An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks

Wireless Sensor Network (WSN) is an advanced technology and has been used widely in many applications such as health monitoring, environment monitoring, military purpose etc. Nature of this network is that they are often placed in an open environment and are susceptible to various attacks. Traditional cryptography methods are not supportable in WSNs as they have high energy and resource constraints. Trust management has been proved to be an effective measure to enhance security as well as to handle threats for WSNs. Trust can be defined as level of reliableness in a node. Low Energy Adaptive Clustering (LEACH) is a cluster based routing protocol for WSN which is superior to direct communication protocol and known for its minimum transmission energy. However, LEACH itself has some limitations related to security. In this paper, an energy efficient and trust aware framework for secure routing in LEACH (EETA-LEACH), has been proposed that improves LEACH protocol by introducing trust to provide secure routing, while maintaining originality of LEACH protocol. This approach is a combination of trust-based routing module and trust management module that works together to select trusted Cluster Head (CH). The simulation results demonstrate that proposed scheme is better in terms of network lifetime and Packet Delivery Ratio (PDR). It is verified that malicious nodes will not be selected as CH and trust value of a malicious node decreases with time.

[1]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[2]  Miodrag Potkonjak,et al.  Smart kindergarten: sensor-based wireless networks for smart developmental problem-solving environments , 2001, MobiCom '01.

[3]  R. M. Chandrasekaran,et al.  A Novel Heuristic Approach Based Trust Worthy Architecture for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[4]  Ayman I. Kayssi,et al.  Fuzzy reputation-based trust model , 2011, Appl. Soft Comput..

[5]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[6]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[7]  Subir Kumar Sarkar,et al.  Issues in Wireless Sensor Networks , 2008 .

[8]  Fei Du,et al.  An Improvement of LEACH Routing Protocol Based on Trust for Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Peng Zhou,et al.  Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Hongke Zhang,et al.  TC-BAC: A trust and centrality degree based access control model in wireless sensor networks , 2013, Ad Hoc Networks.

[11]  Weisong Shi,et al.  TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.

[12]  Liu Ming,et al.  Grey Theory Based Nodes Risk Assessment in P2P Networks , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[13]  Cauligi S. Raghavendra,et al.  PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.

[14]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[15]  Xiao Wang,et al.  Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[16]  Theodore B. Zahariadis,et al.  Combining trust with location information for routing in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..

[17]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[18]  R.K. Patro Localization in wireless sensor network with mobile beacons , 2004, 2004 23rd IEEE Convention of Electrical and Electronics Engineers in Israel.

[19]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[20]  Baohua Zhao,et al.  Trust-Based LEACH Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[21]  Weisong Shi,et al.  Building a Trust-Aware dynamic routing solution for Wireless Sensor Networks , 2010, 2010 IEEE Globecom Workshops.

[22]  M. R. Tripathy,et al.  Routing Protocols in Wireless Sensor Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[23]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[24]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[25]  Yuguang Fang,et al.  A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[26]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[27]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[28]  Shamsad Parvin,et al.  Routing Protocols for Wireless Sensor Networks: A Comparative Study , 2008 .

[29]  Nadeem Javaid,et al.  MODLEACH: A Variant of LEACH for WSNs , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.

[30]  L. M. M.-T. Theory of Probability , 1929, Nature.

[31]  M. Salem An Efficient Distributed Trust Model for Wireless Sensor Networks , 2016 .

[32]  K. Vinoth Kumar,et al.  Secure Routing Path Using Trust Values for Wireless Sensor Networks , 2014, ArXiv.

[33]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[34]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[35]  J. Martin Leo Manickam,et al.  Fuzzy-Based Trust Prediction Model for Routing in WSNs , 2014, TheScientificWorldJournal.

[36]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[37]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[38]  Anand Gudnavar,et al.  Improved cluster routing protocol for wireless sensor network through simplification , 2012, 2012 18th International Conference on Advanced Computing and Communications (ADCOM).

[39]  Sanjay Kumar Madria,et al.  A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network , 2011, 2011 International Conference on Parallel Processing.

[40]  Marco Chiani,et al.  Cooperative Diversity in Wireless Sensor Networks , 2005 .

[41]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[42]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[43]  Na Wang,et al.  A Light-Weighted Data Trust Model in WSN , 2014 .

[44]  Sudip Misra,et al.  Guide to Wireless Sensor Networks , 2009, Computer Communications and Networks.

[45]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .