[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Trust Based Scheme for IoT Enabled Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Many research in the literature address the problem of aggregating data in wireless sensor network (WSN) applications. Data aggregation techniques of WSN using external mobile elements (ME) are, recently, proposed. Only few of the proposed techniques consider the trust factor when selecting one network component to send the data to the base station. In this paper, we introduce a new trust scheme that assigns the task of sending the aggregated data to only the most reliable external MEs of the WSN, in order to reduce data loss. Experimental results show that the proposed scheme performs well in terms of reducing the data and energy loss while not negatively affecting the network coverage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abdulsalam, H. M., & Ali, B. A. (2013). W-LEACH based dynamic adaptive data aggregation algorithm for wireless sensor networks. International Journal of Distributed Sensor Networks, 9, 289527.

    Article  Google Scholar 

  2. Abdulsalam, H. M., Ali, B. A., & AlRoumi, E. (2017). Usage of mobile elements in internet of things environment for data aggregation in wireless sensor networks. Computers & Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2017.12.028.

    Google Scholar 

  3. Abdulsalam, H. M., & Kamel, L. K. (2010). W-LEACH: Weighted low energy adaptive clustering hierarchy aggregation algorithm for data streams in wireless sensor networks. In Proceedings of workshops of the 10th IEEE international conference on data mining (ICDM 2010) (pp. 1–8). Sydney, Australia.

  4. Abdulsalam, H. M., & Kamel, L. K. (2011). Data aggregation for evolving wireless sensor networks using W-LEACH. In Proceedings of the second Kuwait conference on e-services and e-systems, KCESS ’11 (pp. 1–5). Kuwait City, Kuwait.

  5. Ahmed, A., & Qazi, S. (2013). Cluster head selection algorithm for mobile wireless sensor networks. In International conference on open source systems and technologies (pp. 120–125).

  6. Ahton, K. (2009). Internet of things. RFID Journal [online]. http://www.rfidjournal.com/articles/view?4986.

  7. Asaduzzaman, A., & Kong, H. Y. (2010). Energy efficient cooperative leach protocol for wireless sensor networks. Journal of Communications and Networks, 12(4), 358–365.

    Article  Google Scholar 

  8. Ateniese, G., Bianchi, G., Capossele, A. T., Petrioli, C., & Spenza, D. (2017). Low-cost standard signatures for energy-harvesting wireless sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 16(3), 64:1–64:23.

    Article  Google Scholar 

  9. Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  MATH  Google Scholar 

  10. Banerjee, T., & Agrawal, D. P. (2008). Increasing lifetime of wireless sensor networks using controllable mobile cluster heads. In IEEE international performance, computing and communications conference (pp. 77–84).

  11. Banerjee, T., Xie, B., Jun, J. H., & Agrawal, D. P. (2007). LIMOC: enhancing the lifetime of a sensor network with mobile clusterheads. In Vehicular technology conference (pp. 133–137).

  12. Banerjee, T., Xie, B., Jun, J. H., & Agrawal, D. P. (2010). Increasing lifetime of wireless sensor networks using controllable mobile cluster heads. Wireless Communication and Mobile Computing, 10(3), 313–336.

    Google Scholar 

  13. Bao, F., Chen, R., Chang, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.

    Article  Google Scholar 

  14. Chandrakasan, A., Smith, A., & Heinzelman, W. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Article  Google Scholar 

  15. Crosby, G. V., Pissinou, N., & Gadze, J. (2006). A framework for trust-based cluster head election in wireless sensor networks. In Second IEEE workshop on dependability and security in sensor networks and systems, DSSNS 2006. IEEE.

  16. Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.

    Article  Google Scholar 

  17. Dini, G., & Savino, I. M. (2011). LARK: a lightweight authenticated rekeying scheme for clustered wireless sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 10(4), 41:1–41:35.

    Article  Google Scholar 

  18. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.

    Article  Google Scholar 

  19. Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H.-C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.

    Article  MATH  Google Scholar 

  20. Heinzelman, W. B. (2000). Application-specific protocol architectures for wireless networks, PhD thesis. Massachusetts: Institute of Technology.

  21. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Hawaii international conference on system sciences (pp. 3005–3014).

  22. Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., & Silva, F. (2003). Directed diffusion for wireless sensor networking. IEEE/ACM Transactions on Networking, 11, 2–16.

