TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing

Based on fog computer, an industrial wireless sensor network (F-IWSN) is a novel wireless sensor network in the industry. It not only can more efficiently reduce information transmission latency, but also can more beneficially achieve the real-time control and the rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially those internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the grey decision making is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node, namely, a trust management-based secure routing scheme. In addition, the proposed schemes are also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms. It can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.

[1]  Mikael Gidlund,et al.  Priority-Aware Wireless Fieldbus Protocol for Mixed-Criticality Industrial Wireless Sensor Networks , 2019, IEEE Sensors Journal.

[2]  Heng Wang,et al.  Estimation of Clock Skew for Time Synchronization Based on Two-Way Message Exchange Mechanism in Industrial Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.

[3]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[4]  Amir Hussain,et al.  A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications , 2018, Cognitive Computation.

[5]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[6]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[7]  Huafeng Wu,et al.  A rank-based application-driven resilient reputation framework model for wireless sensor networks , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[8]  Arijit Ukil Trust and Reputation Based Collaborating Computing in Wireless Sensor Networks , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.

[9]  Wei Liang,et al.  A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.

[10]  Victor C. M. Leung,et al.  Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.

[11]  Razvan Tataroiu,et al.  Adaptive Trust Management Protocol based on intrusion detection for Wireless Sensor Networks , 2013, 2013 RoEduNet International Conference 12th Edition: Networking in Education and Research.

[12]  Aditya K. Jagannatham,et al.  Gaussian trust and reputation for fading MIMO wireless sensor networks , 2014, 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).

[13]  Jianbin Hu,et al.  A Data-Centric Trust Evaluation Mechanism in Wireless Sensor Networks , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[14]  GuoDong Li,et al.  A grey-based decision-making approach to the supplier selection problem , 2007, Math. Comput. Model..

[15]  Yang Yang,et al.  A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution , 2017, Science China Information Sciences.

[16]  Frank Y. Li,et al.  Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks , 2018, IEEE Sensors Journal.

[17]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[18]  Nabila Labraoui A reliable trust management scheme in wireless sensor networks , 2015, 2015 12th International Symposium on Programming and Systems (ISPS).

[19]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[20]  K ManikandanMS,et al.  Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks , 2018, EURASIP Journal on Wireless Communications and Networking.

[21]  Fang Fang,et al.  A reputation management scheme based on multi-factor in WSNs , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).

[22]  Yang Liu,et al.  TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network , 2019, 5GWN.

[23]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[24]  Rui Wang,et al.  ETMRM: An Energy-efficient Trust Management and Routing Mechanism for SDWSNs , 2018, Comput. Networks.

[25]  Li Sun,et al.  Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.

[26]  Taekyoung Kwon,et al.  FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.

[27]  Ayman I. Kayssi,et al.  CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.

[28]  Ayman I. Kayssi,et al.  TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[29]  Ping Wang,et al.  Research and implementation on the security scheme of industrial wireless network , 2011, The International Conference on Information Networking 2011 (ICOIN2011).

[30]  Wonyong Yoon,et al.  Design of scalable SDN based eMBMS/WLAN network architecture assisted by Fog Computing , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[31]  Tanveer A. Zia,et al.  Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks , 2010, 2010 International Conference on Availability, Reliability and Security.

[32]  Roberto Uribeetxeberria,et al.  Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.

[33]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[34]  Gerhard P. Hancke,et al.  Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks: An Overview , 2015, IEEE Transactions on Industrial Informatics.

[35]  Baoling Qin,et al.  Research and Application of Intelligent Internet of Vehicles Model Based on Fog Computing , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).

[36]  José Luis Míguez,et al.  The use of grey-based methods in multi-criteria decision analysis for the evaluation of sustainable energy systems: A review , 2015 .

[37]  Baoyu Zheng,et al.  Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks , 2017, IEEE Access.

[38]  Junaid Akram,et al.  Efficient Resource Utilization in Cloud-Fog Environment Integrated with Smart Grids , 2018, 2018 International Conference on Frontiers of Information Technology (FIT).

[39]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[40]  Yue Qi,et al.  Security Analysis of WIA-PA Protocol , 2014 .

[41]  Chuanlei Zhang,et al.  BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..