Next Article in Journal
Coarse Alignment Technology on Moving base for SINS Based on the Improved Quaternion Filter Algorithm
Next Article in Special Issue
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
Previous Article in Journal
Fabrication of Circuits on Flexible Substrates Using Conductive SU-8 for Sensing Applications
Previous Article in Special Issue
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs

1
School of Information Technology in Education, South China Normal University, Guangzhou 510631, China
2
School of Information Science and Engineering, Central South University, Changsha 410083, China
3
Department of Computer Science, Stony Brook University, Stony Brook, NY 11794, USA
4
The affiliated middle school, Hunan Normal University, Changsha 410012, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(6), 1418; https://doi.org/10.3390/s17061418
Submission received: 29 March 2017 / Revised: 12 June 2017 / Accepted: 13 June 2017 / Published: 17 June 2017
(This article belongs to the Special Issue Security and Privacy Challenges in Emerging Fog Computing)

Abstract

:
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12–1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15–1.26 times the storage utilization efficiency compared with other schemes.

1. Introduction

With the development of the Internet of Things (IoT) [1,2], sensing devices have smaller volumes, stronger sensing abilities, larger sensing ranges and longer sensing times [3,4,5,6,7,8,9,10,11,12,13,14,15]. There is an enormous growth in the real-time or semi-real-time data obtained by networks, resulting in the centralized computing paradigm in clouding computing undergoing tremendous traffic pressure [16,17]. In this case, the fog computing mode is proposed to address the deficit of centralized computing for huge amounts of data [1,5,7]. In the fog computing mode, all levels of devices are distributed in the network, which reduces computation delay and network load [18,19,20]. Nowadays, many studies have been conducted on fog computing, with security issues being an important problem [21,22,23,24,25,26,27,28,29]. Thus, wireless sensor networks (WSNs) can be regarded as a special kind of fog computing, as the sensor node can be regarded as the edge devices and the base statin can be regarded as the information collection center. WSNs are widely used in a variety of applications, such as environmental monitoring, healthcare systems, military applications etc. [30,31,32,33]. Wireless sensor networks consist of a large number of sensor nodes that communicate with each other through multi-hop wireless links [34,35]. Due to the natural features of wireless sensor networks, nodes are often unattended and therefore become prone to various attacks [21,22,23,24,25,26,27,28,29,30,31], which includes clone attacks [23], select forwarding attacks [3], privacy preserving attacks [22,24,31], on-off attacks [36], black hole attacks, false data injection attacks [3,37], and so on.
The traceback approach is a promising method to hold many attacks back by monitoring the source of the malicious packet(s) or the attack path(s) [21,25,27,28,29,30]. The traceback approach can be divided into two categories: packet marking [21,30] and logging [29]. The main idea of packet marking is to record information (such as the node ID) of all visited nodes on packets [21,30]. The main idea of the logging is to store marked packets in relay nodes with a suitable data structure [29]. When being attacked, nodes can pinpoint the location of malicious nodes by inquiring upstream and broadcasting the information of malicious packet(s) in the traceback request to reconstruct the attack paths [21,30]. The packet marking method will be lengthened in the process of routing and increases the energy consumption of nodes near to the sink. The logging will lead to a phenomenon in which the logged marking information stored in nodes near to the sink are considerably greater than those in nodes far from the sink.
To overcome the above defects, Liu et al. proposed a logging and migration traceback (LM) scheme to improve the performance of the traceback scheme. The LM scheme [21] migrates the logged marking information to areas far from the sink, which saves more storage for storing marking information and utilizing the energy in remote areas more efficiently. The LM scheme can improve the security performance of the traceback scheme without reducing the network lifetime [21,35].
However, it is observed that much energy and storage is left in remote areas after the death of the whole network in the LM scheme. Therefore, the new strategy that can improve the utilization of storage and energy in remote areas is required to enhance the performance of the traceback approach.
In this paper, a new unequal probability marking logging and migration (UPLM) scheme is proposed. Compared with previous studies, the main contributions in this paper are as follows:
(1) Based on the logging and migration scheme, the UPLM scheme adopts an unequal probability marking approach. The new approach increases the marking probability of nodes far from the sink, thereby reducing the time needed to reconstruct attack paths when being attacked. Thus, this improves the security performance of the traceback scheme.
(2) According to theoretical analysis, the optimized unequal marking probability can improve the performance of previous schemes without reducing the network lifetime. The estimated network lifetime and the required storage capacity are given in this paper.
(3) The experimental simulation demonstrates that the UPLM scheme can improve the security performance, storage utilization, and network lifetime simultaneously. Compared with the LM traceback scheme, the energy utilization ratio of UPLM is above 95% and the amount of marking is increased by 2.1–5.2 times. Moreover, the network lifetime is longer than the LM scheme.
The rest of this paper is organized as follows: The system model and problem statement are given in Section 2. The unequal probability marking logging and migration (UPLM) scheme for tree-based wireless sensor networks is described in Section 3. Performance analysis is presented in Section 4. The paper is concluded in Section 5.

2. System Model and Problem Statement

2.1. System Model

(1) The network model studied in this paper is a tree-based wireless sensor network [34,38,39]. Tree-based wireless sensor networks consist of several linear networks. The root of the networks is the location named the sink (see Figure 1). One round is defined as the process where every node in this network generates a packet and forwards it to the sink [21,34]. The linear network is a special case of network design topology, which can be regarded as a type of basic research in the network. The results in the linear network can be applied in many scenarios, especially in the physical inspection of sensors and long distance multi-hop transmission. For example, many networks can be considered as linear networks, such as oil pipelines, the boundary line of a country, a road line, and underground coalmine tunnels. In comparison, the network routing can be considered as linear topology. This paper mainly studies long infrastructures, such as oil and gas pipelines, which have great significance. The studies in this paper are similar to a previous study [14]. In this study, the main research object was a network with small network traffic, which did not take into account the collision or interference from hidden nodes. We are prepared to consider these issues in the next step of research.
In real networks, the transmission of some pipelines is often not a single linear network. The nodes of the sensor near the base station can receive the information transmitted by a plurality of linear networks before transmitting the data to the base station. However, the tree network is such a network.
(2) The packet format is shown in Figure 2 [21]. Data and marking information are stored in different fields. Due to the resource-constrained nature of WSNs, a packet can be marked by no more than υ nodes. The structure of the marking field is shown in Figure 2b. In this figure, f_log is a flag indicating whether the marking information has been logged into a node or not. 0 means a node does not store this marking information, while 1 indicates that a node does store this marking information. The f_mig is a flag which denotes whether the marking information has been migrated by this node or not. 0 means the node does not migrate the marking information, while 1 means the node does migrate the marking information. N_ID is the ID of the node and Hkey (P.data) denotes the hash code of the data field of the packet.

2.2. Energy Consumption Model and Related Definitions

A typical energy consumption model is adopted in this paper [21,34]. Equation (1) is the energy consumption model of sending data, while Equation (2) is the energy consumption model of receiving data.
{ E m e m b e r = l E e l e c + l ε f s d 2 i f   d < d 0 E m e m b e r = l E e l e c + l ε a m p d 4 i f   d > d 0
E R ( l ) = l E e l e c
where E e l e c represents the energy loss in transmitting circuits. If the transmitting distance is less than a threshold of d 0 , the consumption of power amplification adopts the free space model. If the transmitting distance is more than a threshold of d 0 , it adopts the multipath attenuation model. ε f s and ε a m p are the energy required to amplify power in the two models, respectively. l denotes the number of bits of data. All parameters mentioned above refer to previous studies [21,34], which are shown in Table 1.

2.3. Problem Statement

The traceback approach mainly studies how to choose a traceback protocol in order to minimize the cost needed to determine the malicious source node after the victims being attacked. The goal of this paper can be categorized into several aspects:
(1) To prolong the network lifetime.
The network lifetime can be defined as the duration between the birth of the network and the moment of the death of the first node [21,34]. Assume E i is the energy consumption of node i and E i nit is the energy consumption of node i . The goal of maximizing the network lifetime can be expressed by the following formula:
max ( T ) = max 0 < i n ( E i nit E i )
(2) To minimize the requirement of storage capacity.
The storage capacity of every node in a homogeneous sensor network is the same. Furthermore, the storage capacity is subject to the node that consumes the most storage. Assuming that the storage capacity of node i is s i , the second goal of this paper is to minimize the requirement of storage capacity S .
min ( S ) = min 0 < i n ( s i )
(3) To maximize logged marking information.
More logged marking information in the scheme will significantly reduce the time needed to reconstruct an attack path when being attacked and thereby will increase the security performance. The security problem is that when normal nodes send data packets to the sink, the sink can make full use of the received information to take measures to determine malicious nodes. However, there are some malicious nodes in the network, which can attack the normal nodes and then damage the data packet generated by normal nodes. When the damaged data packets are transmitted to the sink, the sink receives false information and takes false measures to deal with the event. Thus, false measures can negatively affect network events and can even be harmful to the entire network, resulting in the collapse of the entire network.
In order to delete malicious nodes, the proposed scheme in this paper increases the probability of nodes far from the sink and decreases the probability of nodes near to the sink. This results in the marking information of the data packet in the proposed scheme being more than that of the previous scheme. Thus, the required time for determining malicious nodes is less. For example, when one data packet is transmitted from the source node to the sink, the data packet can be marked by the information with the nodes’ IDs far from the sink with a higher probability, resulting in a greater amount of stored information in the nodes. Although the probability of nodes near to the sink will have declined, the proposed scheme always adopts the same probability as the previous scheme. Thus, the total stored information in the nodes along the routing path in the proposed scheme is much more than that of the previous scheme. When one malicious node attacks one normal node and sends a false data packet, the stored information in the nodes is greater. When the sink receives data packets, the sink can use enough information stored in the nodes to build a routing path quickly. This allows for the malicious node to be determined in a short time so that the network can take measures to delete the malicious nodes to ensure network security. Assuming l i is the marking information stored in node i , the goal of maximizing logged marking information is max ( L ) = max 0 < i n ( ( l i ) ) .
In general, the optimization goal of the UPLM scheme can be summarized into the following formulas:
{ max ( T ) = max 0 < i n ( E i nit E i ) min ( S ) = min 0 < i n ( s i ) max ( L ) = max 0 < i n ( ( l i ) )

