Energy-aware and secure routing with trust for disaster response wireless sensor network

Wireless Sensor Network (WSN) is considered as a useful alternative to provide prompt communication services in post disaster relief operations where field information is exchanged with first responders and nearby emergency centers. However, such application environments expose the nodes to physical capture, damage and misbehaviour attacks. In addition, the compromised nodes potentially increase network congestion by advertizing false information. The loss of critical information due to significant congestion and node misbehavior attacks adversely affect emergency operations. The traditional cryptographic and authentication based secure schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehaviour attacks. Furthermore, existing trust based routing protocols incur high control overheads in trust estimation and dissemination; lead to high number of dead nodes due to adopted route discovery mechanism and suffer from high route instability. In this paper, we present an Energy-aware Secure Routing with Trust (ESRT) scheme that maintains a trusted environment and isolate misbehaving nodes. ESRT incorporates trust, energy, and hop counts for making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Simulation results demonstrate improved performance of the ESRT scheme when compared to existing work.

[1]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[2]  Chong Shen,et al.  Modeling FOG Drift Using Back-Propagation Neural Network Optimized by Artificial Fish Swarm Algorithm , 2014, J. Sensors.

[3]  Ayman I. Kayssi,et al.  CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks † , 2015, Sensors.

[4]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[5]  Dimitrios D. Vergados,et al.  Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[6]  Kazi M. Ahmed,et al.  A Reliable Routing Scheme for Post-Disaster Ad Hoc Communication Networks , 2011, J. Commun..

[7]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[8]  Hui Li,et al.  Natural Disaster Monitoring with Wireless Sensor Networks: A Case Study of Data-intensive Applications upon Low-Cost Scalable Systems , 2013, Mob. Networks Appl..

[9]  Ming Gu,et al.  Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.

[10]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[11]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[12]  Heejo Lee,et al.  Privacy and Trust Management Schemes of Wireless Sensor Networks: A Survey , 2010 .

[13]  Hongke Zhang,et al.  TC-BAC: A trust and centrality degree based access control model in wireless sensor networks , 2013, Ad Hoc Networks.

[14]  Laura Gheorghe,et al.  Trust and Energy-aware Routing Protocol for Wireless Sensor Networks , 2012, ICWMC 2012.

[15]  William H. Allen,et al.  RAAODV: a reputation-aware AODV for mobile ad hoc networks , 2014, ACM Southeast Regional Conference.

[16]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[17]  Bo Wang,et al.  A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..

[18]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[19]  Yuqing Zhang,et al.  Dealing with dishonest recommendation: The trials in reputation management court , 2012, Ad Hoc Networks.

[20]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[21]  Dong Yang,et al.  TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[22]  Susanne Wetzel,et al.  Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.

[23]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[24]  Theodore B. Zahariadis,et al.  Combining trust with location information for routing in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..

[25]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[26]  Nabeel Ahmed,et al.  SAFIRE: A Self-Organizing Architecture for Information Exchange between First Responders , 2007, 2007 2nd IEEE Workshop on Networking Technologies for Software Define Radio Networks.

[27]  Sajal K. Das,et al.  A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.

[28]  Yuguang Fang,et al.  A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[29]  Kai Chen,et al.  Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network , 2015, J. Sensors.

[30]  Chunyan Miao,et al.  Towards a trust aware cognitive radio architecture , 2009, MOCO.

[31]  Theodore B. Zahariadis,et al.  A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[32]  Suman Deb Roy,et al.  Trust Management in Ad Hoc Network for Secure DSR Routing , 2008 .

[33]  Kai-Di Chang,et al.  A Survey of Trust Management in WSNs, Internet of Things and Future Internet , 2012 .

[34]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[35]  José Manuel Moya,et al.  Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks , 2009, Sensors.

[36]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[37]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[38]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.

[39]  Aziz Mohaisen,et al.  On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks , 2009, KSII Trans. Internet Inf. Syst..

[40]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[41]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[42]  Hongmei Deng,et al.  Trust-Aware In-Network Aggregation for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[43]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[44]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[45]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[46]  Wei Zhou,et al.  DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response , 2010, IEEE Communications Magazine.

[47]  Rodrigo Roman,et al.  A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[48]  Stavros A. Koubias,et al.  Architecture Design and Implementation of an Ad-Hoc Network for Disaster Relief Operations , 2007, IEEE Transactions on Industrial Informatics.

[49]  Raja Datta,et al.  Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..

[50]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[51]  Choong Seon Hong,et al.  An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks , 2008, KSII Trans. Internet Inf. Syst..

[52]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[53]  Rahim Tafazolli,et al.  An Energy-Efficient Clustering Solution for Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[54]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[55]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[56]  Sherali Zeadally,et al.  Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.

[57]  Shukor Abd Razak,et al.  Trust-Based Routing Mechanism in MANET: Design and Implementation , 2013, Mob. Networks Appl..