    Article  Google Scholar 

  23. Jurdak, R., Nafaa, A., & Barbirato, A. (2008). Large scale environmental monitoring through integration of sensor and mesh networks. Sensors, 8(11), 7493–7517.

    Article  Google Scholar 

  24. Kim, D. S., & Chung, Y. J. (2006). Self-organization routing protocol supporting mobile nodes for wireless sensor network. In First international multi-symposiums on computer and computational sciences, IMSCCS ’06 (pp. 622–626, Vol. 2).

  25. Kumar, G. S., Vinu, P. M. V., & Jacob, K. P. (2008). Mobility metric based leach-mobile protocol. In 16th international conference on advanced computing and communications (pp. 248–253).

  26. Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.

    Article  Google Scholar 

  27. Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33(9), 1086–1093.

    Article  Google Scholar 

  28. Ma, M., & Yang, Y. (2006). Clustering and load balancing in hybrid sensor networks with mobile cluster heads. In Proceedings of the 3rd international conference on quality of service in heterogeneous wired/wireless networks. ACM.

  29. Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002). TAG: A tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Operating Systems Review, 36(SI), 131–146.

    Article  Google Scholar 

  30. Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.

    Article  Google Scholar 

  31. Nasser, N., Al-Yatama, A., & Saleh, K. (2013). Zone-based routing protocol with mobility consideration for wireless sensor networks. Telecommunication Systems, 52(4), 2541–2560.

    Article  Google Scholar 

  32. Nogoorani, S. D., & Jalili, R. (2012). Uncertainty in probabilistic trust models. In 2012 IEEE 26th international conference on advanced information networking and applications (AINA) (pp. 511–517). IEEE.

  33. Pradhan, J., & Sarje, A. (2012). A fault tolerant approach for data aggregation in wireless sensor networks. In Proceedings of the international conference on advances in computing, communications and informatics, ICACCI ’12 (pp. 382–386). Chennai, India.

  34. Rani, V. U., & Sundaram, K. S. (2014). Review of trust models in wireless sensor networks. International Journal of Computer, Information, Systems and Control Engineering, 8(2), 371–377.

    Google Scholar 

  35. Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.

    Article  Google Scholar 

  36. Sun, Y., Han, Z., & Liu, K. R. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.

    Article  Google Scholar 

  37. Sutaone, M., Mukherj, P., & Paranjape, S. (2016). Trust-based cluster head validation and outlier detection technique for mobile wireless sensor networks. In International conference on wireless communications, signal processing and networking (WiSPNET) (pp. 2066–2070). IEEE.

  38. Thein, M., & Thein, T. (2010). An Energy Efficient Cluster-Head Selection for Wireless Sensor Networks. In Proceedings of international conference on intelligent systems, modelling and simulation (pp. 287–291). Liverpool, England.

  39. Van Kranenburg, R., Anzelmo, E., Bassi, A., Caprio, D., Dodson, S., & Ratto, M. (2011). The internet of things. In A critique of ambient technology and the all-seeing network of RFID, network notebooks (Vol. 2).

  40. Whitby, A., Jøsang, A., & Indulska, J. (2004). Filtering out unfair ratings in Bayesian reputation systems. In Proceedings of 7th international workshop on trust in agent societies (pp. 106–117, Vol. 6).

  41. Xiangning, F., & Yulin, S. (2007). Improvement on LEACH protocol of wireless sensor network. In Proceedings of international conference on sensor technologies and applications (pp. 260–264). Valencia, Spain.

  42. Yassein, M. B., Al-zou’bi, A., Khamayseh, Y., & Mardini, W. (2009). Improvement on leach protocol of wireless sensor network (VLEACH). International Journal of Digital Content Technology and Its Applications, 3(2), 132–136.

    Article  Google Scholar 

  43. Zhang, J., Shankaran, R., Mehmet, A. O., Varadharajan, V., & Sattar, A. (2010). A trust management architecture for hierarchical wireless sensor networks. In 2010 IEEE 35th conference on local computer networks (LCN) (pp. 264–267). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bader A. Ali.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ali, B.A., Abdulsalam, H.M. & AlGhemlas, A. Trust Based Scheme for IoT Enabled Wireless Sensor Networks. Wireless Pers Commun 99, 1061–1080 (2018). https://doi.org/10.1007/s11277-017-5166-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-5166-3

Keywords

Navigation