3. UPLM Scheme

3.1. Research Motivation

Figure 3 illustrates the structure of tree-based WSNs. The equal marking probability approach in the LM scheme can lead to the following disadvantages, which become the primary motivation of the UPLM scheme:
(1) Although all nodes are given equal marking probability, the actual probability that a certain node is being marked is different. Assume the assigned probability that a node is being marked is p l m in the LM scheme. As illustrated in Figure 3, it is obvious that node ς 6 is the convergence of two routing paths. Hence, all packets routing along these two paths will arrive at ς 6 to be forwarded to the sink, while node ς 6 will be marked by every packet at probability p l m . The actual marking probability for node ς 6 will be about two times higher than other nodes in these two paths. Similarly, node ς 7 is about three times higher than other nodes. The probability of nodes marking data packets is different, which cause some nodes to not mark data packets when the sink receives data packets. Thus, the data packet must be transmitted several times in order for all the received nodes to contain all nodes’ IDs in the routing path. It can consume more energy and take a longer period of time.
(2) The storage in remote areas is not utilized effectively. The effects of the scheme that migrates the marking information to remote areas in the LM scheme is not satisfied, and much storage is wasted in remote areas. In the LM scheme, the probability of nodes is all the same when one data packet is transmitted from the source node to the sink. Due to the same probability of nodes, the marking information will be stored in nodes near to the sink. It will cause nodes far from the sink to be unable to store marking information. The storage of nodes far from the sink is wasted.
(3) There is still a large amount of energy remaining in remote areas after the death of the network. In the network, we can see that many packets are transmitted to the sink, which will cause nodes near to the sink to transmit too many packets. Thus, nodes near to the sink consume a considerable amount of energy. Nodes far from the sink consume less energy. When the energy of nodes near to the sink runs out, nodes far from the sink may have more energy.
To conquer the disadvantages of the LM scheme, an unequal probability marking logging and migration (UPLM) scheme for tree-based WSNs is proposed in this paper. In the UPLM scheme, a higher marking probability is given to nodes in remote areas, while a lower marking probability is applied to nodes in nearby areas. The former designation is based on the fact that nodes in remote areas have more remaining energy and storage. They can be utilized to transmit more packets and store more marking information by being given a higher marking probability. The latter designation is ascribed to the fact that nodes in nearby areas are much more likely to be the convergence of several routing paths. Hence, the actual marking probability of nodes in nearby areas will be higher than the assigned marking probability. A lower assigned marking probability will balance the actual marking probability in WSNs, thereby reducing energy consumption and storage requirement in nearby areas significantly.
Compared to the LM scheme, the probability of nodes are the same. Figure 3 shows the structure of UPLM. It can be seen that the probability of nodes far from the sink is higher, while the probability of nodes near to the sink is lower. Thus, we can see that in Figure 3, ς 1 , ς 2 , ς 8 , ς 9 , ς 12 , and ς 13 have a higher probability, with the probability of those nodes being 1 in the UPLM scheme. Thus, we can see that the data packet can be marked with the information with those nodes. However, when data packets are transmitted to nodes near to the sink, those nodes have lower probability, meaning that nodes near to the sink do not mark data packets when they receive them. Thus, the nodes ς 5 , ς 11 , and ς 15 do not mark data packets.
The effectiveness of the UPLM scheme can be demonstrated with the tree-based WSNs in Figure 3. There are three linear branches in Figure 3. The first branch is the path: ς 1 ς 2 ς 3 ς 4 ς 5 ς 6 ς 7 sink; the second one is the path: ς 8 ς 9 ς 10 ς 11 ς 6 ; and the third one is the path: ς 12 ς 13 ς 14 ς 15 ς 7 . According to the unequal marking probability approach in the UPLM scheme, the nodes ς 1 , ς 2 , ς 3 , ς 8 , ς 9 , ς 10 , ς 12 , ς 13 , and ς 14 are assigned with a marking probability of 1 (in other word, packets arriving at these nodes will be marked) and other nodes will be assigned with lower marking probability. Both the lengths of the marked fields of the packet travelling from ς 1 to ς 3 via ς 2 and the packets travelling from ς 8 to ς 10 via ς 9 are 3. Similarly, the length of the marked fields of the packet travelling from ς 12 to ς 14 is 3.
If we set υ = 3, the logging will be processed when the length of the marked field reaches 3 and the marking information will be stored in nodes ς 3 , ς 10 , and ς 14 . Compared with the LM scheme, more marking information will be logged. The same marking probability of the peripheral area in the UPLM scheme is adopted with the LM scheme. As a result, the UPLM scheme can increase the number of logged marking information and therefore enhances the network performance, such as extending the network lifetime.

