Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks

Security is an inherent and challenging task in Wireless Sensor Networks (WSNs) characterized by multihop routing and stringent resource constraints such as limited processing capability, storage capacity, communication bandwidth, and energy. Most of the existing trust-based routing schemes require the support of promiscuous mode of operation and gather a large number of recommendations from the neighbors for trust derivation. These result in higher energy consumption, higher communication overhead, and larger memory requirements in a resource constrained sensor network. In this paper, we propose a new two-way acknowledgment-based trust (2-ACKT) framework with individual (2-ACKT-I) and group (2-ACKT-G) acknowledgment to minimize the communication overhead and memory requirement for trust establishment in WSNs. The 2-ACKT protocol calculates the direct trust using a link layer acknowledgment and a two-hop acknowledgment from a downstream neighbor. The simulation and theoretical results indicate that 2-ACKT scheme significantly outperforms the conventional multihop and trust-based routing schemes in terms of packet delivery ratio, network lifetime, communication overhead, and memory requirements.

[1]  Huafeng Wu,et al.  Agent-Based Trust Management Model for Wireless Sensor Networks , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[2]  Jie Wu,et al.  Secure and reliable broadcasting in wireless sensor networks using multi-parent trees , 2009, Secur. Commun. Networks.

[3]  Guangjie Han,et al.  A Reliable Approach of Establishing Trust for Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[4]  Gregory J. Pottie,et al.  Instrumenting the world with wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[5]  Cristina Alcaraz,et al.  Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks , 2009, FOSAD.

[6]  S. Challa,et al.  Can we trust trusted nodes in wireless sensor networks? , 2008, 2008 International Conference on Computer and Communication Engineering.

[7]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[8]  Qinyuan Feng,et al.  RepTrap: a novel attack on feedback-based reputation systems , 2008, SecureComm.

[9]  Ihab A. Ali,et al.  A novel Trust-Based Cross-Layer Model for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).

[10]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[11]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[12]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[13]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[14]  Ismat K. Maarouf,et al.  WSNodeRater - An Optimized Reputation System Framework for Security Aware Energy Efficient Geographic Routing in WSNs , 2007, 2007 IEEE/ACS International Conference on Computer Systems and Applications.

[15]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[16]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[17]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[18]  Uthman A. Baroudi,et al.  Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..

[19]  Jie Wu,et al.  A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[20]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[21]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[22]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[23]  Jie Wu,et al.  A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[24]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[25]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[26]  Stefanos Gritzalis,et al.  Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach , 2008, Int. J. Syst. Syst. Eng..

[27]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[28]  Mohamed Eltoweissy,et al.  μRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[29]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[30]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[31]  Vijay Varadharajan,et al.  A trust management architecture for hierarchical wireless sensor networks , 2010, IEEE Local Computer Network Conference.

[32]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .