu, T. Liu, J. Guan, H. Zhang, and G.-M. Muntean, "CMT-QA: Quality-aware Adaptive Concurrent Multipath Data Transfer in Heterogeneous Wireless Networks," IEEE Transactions on Mobile Computing, vol. pp, no. 99, August, 2012.
5 Y. Cao, C. Xu, J. Guan, J. Zhao, and H. Zhang, "Cross-layer Cognitive CMT for Efficient Multimedia Distribution over Multi-homed Wireless Networks," in Proc. of IEEE WCNC, April, 2013.
6 D. Johnson and D. Maltz, "Dynamic source routing in ad hoc wireless networks," Mobile Computing, vol. 353, pp. 153-181. 1996.   DOI
7 C. Chau, Q. Fei, S. Sayed, M. Wahab, and Y. Yang, "Harnessing Battery Recovery Effect in Wireless Sensor Networks: Experiments and Analysis," IEEE Journal on Selected Areas in Communications, vol. 28, no. 7, pp. 1222-1232, September, 2010.   DOI
8 O. Yang and W. Heinzelman, "Sleeping Multipath Routing: A Trade-off between Reliability and Lifetime in Wireless Sensor Networks," in Proc. of Globecom, December, 2011.
9 F. Kuhn, R. Wattenhofer, and A. Zollinger, "An algorithmic approach to geographic routing in ad hoc and sensor networks," IEEE Transactions on Networking, vol. 16, no. 1, pp. 51-62, February, 2008.   DOI
10 G. Trajcevski, F. Zhou, R. Tamassia, and B. Avii, "Bypassing Holes in Sensor Networks: Load-balance VS. Latency," in Proc. of Globecom, December, 2011.
11 J. Chen, Y. Chen, L. Zhou, and Y. Du, "A Data Gathering Approach for Wireless Sensor Network with Quadrotor-based Mobile Sink Node," KSII Transactions on Internet and Information Systems, vol. 6, no. 10, pp. 2529-2547, October , 2012.
12 L. Zhou, Q. Hu, Y. Qian, and H. Chen, "Energy-Spectrum Efficiency Tradeoff for Video Streaming over Mobile Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 5, pp. 981-991, May, 2013.   DOI   ScienceOn
13 M. Gunes, U. Sorges, and I. Bouazizi, "ARA - The Ant-Colony Based Routing Algorithm for MANETs," in Proc. of Int. Conf. on Parallel Processing Workshops, pp. 79-85, August, 2002.
14 C. Perkins and E. Royer, "Ad-hoc on-demand distance vector routing," in Proc. of 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, Feburary, 1999.
15 G. Caro, F. Ducatelle, and L. Gambardella, "AntHocNet: an adaptive nature inspired algorithm for routing in mobile ad hoc networks," European Transactions on Telecommunications, vol. 16, no. 5, pp. 443-455, September, 2005.   DOI
16 J. Wang, E. Osagie, P. Thulasiraman, and R. Thulasiram, "HOPNET: A hybrid ant colony optimization routing algorithm for mobile ad hoc network," Ad Hoc Networks, vol. 7, no. 4, pp. 690-705, June, 2009.   DOI   ScienceOn
17 T. Nakagaki, H. Yamada, and A. Toth, "Maze-solving by an amoeboid organism," Nature, vol. 407, p. 470, September, 2000.   DOI
18 A. Tero, R. Kobayashi, and T. Nakagaki, "A mathematical model for adaptive transport network in path finding by true slime mold," Journal of Theoretical Biology, vol. 244, no. 4, pp. 553-564, Feburary, 2007.   DOI
19 G. Zhan, W. Shi, and J. Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs," IEEE Trans. On Dependable and Secure Computing, vol. 9, no. 2, pp. 184-197, March, 2012.   DOI
20 G. Wei, R. Xu, and B. Liu, "Research on Subjective Trust Routing Algorithm for Mobile Ad Hoc Networks," in Proc. of WiCOM, September, 2010.
21 F. Bao, I. Chen, M. Chang, and J. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection," IEEE Trans. On Network and Service Management, vol. 9, no. 2, pp. 169-183, June, 2012.   DOI
22 H. Xia ,Z. Jia, X. Li, L. Jua, and E. Shab, "Trust prediction and trust-based source routing in mobile ad hoc networks," Ad Hoc Networks, vol. 11, no. 6, pp. 2096-2114, September, 2013.   DOI
23 D. Dasgupta, S. Yu, and F. Nino, "Recent Advances in Artificial Immune Systems: Models and Applications," Applied Soft Computing, vol. 11, no. 2, pp. 1574-1587, March, 2011.   DOI
24 D. Dal, S. Abraham, A. Abraham, S. Sanyal, and M. Sanglikar, "Evolution Induced Secondary Immunity: An Artificial Immune System based Intrusion Detection System," in Proc. of Int. Conf. on Computer Information Systems and Industrial Management Applications, pp. 65-70, June, 2008.
25 H. Yang, J. Guo, and F. Deng, "Collaborative RFID intrusion detection with an artificial immune system," Journal of Intelligent Information Systems, vol. 36, no. 1, pp. 1-26, February, 2011.   DOI
26 J. Rao and A. O. Fapojuwo, "A Battery Aware Distributed Clustering and Routing Protocol for Wireless Sensor Networks," in Proc. of WCNC, pp.1538-1543, April, 2012.