3.2. The Pseudocode of the UPLM Scheme

Based on the arguments above, the UPLM scheme will be presented in this subsection. In the UPLM scheme, when receiving packets, different probabilities will be adopted in different nodes according to their distances from the nodes to the sink. Once the number of marking information stored in a node exceeds υ , a part of them will be migrated to the node whose distance to sink is w hops larger than the original node. Algorithm 1 gives the pseudocode of the UPLM scheme.
Algorithm 1. Unequal probability marking logging and migration (UPLM) scheme.
1:For each packet P i of node ς i received
2:  node ς i computes marking probability f i α using Equation (6);
3:  marks packet P i with probability f i α ;
4:If the number of markings storage in node ς i υ ;
5:   node ς i marks packet P i with his probability;
6:    k = w ;
7:   While k > 0 Do
8:    The marking information of packet P i is forwarded backward with 1-hop;
9:    k = k − 1;
10:   End while
11:End if
12:  node ς i sends packet P i to next node;
13:End for

3.3. The Probability Analysis of the UPLM Scheme

In this subsection, the computation method of marking probability in the UPLM scheme will be described. In the UPLM scheme, the factors that influence the marking probability are as follows:
(1) The 1-hop nodes (n-hop nodes are defined as the nodes that can transmit packets to the sink in n-hop) will transmit far more packets than other nodes. Hence, the marking probability of them should not be larger. Similarly, the marking probability of 2-hop nodes should also not be large. Migration is needed to further reduce the pressure of hotspots. To achieve the goal of the UPLM scheme, nodes in remote areas should be assigned with a higher marking probability.
(2) As the packets of every upstream node will be marked at a probability of τ i by node i , the total marking probability of node ς i is still high, even if the assigned marking probability is low. Hence, the strategy is to increase the assigned marking probability in remote areas and decrease the marking probability in areas near to the sink in the UPLM scheme. According to the reasoning above, assume the distance of a node with i -hop from the sink is ς i . If the marking probability adopted by the LM scheme is , w is the migrated hop of marking information and ν is the hop counts that marking information is logged in nodes. The marking probability of ς i in the UPLM scheme is:
f i α = { w i f   i w i 3 v i f   w < i w + 3 ν 1 i f   i > w + 3 ν
The marking probability of nodes in the UPLM scheme is divided into three aspects. The first one includes nodes in the range of w hops areas near to the sink. This section should reduce the probability to increase network lifetime. Thus, we know the probability of nodes in the LM scheme is , if there are w hops in this area. The total marking probability in the LM scheme is w . However, in this area, we used w in the UPLM scheme to reduce marking information in this area, to increase the network lifetime. If nodes in the area near to the sink have i > w + 3 ν hops, nodes are far from the sink when one packet passes by the nodes in the range of i > w + 3 ν hops. Nodes mark the packets with a probability of 1, making it feasible. It does not affect the network lifetime. If nodes in the area near to the sink have w < i w + 3 ν hops, the total marking probability of nodes in the LM scheme is i . There are 3 v hops in this area. In the UPLM scheme, the probability of nodes in this area is i 3 v . The total marking information in this area in the UPLM scheme is equal to the total marking information in this area in the LM scheme; it does not affect the network lifetime and storage space.

3.4. The Improved UPLM Scheme

Although the UPLM scheme can balance storage utilization to some extent, there is still an unbalanced situation as a greater amount of storage is required by the nodes near the sink, which seriously increases the cost of the whole system. Therefore, an improved UPLM scheme is proposed to solve this issue. In the former UPLM scheme, the process of migration starts when the number of marked packets exceeds a given threshold, which causes a phenomenon in which nodes near the sink more frequently run the process. This strategy significantly increases the storage and energy consumption of those nodes. We propose an improved UPLM scheme, with a buffer area introduced into this scheme. A buffer area is a set of nodes. Once packets are forwarded into the buffer area, the marking information of these packets are entirely stored or migrated. We no longer control the process by setting a threshold. In this paper, nodes that have a distance to the sink within 5 hops are set to be the buffer area. The buffer area can assist and balance the process of storage and transference, which further improves the network performance [40,41,42,43].

