A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs

Security is a pivotal issue for wireless sensor networks (WSNs), which are emerging as a promising platform that enables a wide range of military, scientific, industrial and commercial applications. Traceback, a key cyber-forensics technology, can play an important role in tracing and locating a malicious source to guarantee cybersecurity. In this work a trust-based adaptive probability marking and storage (TAPMS) traceback scheme is proposed to enhance security for WSNs. In a TAPMS scheme, the marking probability is adaptively adjusted according to the security requirements of the network and can substantially reduce the number of marking tuples and improve network lifetime. More importantly, a high trust node is selected to store marking tuples, which can avoid the problem of marking information being lost. Experimental results show that the total number of marking tuples can be reduced in a TAPMS scheme, thus improving network lifetime. At the same time, since the marking tuples are stored in high trust nodes, storage reliability can be guaranteed, and the traceback time can be reduced by more than 80%.

[1]  Vinod Kumar Verma,et al.  Impact of malicious servers over trust and reputation models in wireless sensor networks , 2016 .

[2]  Mianxiong Dong,et al.  An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing , 2015, J. Parallel Distributed Comput..

[3]  Xuxun Liu,et al.  A Deployment Strategy for Multiple Types of Requirements in Wireless Sensor Networks , 2015, IEEE Transactions on Cybernetics.

[4]  Jean Marie Linhart,et al.  Algorithm 885: Computing the Logarithm of the Normal Distribution , 2008, TOMS.

[5]  Angelos Antonopoulos,et al.  Smart HVAC Control in IoT: Energy Consumption Minimization with User Comfort Constraints , 2014, TheScientificWorldJournal.

[6]  Annapurna Jonnalagadda,et al.  A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2015 .

[7]  Jiming Chen,et al.  Energy provisioning in wireless rechargeable sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  Guihai Chen,et al.  Practical scheduling for stochastic event capture in energy harvesting sensor networks , 2015, Int. J. Sens. Networks.

[9]  Jan Awrejcewicz,et al.  The fluctuation spectroscopy based on the scaling properties of beta-distribution: Analysis of triple pendulum data , 2015 .

[10]  Xiaodong Lin,et al.  MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications , 2015, Peer Peer Netw. Appl..

[11]  Sonia Fahmy,et al.  A practical approach for provenance transmission in wireless sensor networks , 2014, Ad Hoc Networks.

[12]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[13]  Tao Wang,et al.  QoE-ensured price competition model for emerging mobile networks , 2015, IEEE Wireless Communications.

[14]  Yuxin Liu,et al.  Analysis and Improvement of Send-and-Wait Automatic Repeat-reQuest Protocols for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[15]  Anfeng Liu,et al.  An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs , 2015, Comput. J..

[16]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[17]  Jiannong Cao,et al.  Multi-User Computation Partitioning for Latency Sensitive Mobile Cloud Applications , 2015, IEEE Transactions on Computers.

[18]  Anfeng Liu,et al.  Lifetime maximization through dynamic ring-based routing scheme for correlated data collecting in WSNs , 2015, Comput. Electr. Eng..

[19]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[20]  Guihai Chen,et al.  Quality of Energy Provisioning for Wireless Power Transfer , 2015, IEEE Transactions on Parallel and Distributed Systems.

[21]  Syed Obaid Amin,et al.  Hop-by-Hop Traceback in Wireless Sensor Networks , 2012, IEEE Communications Letters.

[22]  Kai Zhou,et al.  Flexible Adjustments Between Energy and Capacity for Topology Control in Heterogeneous Wireless Multi-hop Networks , 2016, Journal of Network and Systems Management.

[23]  Kaoru Ota,et al.  An incentive game based evolutionary model for crowd sensing networks , 2016, Peer-to-Peer Netw. Appl..

[24]  Luis Alonso,et al.  Wireless Energy Harvesting in Two-Way Network Coded Cooperative Communications: A Stochastic Approach for Large Scale Networks , 2014, IEEE Communications Letters.

[25]  Bo-Chao Cheng,et al.  A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks , 2008, Comput. Commun..

[26]  Shigeng Zhang,et al.  Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution , 2015, IEEE Transactions on Parallel and Distributed Systems.

[27]  Minyi Guo,et al.  Mobile Target Detection in Wireless Sensor Networks With Adjustable Sensing Frequency , 2016, IEEE Systems Journal.

[28]  Luis Alonso,et al.  Connectivity of large-scale WSNs in fading environments under different routing mechanisms , 2015, 2015 IEEE International Conference on Communications (ICC).

[29]  Minyi Guo,et al.  Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[30]  Jiming Chen,et al.  Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[31]  Jiming Chen,et al.  Energy-Efficient Probabilistic Area Coverage in Wireless Sensor Networks , 2015, IEEE Transactions on Vehicular Technology.

[32]  Zhongming Zheng,et al.  Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.

[33]  Mianxiong Dong,et al.  Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory , 2016, IEEE Transactions on Services Computing.

[34]  Luis Alonso,et al.  Information Exchange in Randomly Deployed Dense WSNs With Wireless Energy Harvesting Capabilities , 2016, IEEE Transactions on Wireless Communications.

[35]  Taoshen Li,et al.  A Maximum Lifetime Algorithm for Data Gathering Without Aggregation in Wireless Sensor Networks , 2013 .

[36]  Mianxiong Dong,et al.  PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs , 2015, Sensors.

[37]  Anfeng Liu,et al.  A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs , 2015 .

[38]  Dongming Chen,et al.  A Node Deployment Strategy for Blindness Avoiding in Wireless Sensor Networks , 2015, IEEE Communications Letters.

[39]  Jun Xu,et al.  Traceback in wireless sensor networks with packet marking and logging , 2011, Frontiers of Computer Science in China.

[40]  Weiping Zhu,et al.  Accurate and Efficient Object Tracking Based on Passive RFID , 2015, IEEE Transactions on Mobile Computing.