Secured routing in wireless sensor networks using fault‐free and trusted nodes

Wireless sensor network WSN should be designed such that it is able to identify the faulty nodes, rectify the faults, identify compromised nodes from various security threats, and transmit the sensed data securely to the sink node under faulty conditions. In this paper, we propose an idea of integrating fault tolerance and secured routing mechanism in WSN named as fault tolerant secured routing: an integrated approach FASRI that establishes secured routes from source to sink node even under faulty node conditions. Faulty nodes are identified using battery power and interference models. Trustworthy nodes non-compromised among fault-free nodes are identified by using agent-based trust model. Finally, the data are securely routed through fault-free non-compromised nodes to sink. Performance evaluation through simulation is carried out for packet delivery ratio, hit rate, computation overhead, communication overhead, compromised node detection ratio, end-to-end delay, memory overhead, and agent overhead. We compared simulation results of FASRI with three schemes, namely multi-version multi-path MVMP, intrusion/fault tolerant routing protocol IFRP in WSN, and active node-based fault tolerance using battery power and interference model AFTBI for various measures and found that there is a performance improvement in FASRI compared with MVMP, IFRP, and AFTBI. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Jianhua Li,et al.  Gossip‐based scalable directed diffusion for wireless sensor networks , 2011, Int. J. Commun. Syst..

[2]  Imad Mahgoub,et al.  HIKES: Hierarchical key establishment scheme for wireless sensor networks , 2014, Int. J. Commun. Syst..

[3]  Yenumula B. Reddy,et al.  TRUST -BASED APPROACH IN WIRELESS SENSOR NETWORKS USING AN AGENT TO EACH CLUSTER , 2012 .

[4]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[5]  Hugo Krawczyk,et al.  Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes , 2004, CRYPTO.

[6]  Maghsoud Abbaspour,et al.  IFRP: An Intrusion/Fault tolerant Routing Protocol for increasing resiliency and reliability in wireless sensor networks , 2011, ICOST 2011.

[7]  Daniele Puccinelli,et al.  Sensor node lifetime: An experimental study , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[8]  Félix Gómez Mármol,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..

[9]  Sanjay Ranka,et al.  Analyzing the techniques that improve fault tolerance of aggregation trees in sensor networks , 2009, J. Parallel Distributed Comput..

[10]  Wenjing Lou,et al.  Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.

[11]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[12]  Cristina Comaniciu,et al.  Cross-layer MAC design for location-aware wireless sensor networks , 2011, Int. J. Commun. Syst..

[13]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[14]  Maaly Awad Hassan,et al.  A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods , 2011, ArXiv.

[15]  Qi Li,et al.  A security framework for wireless sensor networks , 2010 .

[16]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[17]  Wei Liang,et al.  Securing sensor data storage and query based on k‐out‐of‐ n coding , 2013, Int. J. Commun. Syst..

[18]  Victor C. M. Leung,et al.  Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..

[19]  B. Paramasivan,et al.  Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks , 2013, Comput. Electr. Eng..

[20]  Liudong Xing,et al.  Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[21]  Abbas Jamalipour,et al.  Accuracy, latency, and energy cross-optimization in wireless sensor networks through infection spreading , 2011, Int. J. Commun. Syst..

[22]  Yoon-Hwa Choi,et al.  Fault detection of wireless sensor networks , 2008, Comput. Commun..

[23]  Rajashekhar C. Biradar,et al.  Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach , 2013, J. Netw. Comput. Appl..

[24]  Vincent W. S. Wong,et al.  An Energy-Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2006, IEEE Vehicular Technology Conference.

[25]  Jung-Shian Li,et al.  A hierarchical mobile-agent-based security operation center , 2013, Int. J. Commun. Syst..

[26]  Arnab Raha,et al.  A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP) , 2011, Wirel. Sens. Netw..

[27]  Weisong Shi,et al.  TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.