4. Performance Analysis

4.1. Analysis of the Amount of Marking Information Processed by Nodes

In this subsection, the number of marking information processed by nodes, logged marking information, and migrated marking information of node i in a round will be analyzed.
Theorem 1.
In a single-branched network, the number of packets node i sent and received are Q i r and Q i s , respectively. The number of marking information sent and received by node i are i r and i s , respectively. The storage required is i . The number of migrated marking information is i m i g . The relationships of these variables are presented by the following formulas:
{ Q i r = i 1 Q i s = i
i r = { ( n 1 ) τ n 1 i f   i = n k = 1 i 1 ( ( z = k i 1 τ z ) mod   υ ) e l s e
i s = { ( n 1 ) τ n 1 + n τ n i f   i = n ( n 1 ) τ n 1 i f   i = n 1 k = 1 i 1 ( ( z = k i 1 τ z ) mod   υ + τ i ) else
i = { n 1 r i f   i = n 1 w k = 1 i + w b else | i f   ( ( z = k i + w 1 τ z )   /   υ     ( z = k i + w τ z )   /   υ   )   t h e n   b = υ   e l s e   b = 0
i m i g = k = i w + 1 i 1 k
Proof. 
Single-branched network contains n nodes and one sink. The packets received by node i are from other i 1 nodes. Thus, node i receives i 1 packets in a round. When node i receives or generates a packet, it will forward it to the next node using shortest routing algorithm [21]. As a result, the number of packets that node i forwards is i .
In a single-branched network, packets will be marked at a certain probability. Assume the probability that node i marks packets is τ i . In the process, when a packet generated by node 1 is forwarded to node i , the total marking information is as follows:
z = 1 i 1 τ z = τ 1 + τ 2 + τ 3 + τ 4 + ... + τ i 1
The logged marking information will be migrated backwards with w -hop once the number of marking information exceeds υ . After completing forwarding packets generated by node 1 to node i , the marking information received by node i is z = 1 i 1 τ z mod   υ .
In the process where a packet generated by node 2 is forwarded to node i , the total marking information is τ 1 + τ 2 + τ 3 + τ 4 + ... + τ i 1 = z = 2 i 1 τ z . Similarly, the marking information from node 2 received by node i is z = 2 i 1 τ z mod   υ . The marking information from node 3 received by node i is z = 3 i 1 τ z mod   υ . In the process where the packet generated by node i 1 is forwarded to node i , the marking information received by node i is τ i 1   mod   υ . The total marking information received by node i is i r = k = 1 i 1 ( ( z = k i 1 τ z ) mod   υ ) .
As packets will travel through node n 1 when being forwarded to node n , all the marking information in the packets will be migrated to nodes far away from the sink and only the data field will be sent to node n . All marking information will be logged once the packets arrive at node n 1 . The marking probability of node n 1 is τ n 1 . The number of packets received by the node is n 1 . Hence, the number of marking information received by node n is ( n 1 ) τ n 1 .
Likewise, migration will be processed once the number of marking information reaches υ . For node i , the number of marking information is T = k = 1 i 1 ( ( z = k i 1 τ z ) mod   υ ) . When k = 0, all marking information that arrives at the node will be logged and migrated. Therefore, the number of marking information sent by node i is τ i . If T < υ , T + τ i marking information will be forwarded.
According to the reasoning above, the amount of marking information received by node i is i r = k = 1 i 1 ( ( z = k i 1 τ z ) mod   υ ) and hence, the amount of marking information sent by node i is i s = k = 1 i 1 ( ( z = k i 1 τ z ) mod   υ + τ i ) .
All the marking information in the packet will be migrated to nodes with larger hops to the sink when the packet arrives at node n 1 . The packet will be marked at τ n 1 probability, before being forwarded to the next node n . The number of marking information sent by node n 1 is ( n 1 ) τ n 1 .
The packet will be marked at probability τ n after being received by node n , before being forwarded to other nodes. As the number of marking information received by node n is ( n 1 ) τ n 1 and all data in these packets will be marked at probability τ n , the total amount of marking information is ( n 1 ) ( τ n 1 + τ n ) . In addition, node n will generate its own packets and forward them out at a probability of τ n . Therefore, the amount of marking information forwarded bynode n is i s = ( n 1 ) τ n 1 + n τ n .
The analysis of the migration of node i is described in this paragraph. As the marking information will be migrated backwards with w -hop when the number of marking information reaches υ , the number of migrated marking information of node i is the summation of the amount of migrated marking information of node i w + 1 , i w + 2 , …, i 1 . The total amount of migrated marking information of these nodes is i w + 1 , i w + 2 , …, i 1 . Therefore, the total amount of migrated marking information of node i is i m i g = k = i w + 1 i 1 k .
The analysis of storage is described in this paragraph. As node i will store the marking information from node i + w , migration will be conducted when the amount of marking information reaches υ after node i + w receives the packet. The number of marking information migrated to node i is υ and no marking information is migrated from other nodes. The following formula describes the idea:
i = k = 1 i + w b |   i f   ( ( z = k i + w 1 τ z )   /   υ     ( z = k i + w τ z )   /   υ )   t h e n   b = υ   e l s e   b = 0
Hence, the marking information stored at node n 1 w is entirely from node n 1 , which is the amount of migrated marking information of node n 1 . If i = n 1 w , the storage requirement of node n 1 w is i = n 1 r .■
Theorem 2.
In the UPLM scheme, the number of packets received and sent by node i is Μ i r and Μ i s in the tree network, respectively. The amount of marking information received and sent by node i is i r and i s in the tree network, respectively. The storage required is Ξ i in the tree network. The number of migrated marking information is Ω i in the tree network. In the following formulas, Ψ i represents the set of nodes whose packets are forwarded to the sink through node i . | Ψ i | represents the number of elements in the set Ψ i ; η i denotes the set of paths that pass through node i ; | η i | represents the number of elements in the set η i ; and τ i represents the probability that node i will mark the packet.
{ Μ i r = | Ψ i | Μ i s = | Ψ i | + | η i |
{ i r = l i , l r ( l η i ) i s = l i , l s ( l η i )
Ω i = l i , l m i g ( l η i )
Ξ i = l i , l ( l η i )
Proof. 
In the UPLM scheme, the number of packets received by node i is the number of nodes whose packets will be forwarded to the sink through node i , namely | Ψ i | . Hence, Μ i r = | Ψ i | . The number of packets sent by node i is Μ i s = | Ψ i | + | η i | ( | η i | is the number of packets sent by node i because node i will forward a packet to every path).
There are | η i | paths going through node i . For a certain path l , the amount of marking information received by node i is i , l r . The number of marking information received by node i is the summation of all paths, namely l i , l r ( l η i ) . Similarly, the number of marking information sent by node i is l i , l S ( l η i ) .
As the amount of migrated marking information in path l that passes through node i is i , l m i g , and there are | η i | paths going through node i , therefore, its amount of migrated marking information is l i , l m i g ( l η i ) . Similarly, as the amount of stored marking information in path l that passes through node i is i , l m i g and there are | η i | paths going through node i , its amount of stored marking information is l i , l m i g ( l η i ) .
The storage required is Ξ i , the storage space of node i in path l is i , l and there are | η i | paths going through node i . Therefore, its storage space is l i , l ( l η i ) . ■

