Information-Aware Secure Routing in Wireless Sensor Networks
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and stat...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-12-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/20/1/165 |
id |
doaj-58caa7f82bfb4ce681a58755cbaf99d4 |
---|---|
record_format |
Article |
spelling |
doaj-58caa7f82bfb4ce681a58755cbaf99d42020-11-25T02:21:53ZengMDPI AGSensors1424-82202019-12-0120116510.3390/s20010165s20010165Information-Aware Secure Routing in Wireless Sensor NetworksQiong Shi0Li Qin1Yinghua Ding2Boli Xie3Jiajie Zheng4Lipeng Song5Science and Technology on Electronic Test & Measurement Laboratory, North University of China, Taiyuan 030051, Shan’xi, ChinaScience and Technology on Electronic Test & Measurement Laboratory, North University of China, Taiyuan 030051, Shan’xi, ChinaSchool of Computer Science and technology, North University of China, TaiYuan 030051, Shan’xi, ChinaDepartment of Mathematics, North University of China, Taiyuan 030051, Shan’xi, ChinaSchool of Computer Science and technology, North University of China, TaiYuan 030051, Shan’xi, ChinaSchool of Computer Science and technology, North University of China, TaiYuan 030051, Shan’xi, ChinaSecure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm.https://www.mdpi.com/1424-8220/20/1/165secure routingtrust calculationattack probabilityinformation-awareglobal optimization |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Qiong Shi Li Qin Yinghua Ding Boli Xie Jiajie Zheng Lipeng Song |
spellingShingle |
Qiong Shi Li Qin Yinghua Ding Boli Xie Jiajie Zheng Lipeng Song Information-Aware Secure Routing in Wireless Sensor Networks Sensors secure routing trust calculation attack probability information-aware global optimization |
author_facet |
Qiong Shi Li Qin Yinghua Ding Boli Xie Jiajie Zheng Lipeng Song |
author_sort |
Qiong Shi |
title |
Information-Aware Secure Routing in Wireless Sensor Networks |
title_short |
Information-Aware Secure Routing in Wireless Sensor Networks |
title_full |
Information-Aware Secure Routing in Wireless Sensor Networks |
title_fullStr |
Information-Aware Secure Routing in Wireless Sensor Networks |
title_full_unstemmed |
Information-Aware Secure Routing in Wireless Sensor Networks |
title_sort |
information-aware secure routing in wireless sensor networks |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2019-12-01 |
description |
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm. |
topic |
secure routing trust calculation attack probability information-aware global optimization |
url |
https://www.mdpi.com/1424-8220/20/1/165 |
work_keys_str_mv |
AT qiongshi informationawaresecureroutinginwirelesssensornetworks AT liqin informationawaresecureroutinginwirelesssensornetworks AT yinghuading informationawaresecureroutinginwirelesssensornetworks AT bolixie informationawaresecureroutinginwirelesssensornetworks AT jiajiezheng informationawaresecureroutinginwirelesssensornetworks AT lipengsong informationawaresecureroutinginwirelesssensornetworks |
_version_ |
1724864900885381120 |