Information-Aware Secure Routing in Wireless Sensor Networks

Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and stat...

Full description

Bibliographic Details
Main Authors: Qiong Shi, Li Qin, Yinghua Ding, Boli Xie, Jiajie Zheng, Lipeng Song
Format: Article
Language:English
Published: MDPI AG 2019-12-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/1/165
id doaj-58caa7f82bfb4ce681a58755cbaf99d4
record_format Article
spelling doaj-58caa7f82bfb4ce681a58755cbaf99d42020-11-25T02:21:53ZengMDPI AGSensors1424-82202019-12-0120116510.3390/s20010165s20010165Information-Aware Secure Routing in Wireless Sensor NetworksQiong Shi0Li Qin1Yinghua Ding2Boli Xie3Jiajie Zheng4Lipeng Song5Science and Technology on Electronic Test & Measurement Laboratory, North University of China, Taiyuan 030051, Shan’xi, ChinaScience and Technology on Electronic Test & Measurement Laboratory, North University of China, Taiyuan 030051, Shan’xi, ChinaSchool of Computer Science and technology, North University of China, TaiYuan 030051, Shan’xi, ChinaDepartment of Mathematics, North University of China, Taiyuan 030051, Shan’xi, ChinaSchool of Computer Science and technology, North University of China, TaiYuan 030051, Shan’xi, ChinaSchool of Computer Science and technology, North University of China, TaiYuan 030051, Shan’xi, ChinaSecure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm.https://www.mdpi.com/1424-8220/20/1/165secure routingtrust calculationattack probabilityinformation-awareglobal optimization
collection DOAJ
language English
format Article
sources DOAJ
author Qiong Shi
Li Qin
Yinghua Ding
Boli Xie
Jiajie Zheng
Lipeng Song
spellingShingle Qiong Shi
Li Qin
Yinghua Ding
Boli Xie
Jiajie Zheng
Lipeng Song
Information-Aware Secure Routing in Wireless Sensor Networks
Sensors
secure routing
trust calculation
attack probability
information-aware
global optimization
author_facet Qiong Shi
Li Qin
Yinghua Ding
Boli Xie
Jiajie Zheng
Lipeng Song
author_sort Qiong Shi
title Information-Aware Secure Routing in Wireless Sensor Networks
title_short Information-Aware Secure Routing in Wireless Sensor Networks
title_full Information-Aware Secure Routing in Wireless Sensor Networks
title_fullStr Information-Aware Secure Routing in Wireless Sensor Networks
title_full_unstemmed Information-Aware Secure Routing in Wireless Sensor Networks
title_sort information-aware secure routing in wireless sensor networks
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2019-12-01
description Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm.
topic secure routing
trust calculation
attack probability
information-aware
global optimization
url https://www.mdpi.com/1424-8220/20/1/165
work_keys_str_mv AT qiongshi informationawaresecureroutinginwirelesssensornetworks
AT liqin informationawaresecureroutinginwirelesssensornetworks
AT yinghuading informationawaresecureroutinginwirelesssensornetworks
AT bolixie informationawaresecureroutinginwirelesssensornetworks
AT jiajiezheng informationawaresecureroutinginwirelesssensornetworks
AT lipengsong informationawaresecureroutinginwirelesssensornetworks
_version_ 1724864900885381120