4.2. Energy Consumption and Network Lifetime

Theorem 3.
In the UPLM scheme, the initial energy consumption of node i is E i n i t , the energy consumption of node i is e i and the network lifetime of node i is i . Furthermore, α and β are the number of data packets and marking information, respectively. They are as follows:
e i = { ( α Μ i r + β i r + β Ω i ) E e l e c + ( α Μ i r + β i r + β Ω i ) ε f s d 2 + ( α Μ i s + β i s + β Ω i ) E e l e c d < d 0 ( α Μ i r + β i r + β Ω i ) E e l e c + ( α Μ i r + β i r + β Ω i ) ε a m p d 4 + ( α Μ i s + β i s + β Ω i ) E e l e c d > d 0
i = E i n i t e i
Proof. 
In the UPLM scheme, according to Equations (1) and (2), the energy consumption of node i is the sum of the energy consumption for receiving data and the energy consumption for sending data. Thus, the energy consumption of node i is as follows:
e i = E m e m b e r + E R
According to Equations (1) and (2),
e i = { l E e l e c + l ε f s d 2 + l E e l e c d < d 0 l E e l e c + l ε a m p d 4 + l E e l e c d > d 0
According to Theorem 2, the number of packets received and sent by a node i is Μ i r and Μ i s in the tree network, respectively. The amount of marking information received and sent by a node i is i r and i s in the tree network, respectively. The storage required is Ξ i in the tree network. The number of migrated marking information is Ω i in the tree network.
e i = { ( α Μ i r + β i r + β Ω i ) E e l e c + ( α Μ i r + β i r + β Ω i ) ε f s d 2 + ( α Μ i s + β i s + β Ω i ) E e l e c d < d 0 ( α Μ i r + β i r + β Ω i ) E e l e c + ( α Μ i r + β i r + β Ω i ) ε a m p d 4 + ( α Μ i s + β i s + β Ω i ) E e l e c d > d 0
Due to the initial energy consumption of node i being E i n i t , the network lifetime of a node i is as follows:
i = E i n i t e i

