A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.

[1]  Shibo He,et al.  Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks , 2017, IEEE Internet of Things Journal.

[2]  Guo-Tan Liao,et al.  FBT: an efficient traceback scheme in hierarchical wireless sensor network , 2009, Secur. Commun. Networks.

[3]  Xi Chen,et al.  Dynamic power management and adaptive packet size selection for IoT in e-Healthcare , 2018, Comput. Electr. Eng..

[4]  Anfeng Liu,et al.  Quality Utilization Aware Based Data Gathering for Vehicular Communication Networks , 2018, Wirel. Commun. Mob. Comput..

[5]  Naixue Xiong,et al.  Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things , 2017, Future Gener. Comput. Syst..

[6]  Qinglei Kong,et al.  Achieve Location Privacy-Preserving Range Query in Vehicular Sensing , 2017, Sensors.

[7]  Jian Deng,et al.  Multi-Hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality , 2018, IEEE Access.

[8]  Bo-Chao Cheng,et al.  A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks , 2008, Comput. Commun..

[9]  Jie Wu,et al.  Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..

[10]  Hwee Pink Tan,et al.  Energy-neutral scheduling and forwarding in environmentally-powered wireless sensor networks , 2013, Ad Hoc Networks.

[11]  Panlong Yang,et al.  R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi , 2017, IEEE Journal on Selected Areas in Communications.

[12]  Xiao Liu,et al.  Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor Based Networks , 2018, Wirel. Commun. Mob. Comput..

[13]  Anfeng Liu,et al.  Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things , 2018, Wirel. Commun. Mob. Comput..

[14]  Matthew Ettus,et al.  System capacity, latency, and power consumption in multihop-routed SS-CDMA wireless networks , 1998, Proceedings RAWCON 98. 1998 IEEE Radio and Wireless Conference (Cat. No.98EX194).

[15]  Minyi Guo,et al.  LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[16]  Kai Zhou,et al.  Flexible Adjustments Between Energy and Capacity for Topology Control in Heterogeneous Wireless Multi-hop Networks , 2016, Journal of Network and Systems Management.

[17]  Naixue Xiong,et al.  Integrated collaborative filtering recommendation in social cyber-physical systems , 2017, Int. J. Distributed Sens. Networks.

[18]  Naixue Xiong,et al.  A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network , 2018, IEEE Access.

[19]  Jianfeng Ma,et al.  A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.

[20]  Anfeng Liu,et al.  A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs , 2018, IEEE Access.

[21]  Hung-Min Sun,et al.  An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[22]  Sabato Manfredi,et al.  Decentralized Control Algorithm for Fast Monitoring and Efficient Energy Consumption in Energy Harvesting Wireless Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[23]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[24]  Xiao Liu,et al.  MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs , 2016, IEICE Trans. Inf. Syst..

[25]  Zhiwen Zeng,et al.  A resource allocation model based on double-sided combinational auctions for transparent computing , 2018, Peer Peer Netw. Appl..

[26]  Jie Wu,et al.  Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[27]  Driss Aboutajdine,et al.  A Uniform Balancing Energy Routing Protocol for Wireless Sensor Networks , 2010, Wirel. Pers. Commun..

[28]  Qing Liu,et al.  On the hybrid using of unicast-broadcast in wireless sensor networks , 2017, Comput. Electr. Eng..

[29]  Xiao Liu,et al.  A Time and Location Correlation Incentive Scheme for Deep Data Gathering in Crowdsourcing Networks , 2018, Wirel. Commun. Mob. Comput..

[30]  Anfeng Liu,et al.  A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs , 2015 .

[31]  Terence D. Todd,et al.  Energy Provisioning in Solar-Powered Wireless Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.

[32]  Toshitaka Tsuda,et al.  Data Driven Cyber-Physical System for Landslide Detection , 2019, Mob. Networks Appl..

[33]  Qiang Liu,et al.  A Survey on Security-Aware Measurement in SDN , 2018, Secur. Commun. Networks.

[34]  Mani B. Srivastava,et al.  Power management in energy harvesting sensor networks , 2007, TECS.

[35]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[36]  Naixue Xiong,et al.  QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks , 2018, IEEE Access.

[37]  Fang Liu,et al.  Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.

[38]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[39]  Kok-Keong Loo,et al.  Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .

[40]  Laurence T. Yang,et al.  Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..

[41]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[42]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[43]  Xiao Liu,et al.  Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of Things , 2018, EURASIP J. Wirel. Commun. Netw..

[44]  Vijay K. Bhargava,et al.  Wireless sensor networks with energy harvesting technologies: a game-theoretic approach to optimal energy management , 2007, IEEE Wireless Communications.

[45]  Jie Wu,et al.  e-Sampling , 2017, ACM Trans. Auton. Adapt. Syst..

[46]  Jun Xu,et al.  Traceback in wireless sensor networks with packet marking and logging , 2011, Frontiers of Computer Science in China.

[47]  Mianxiong Dong,et al.  QUOIN: Incentive Mechanisms for Crowd Sensing Networks , 2018, IEEE Network.

[48]  Xiao Liu,et al.  Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs , 2017, Sensors.

[49]  Andrew G. Barto,et al.  Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[50]  Anfeng Liu,et al.  Cross-layer design for reducing delay and maximizing lifetime in industrial wireless sensor networks , 2018, EURASIP J. Wirel. Commun. Netw..

[51]  S. Peng,et al.  Prediction free energy neutral power management for energy harvesting wireless sensor nodes , 2014, Ad Hoc Networks.

[52]  M. Shruthi,et al.  Secure Distributed Deduplication Systems with Improved Reliability , 2016 .

[53]  Guihai Chen,et al.  Quality of Energy Provisioning for Wireless Power Transfer , 2015, IEEE Transactions on Parallel and Distributed Systems.

[54]  Chor Ping Low,et al.  Throughput optimal energy neutral management for energy harvesting wireless sensor networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[55]  Yusheng Ji,et al.  Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing , 2017, Comput. Networks.

[56]  Xiao Liu,et al.  Big program code dissemination scheme for emergency software-define wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..

[57]  Anfeng Liu,et al.  An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks , 2018, Secur. Commun. Networks.

[58]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[59]  Naixue Xiong,et al.  An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs , 2018, Inf. Sci..