ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks

Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security. More importantly, the generation and the distribution of detection routes are given in the ActiveTrust scheme, which can fully use the energy in non-hotspots to create as many detection routes as needed to achieve the desired security and energy efficiency. Both comprehensive theoretical analysis and experimental results indicate that the performance of the ActiveTrust scheme is better than that of the previous studies. ActiveTrust can significantly improve the data route success probability and ability against black hole attacks and can optimize network lifetime.

[1]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[2]  Sung-Ju Lee,et al.  Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Satish K. Tripathi,et al.  A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[6]  Wenjing Lou,et al.  H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.

[7]  Hung-Min Sun,et al.  An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[8]  Meng-Yen Hsieh,et al.  Adaptive security design with malicious node detection in cluster-based sensor networks , 2007, Comput. Commun..

[9]  Lionel M. Ni,et al.  A Reliability-oriented Transmission Service in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[10]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[11]  Mounir Frikha,et al.  Load-balancing in MANET shortest-path routing protocols , 2009, Ad Hoc Networks.

[12]  Tae Ho Cho,et al.  A multi-path interleaved hop-by-hop en-route filtering scheme in wireless sensor networks , 2010, Comput. Commun..

[13]  Jiming Chen,et al.  Energy provisioning in wireless rechargeable sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[14]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[15]  Weisong Shi,et al.  SensorTrust: A resilient trust model for wireless sensing systems , 2011, Pervasive Mob. Comput..

[16]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[17]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[18]  Theodore B. Zahariadis,et al.  Combining trust with location information for routing in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..

[19]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[20]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[21]  Xin Jin,et al.  Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network , 2013, Inf. Sci..

[22]  Jiming Chen,et al.  Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[23]  Satria Mandala,et al.  Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks , 2014, SSCC.

[24]  Athanasios V. Vasilakos,et al.  Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[25]  Jiming Chen,et al.  Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks , 2014, IEEE Transactions on Mobile Computing.

[26]  Peng Zhou,et al.  Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.

[27]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[28]  Mianxiong Dong,et al.  An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing , 2015, J. Parallel Distributed Comput..

[29]  Victor C. M. Leung,et al.  An Authenticated Trust and Reputation Calculation , 2017 .

[30]  Anfeng Liu,et al.  An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs , 2015, Comput. J..

[31]  Mianxiong Dong,et al.  PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs , 2015, Sensors.

[32]  Minyi Guo,et al.  Mobile Target Detection in Wireless Sensor Networks With Adjustable Sensing Frequency , 2016, IEEE Systems Journal.

[33]  Zhongming Zheng,et al.  Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.

[34]  T. L. Priyadarsini,et al.  Secure Data Collection in Wireless Sensor Networks using Randomized Dispersive Routes , 2016 .

[35]  Minyi Guo,et al.  Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[36]  Mianxiong Dong,et al.  Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory , 2016, IEEE Transactions on Services Computing.