5. Experiment Results

Omnet++ is adopted to evaluate the UPLM scheme performance [44]. In this simulation, if not specified, the experimental simulation scenario is as follows: 600 nodes are deployed in a network, each node produces a data packet in a data collection cycle and these packets are sent to the sink using multiple hops. The transmission radius of a node is r = 50 m, v = 3, w = 2. The maximum storage space is 300 bits. However, the probability of nodes is 0.5 in the LM schemes.
In this section, the performance of the UPLM scheme was analyzed by comparison with previous schemes. Two schemes are used in comparison. The first scheme is the baseline version probability traceback (BVP) scheme. This involves a data packet being marked with relayed nodes’ ID information in the routing path with some probability when one data packet is transmitted to the sink. When the marking information of one data packet reaches v , the marking information will be stored in this node. Following this, the data packet will be transmitted to the next node. However, the marking information in the BVP scheme cannot be migrated to nodes far from the sink [29]. The second scheme is the LM scheme. This scheme is based on tree-based WSNs (as illustrated in Figure 4) and proposed by a previous study [21]. The LM scheme is also referred to as the equal probability scheme in this paper. In this scheme, nodes mark packets with equal probability and require the w -hop migration, which will migrate the marking information to other nodes when the number of marking information reaches v .

5.1. Analysis of the Amount of Marking Information Processed by Nodes

Figure 5 and Figure 6 illustrate the total amount of marking information received by nodes in all three schemes. It can be inferred from these figures that the amount of marking information received and sent by the nodes near to the sink is at the maximum. It is worthy to notice that the nodes in the UPLM scheme that have a longer distance to the sink receive a larger amount of marking information when compared with other schemes. This can be attributed to the following fact. On the one hand, lower marking probabilities were assigned to nodes closer to the sink, while higher marking probabilities were assigned to nodes farther away from the sink. On the other hand, the marking information stored in nodes will be migrated once its length exceeds υ . Therefore, the amount of marking information stored in remote areas will increase. In the UPLM scheme, the logged marking information were distributed more evenly in whole WSNs. In addition, the maximum storage required to store the marking information is no greater than other schemes.
Figure 7 illustrates the statistical distribution of receiving packets, sending packets, and migration marking information in different areas of the network. It can be observed from the figure that in the UPLM scheme, the amount of marking information that every node processed is balanced.
If we sort the amount of marking information processed by each node in descending order, the largest one is called the maximum marking information (MMI). Figure 8 illustrates the maximum amount of marking information in the network in several traceback schemes. These facts can be inferred from Figure 8. The maximum amount of marking information in the BVP scheme is the greatest, while the UPLM scheme achieves the lowest value.
Figure 9 illustrates the total marking information received by nodes in the improved UPLM scheme and the UPLM scheme. It is obvious that the amount of marking information in both schemes are nearly equal. Due to the buffer area in the improved UPLM scheme, marking information will be migrated to nodes far away from the sink. The process of migration will utilize the remaining energy of these nodes effectively, and thereby optimizes the network lifetime and shows the effectiveness of the improved UPLM scheme.
Figure 10 illustrates the total marking information stored in the network under different transmission radii. It is obvious that the total amount of stored marking information of the UPLM scheme is 1.00943–9.22717 times higher than that of the equal marking probability approach, which indicates the UPLM scheme can utilize the remaining storage of non-hotspot areas more effectively to store more marking information. Thus, the convergence time needed to determine the malicious node is reduced when a certain node is being attacked.
Figure 11 and Figure 12 illustrate the comparison of the total marking information in the UPLM scheme and the equal marking probability approach under different network radii. It can be inferred that the total marking information in the UPLM scheme under different network radii is 3.4186–381.6 times more than that of the equal marking probability approach.

