A Secure Routing Protocol Based on Reputation Mechanism

The wireless sensor network is often deployed in harsh and unattended environment and is easily attacked and interfered due to its vulnerability. Most of routing protocols for wireless sensor network were initially designed for saving energy and had less consideration on security. In view of this, a secure routing protocol based on reputation mechanism is proposed. Firstly, considering at the problems of trust mechanism including complex computation of trust value and excessive energy consumption, a binomial distribution reputation mechanism (BDRM) is presented. On this basis, aiming at the deficiency of current routing protocol in security defense, a secure routing protocol ST-GEAR is designed. This protocol has a better ability to defend against attacks by introducing the secure bootstrap model and the BDRM in the routing. The simulation results show that the ST-GEAR routing can improve the transmission rate of packet and reduce the loss rate of packet and energy consumption.

[1]  Min-Shiang Hwang,et al.  Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey , 2014, Int. J. Netw. Secur..

[2]  Yang Li-zhen,et al.  SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks , 2008, Wuhan University Journal of Natural Sciences.

[3]  Andreas Pitsillides,et al.  A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.

[4]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2001, MobiCom '01.

[7]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[8]  Shafiullah Khan,et al.  A Survey on Secure Routing in Wireless Sensor Networks , 2013 .

[9]  Ganesh R. Pathak,et al.  Mathematical Model of Security Framework for Routing Layer Protocol in Wireless Sensor Networks , 2016 .

[10]  Nidal Nasser,et al.  SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks , 2007, Comput. Commun..

[11]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[12]  Ayan Kumar Das,et al.  Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network , 2014, SSCC.

[13]  Gerhard P. Hancke,et al.  Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.

[14]  Yanhui Lv,et al.  AN ENERGY GRADIENT BASED HEXAGON CLUSTERING PROTOCOL FOR WIRELESS SENSOR NETWORKS , 2015 .

[15]  Deborah Estrin,et al.  Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .

[16]  Chun-Ta Li,et al.  A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks , 2011, Inf. Sci..

[17]  Bo Wu,et al.  Secure Routing Algorithm Based on Power-Efficient for Wireless Sensor Networks , 2009, PACCS.

[18]  Li Xu,et al.  A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks , 2008, J. Commun..

[19]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..