Abstract
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and exposed to variety of security attacks. Characterized by constrained resources and dynamically changing behavior of sensor nodes, reliable data delivery in WSNs is nontrivial. To counter node misbehavior attacks, traditional cryptographic and authentication based solutions have proved to be inappropriate due to high cost and incapability factors. Recently, trust based solutions have appeared to be viable solutions to address nodes’ misbehavior attacks. However, the existing trust based solutions incur high cost in trust estimation and network-wide dissemination which significantly increases traffic congestion and undermines network lifetime. This paper presents a Trust and Energy aware Secure Routing Protocol (TESRP) for WSN that exploits a distributed trust model for discovering and isolating misbehaving nodes. TESRP employs a multi-facet routing strategy that takes into consideration the trust level, residual energy, and hop-counts of neighboring nodes while making routing decisions. This strategy not only ensures data dissemination via trusted nodes but also balances out energy consumption among trusted nodes while traversing through shorter paths. Demonstrated by simulation results in NS-2, TESRP achieves improved performance in terms of energy consumption, throughput and network lifetime as compared to existing solutions.
Similar content being viewed by others
References
Haque MM, Pathan A-SK, Hong CS, Huh E-N (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Trans Internet Inf Syst 2(5):265–279. doi:10.3837/tiis.2008.05.004
Hu Y-C, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Netw 1(1):175–192. doi:10.1016/S1570-8705(03)00019-2
Hu Y-C, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for Ad Hoc networks. Wirel Netw 11(1–2):21–38. doi:10.1007/s11276-004-4744-y
Zhang K, Wang C and Wang C (2008) A secure routing protocol for cluster-based wireless sensor networks using group key management. In: 2008 4th international conference on wireless communications, networking and mobile computing (pp. 1–5). IEEE. doi:10.1109/WiCom.2008.889
Mohaisen A (2009) On the insecurity of asymmetric key-based architecture in wireless sensor networks. KSII Trans Internet Inf Syst 3(4):376–384. doi:10.3837/tiis.2009.04.003
Momani M, Challa S (2010) Survey of trust models in different network domains. Int J Ad Hoc Sens Ubiquit Comput 1(3):1–19
Cordasco J, Wetzel S (2008) Cryptographic versus trust-based methods for MANET routing security. Electron Notes Theor Comput Sci 197(2):131–140. doi:10.1016/j.entcs.2007.12.022
Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090
Becher A, Benenson Z and Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Technical report. Springer Berlin, Heidelberg
Govindan K, Mohapatra P (2012) Trust computations and trust dynamics in mobile Ad Hoc networks: a survey. IEEE Commun Surv Tutor 14(2):279–298. doi:10.1109/SURV.2011.042711.00083
Yu Y, Li K, Zhou W, Li P (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35(3):867–880. doi:10.1016/j.jnca.2011.03.005
Chang K-D, Chen J-L (2012) A survey of trust management in WSNs, internet of things and future internet. KSII Trans Internet Inf Syst 6(1):5–23. doi:10.3837/tiis.2012.01.001
Zhang C, Zhu X, Song Y and Fang Y (2010). A formal study of trust-based routing in wireless Ad Hoc networks. In: 2010 I.E. proceedings INFOCOM (pp. 1–9)
Fernandez-Gago MC, Roman R and Lopez J (2007) a survey on the applicability of trust management systems for wireless sensor networks. In: Third IEEE international workshop on security, privacy and trust in pervasive and ubiquitous computing, 2007. SECPerU (pp. 25–30)
Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed Reputation-based Beacon Trust System. In 2nd IEEE international symposium on dependable, autonomic and secure computing, (pp. 277–283). IEEE. doi:10.1109/DASC.2006.28
Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sens Netws 4(3):1–37. doi:10.1145/1362542.1362546
Michiardi P and Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad hoc networks. In: Advanced communications and multimedia security (pp. 107–121). Springer US
Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2012) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Pers Commun 69(2):805–826. doi:10.1007/s11277-012-0613-7
