Browse > Article
http://dx.doi.org/10.4218/etrij.2020-0147

Trust-aware secure routing protocol for wireless sensor networks  

Hu, Huangshui (College of Computer Science and Engineering, Changchun University of Technology)
Han, Youjia (College of Computer Science and Engineering, Changchun University of Technology)
Wang, Hongzhi (College of Computer Science and Engineering, Jilin University of Architecture and Technology)
Yao, Meiqin (College of Computer Science and Engineering, Changchun University of Technology)
Wang, Chuhang (College of Computer Science and Technology, Changchun Normal University)
Publication Information
ETRI Journal / v.43, no.4, 2021 , pp. 674-683 More about this Journal
Abstract
A trust-aware secure routing protocol (TSRP) for wireless sensor networks is proposed in this paper to defend against varieties of attacks. First, each node calculates the comprehensive trust values of its neighbors based on direct trust value, indirect trust value, volatilization factor, and residual energy to defend against black hole, selective forwarding, wormhole, hello flood, and sinkhole attacks. Second, any source node that needs to send data forwards a routing request packet to its neighbors in multi-path mode, and this continues until the sink at the end is reached. Finally, the sink finds the optimal path based on the path's comprehensive trust values, transmission distance, and hop count by analyzing the received packets. Simulation results show that TSRP has lower network latency, smaller packet loss rate, and lower average network energy consumption than ad hoc on-demand distance vector routing and trust based secure routing protocol.
Keywords
Direct trust value; energy efficiency; indirect trust value; secure routing; trust-aware; wireless sensor networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing, in Proc. IEEE Workshop Mobile Comput. Syst. Appl. (New Orleans, LA, USA), Feb. 1999, pp. 90-100, doi: https://doi.org/10.1109/MCSA.1999.749281.   DOI
2 W. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proc. Annu. Hawaii Int. Conf. Syst. Sci. (Maui, HI, USA), Jan. 2000, pp. 3005-3014.
3 O. Alfarraj, A. A. Alzubi, and A. Tolba, Trust-based neighbor selection using activation function for secure routing in wireless sensor networks, J. Ambient Intell. Humanized Comput. (2018), 1-11, doi: https://doi.org/10.1007/s12652-018-0885-1.   DOI
4 H. Bashirpour et al., An improved digital signature protocol to multi-user broadcast authentication based on elliptic curve cryptography in wireless sensor networks (WSNs), Math. Comput. Appl. 23 (2018), 1-15.
5 U. S. Kumaran and P. Ilango, Secure authentication and integrity techniques for randomized secured routing in WSN, Wirel. Netw. 21 (2015), 443-451.   DOI
6 M. Elhoseny et al., A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption, J. King Saud Univ.-Comput. Inf. Sci. Archive 28 (2016), 262-275.
7 M. Elhoseny et al., An energy efficient encryption method for secure dynamic WSN, Secur. Commun. Netw. 9 (2016), 2024-2031.   DOI
8 B. Jiang et al., Trust based energy efficient data collection with unmanned aerial vehicle in edge network, Trans. Emerging Telecommun. Technol. (2020), e3942, doi: https://doi.org/10.1002/ett.3942.   DOI
9 B. Priayoheswari et al., Beta reputation and direct trust model for secure communication in wireless sensor networks, in Proc. Int. Conf. Inf. Analytics (Pondicherry, India), Aug. 2016, 73:1-11, doi: https://doi.org/10.1145/2980258.2980413   DOI
10 D. Airehrour, J. Gutierrez, and S. K. Ray, Gradetrust: A secure trust based routing protocol for MANETs, in Proc. Int. Telecommun. Netw. Appl. Conf. (Sydney, Australia), Nov. 2015. pp. 65-70.
11 T. Wang et al., A trusted and energy efficient approach for cluster-based wireless sensor networks, Int. J. Distrib. Sensor Netw. 12 (2016), 1-13.
12 S. Raza et al., Trust based energy preserving routing protocol in multi-hop WSN, in Networked Systems, vol. 9466, Springer, Cham, Switzerland, 2015, pp. 518-523, doi: https://doi.org/10.1007/978-3-319-26850-7_42   DOI
13 H. Lazrag, R. Saadane, D. Aboutajdine, A game theoretic approach for optimal and secure routing in WSN, in Proc. Int. AfroEur. Conf. Industrial Adv. (Marrakesh, Morocco), Nov. 2016, pp. 218-228.
14 A. Ahmed et al., Countering node misbehavior attacks using trust based secure routing protocol, TELKOMNIKA Telecommun. Comput. Electron. Contr. 13 (2015), 260-268.
15 Y. Ren et al., A trust-based minimum cost and quality aware data collection scheme in P2P network, Peer-to-Peer Netw. Appl. 13 (2020), 2300-2323, doi: https://doi.org/10.1007/s12083-020-00898-2   DOI
16 Y. Liu et al., ActiveTrust: Secure and trustable routing in wireless sensor networks, IEEE Trans. Inf. Forensics Secur. 11 (2016), 2013-2027.   DOI
17 Y. M. Zhou and L. Y. Li, A trust-aware and location-based secure routing protocol for WSN, Appl. Mechan. Mater. 373-375 (2013), 1931-1934.   DOI
18 M. Al-Shalabi et al., Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm, Inf. Sci. 500 (2019), 259-273.   DOI
19 M. Elhoseny et al., Optimizing K-coverage of mobile WSNs, Expert Syst. Appl. 92 (2018), 142-153.   DOI
20 Z. Sun et al., Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks, Appl. Soft Comput. 77 (2019), 366-375.   DOI
21 M. Selvi et al., An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks, Wirel. Pers. Commun. 105 (2019), 1475-1490.   DOI
22 T. Li et al., Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things, Trans Emerging Telecommun. Technol. (2020), e3956, https://doi.org/10.1002/ett.3956.   DOI
23 Ahmed et al., Energy-aware and secure routing with trust for disaster response wireless sensor network, Peer-to-peer Netw. Applicat. 10 (2017), 216-237.   DOI
24 G. Zhang et al., Using trust to establish a secure routing model in cognitive radio network, PLoS One 10 (2015), no. 9, e0139326, doi: https://doi.org/10.1371/journal.pone.0139326   DOI
25 P. Gong, T. M. Chen, and Q. Xu, ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks, J. Sensors 2015 (2015), 1-10.
26 G. Dhand and S. S. Tyagi, SMEER: Secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks, Wirel. Pers. Commun. 105 (2019), 17-35.   DOI
27 L. Yao, F. X. Gao, and L. Cong, Research on static game theory based secure routing algorithm in WSN, Appl. Mechan. Mater. 571-572 (2014), 1030-1036.   DOI
28 D. Qin et al., Research on trust sensing based secure routing mechanism for wireless sensor network, Int. Conf. Commun. 5 (2017), 9599-9609.