Tanachaiwiwat S, Davel P, Bhindwale R and Helmyl A (2004). Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks. In: IEEE international conference on performance, computing, and communications. (pp. 463–469). IEEE
Gheorghe, L, Rughiniș R and Țăpuș N (2012). Trust and energy-aware routing protocol for wireless sensor networks. In: The 8th international conference on wireless and mobile communications (ICWMC) (pp. 388–394)
Choudhury S, Roy SD and Singh SA (2008). Trust management in Ad Hoc network for secure DSR routing. In: Novel algorithms and techniques in telecommunications, automation and industrial electronics (pp. 495–500). Springer
Channa MI, Ahmed KM (2011) A reliable routing scheme for post-disaster Ad Hoc communication networks. J Commun 6(7):549–557. doi:10.4304/jcm.6.7.549-557
Leligou HC, Trakadas P, Maniatis S, Karkazis P, Zahariadis T (2012) Combining trust with location information for routing in wireless sensor networks. Wirel Commun Mob Comput 12(12):1091–1103. doi:10.1002/wcm.1038
Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692. doi:10.1016/j.adhoc.2013.05.005
Sun Y, Luo H, Das SK (2012) A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Trans Dependable Secure Comput 9(6):785–797
Chen S, Zhang Y, Liu Q, Feng J (2012) Dealing with dishonest recommendation: the trials in reputation management court. Ad Hoc Netw 10(8):1603–1618. doi:10.1016/j.adhoc.2011.07.014
Gong W, You Z, Chen D, Zhao X, Gu M, Lam K-Y (2010) Trust based routing for misbehavior detection in Ad Hoc networks. J Netw 5(5):551–558. doi:10.4304/jnw.5.5.551-558
Cho J, Swami A, Chen I (2011) A survey on trust management for mobile Ad Hoc networks. IEEE Commun Surv Tutor 13(4):562–583
Zapata MG and Asokan N (2002) Securing Ad hoc routing protocols. In: Proceedings of the 1st ACM workshop on wireless security (pp. 1–10). ACM
Perrig A, Canetti R, TYgar JD and Song D (2000). Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy (S&P). (pp. 56–73)
Yi S, Naldurg P and Kravets R (2001). Security-aware routing protocol for wireless Ad-hoc networks. In: Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing (pp. 299–302). ACM
Reddy YB and Srivathsan S (2009) Game theory model for selective forward attacks in wireless sensor networks. In: 17th Mediterranean conference on control and automation, MED’09. (pp. 458–463). IEEE. doi:10.1109/MED.2009.5164584
Eissa T, Abdul Razak S, Khokhar RH, Samian N (2013) Trust-based routing mechanism in MANET: design and implementation. Mob Netw Appl 18(5):666–677. doi:10.1007/s11036-011-0328-0
Yang R, Lin C and Jiang Y (2011) Trust based access control in infrastructure-centric environment. In: IEEE international conference on communications (ICC) (pp. 1–5).
Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Dependable Secure Comput 9(2):184–197
Abusalah L, Khokhar A and Guizani M (2006) Trust aware routing in mobile Ad Hoc networks. In: IEEE global telecommunications conference (GLOBECOM’06) (pp. 1–5)
Marchang N, Datta R (2012) Light-weight trust-based routing protocol for mobile Ad Hoc networks. IET Inf Secur 6(2):77–83. doi:10.1049/iet-ifs.2010.0160
Zhang Y and Lee W (2000) Intrusion detection in wireless Ad-Hoc networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 275–283)
Mahmoud ME and Shen XS (2011) Trust-based and energy-aware incentive routing protocol for Multi-hop wireless networks. In: IEEE international conference on communications (ICC) (pp. 1–5). IEEE
Josang A and Ismail R (2002) The beta reputation system. In: 15th bled electronic commerce conference (pp. 324–337). Bled Slovenia
Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Min-Allah N, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur Commun Netw 6(6):669–688. doi:10.1002/sec
Issariyakul T and Hossain E (2012) Introduction to network simulator NS2 (2nd ed.). Springer
Acknowledgments
We are thankful to Universiti Teknologi Malaysia (UTM), Malaysia and Quaid-e-Awam University of Engineering, Science & Technology (Q.U.E.S.T), Nawabshah, Pakistan for providing us tools, environment and financial support to accomplish this research work.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ahmed, A., Bakar, K.A., Channa, M.I. et al. A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network. Mobile Netw Appl 21, 272–285 (2016). https://doi.org/10.1007/s11036-016-0683-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-016-0683-y