5.2. Energy Consumption and Network Lifetime

Figure 13 illustrates the energy consumption in different areas and different approaches. As the energy consumption of data collection in different traceback approaches are equal, this part is only described once in the section. Figure 13 shows the maximum energy consumption in different schemes. The UPLM scheme and BVP scheme are approximately equal. Although the energy consumption is nearly equal in these three schemes, the energy consumption patterns in the BVP scheme and equal marking probability approach are significantly different in different areas, which implies an imbalance of energy consumption in these two schemes. A small amount of energy is consumed in remote areas and a large amount of energy is consumed in nearby areas. However, the energy consumption pattern of the UPLM scheme is balanced, which infers that it is capable of balancing energy consumption.
Figure 14 and Figure 15 illustrate the network lifetime under different transmission radii r in different schemes. The network lifetime of the UPLM scheme, BVP scheme, and equal marking probability approach under different transmission radii are only slightly different from each other, which implies that the UPLM scheme will not affect the network lifetime.
Figure 16 illustrates the network lifetime under different network radii in different schemes. The network lifetime of the UPLM scheme, BVP scheme, and equal marking probability approach under different network radius do not vary greatly.
Figure 17 and Figure 18 illustrate the network lifetime under different transmission radii r in the UPLM scheme and the improved UPLM scheme. The network lifetime of the improved UPLM scheme is longer than the network lifetime of the UPLM scheme under the different transmission radii r , which implies the better performance of the improved UPLM scheme.
Figure 19 and Figure 20 illustrate the network lifetime under different network radii in the UPLM scheme and the improved UPLM scheme. The network lifetime of the improved UPLM scheme is longer than the network lifetime of the UPLM scheme under different network radii r , which implies a better performance of the improved UPLM scheme.

5.3. Analysis of Storage Capacity

In this section, the storage capacity required is analyzed. Figure 21 and Figure 22 show that the UPLM scheme is better than the BVP scheme in balancing the storage requirement in WSNs. Despite the truth that the maximum storage requirement of the BVP scheme is not higher than that of the UPLM scheme and the equal marking probability approach, the network lifetime of the BVP scheme is still low as all packets and its marking information are sent to the sink. By comparing the UPLM scheme with the equal marking probability approach, it is obvious to see that the maximum storage requirement of the UPLM scheme is not increased and the balance of the storage capacity of each node in the network is maintained.
Figure 23 shows the storage requirement of each node under different network radii R . The UPLM scheme will not bring extra storage consumption to the network, compared with the equal marking probability.
Figure 24 and Figure 25 show the storage consumption and its related ratio of the whole network under different transmission radii r . The storage utilization of the UPLM scheme is enhanced compared with the BVP scheme and the equal marking probability approach. The total available storage space is 0.043–0.418 times higher than that of the equal marking probability approach. Although the storage requirement of the UPLM scheme is no more than the equal marking probability approach, the migration strategy in the UPLM scheme will increase the storage consumption of nodes in remote areas. On the other hand, the marking probability of nodes in remote areas is higher in the UPLM scheme. Hence, the process of migration is frequent, which balances the storage capacity of nodes in remote areas.
Figure 26 illustrates the storage requirement of each node under different transmission radii r . Combining Figure 26 with Figure 27, the storage performance of the UPLM scheme and the improved UPLM scheme were analyzed. The storage requirement of the improved UPLM scheme is not greater than that of the UPLM scheme, with no extra storage consumption brought, which shows the superiority of the improved UPLM scheme.
Figure 28 shows the storage requirement of each node under different network radii R . Combining Figure 28 with Figure 29, no extra storage consumption was brought by the improved UPLM scheme.

6. Conclusions

In this paper, the UPLM scheme was proposed based on the LM scheme. In tree-based WSNs, a large marking probability is assigned to nodes in nearby areas, while the small marking probability is assigned to nodes in remote areas in the LM scheme. This leads to a phenomenon in which a great amount of logged marking information is stored in nearby areas, while the storage of the nodes in remote areas is not utilized effectively. Moreover, the nodes in remote areas still possess too much remaining energy in the LM scheme. The UPLM scheme can significantly increase the total marking information of the network, reduce the required traceback time, and enhance the security performance by increasing the amount of marking information in nearby areas and reducing it in remote areas. The UPLM scheme also migrates the logged marking information stored in nodes with a higher marking probability to further improve the performance of the network. The effectiveness of the UPLM scheme is proven by experiments. The marking information of the UPLM scheme is 1.12–1.28 times more than that of the equal marking probability scheme; the storage capacity of the UPLM scheme is 1.15–1.26 times more than that of the equal marking probability scheme; and the energy utilization is increased by 17.89% in the UPLM scheme. In addition, the buffer area is introduced into an improved version of the UPLM scheme to further enhance the network performance.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (Grant No. 61370229, 61379110, 61572526), the National Basic Research Program of China (973 Program) (Grant No. 2014CB046305), the S &T Projects of Guangdong Province (Grant No. 2014B010117007, 2015A030401087, 2015B010110002, 2015B010109003 and 2016B010109008), GDUPS (2015), and the S & T Project of Guangzhou Municipality(No. 201604010054).

Author Contributions

Changqin Huang commented, designed the algorithms and wrote part of the manuscript. Ming Ma wrote part of the manuscript. Xiao Liu performed the experiment, analyzed the experiment results, and wrote part of the manuscript. Anfeng Liu conceived of the work, designed the algorithms, and wrote part of the manuscript. Zhengbang Zuo commented the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sarkar, S.; Misra, S. Theoretical modelling of fog computing: A green computing paradigm to support IoT applications. IET Netw. 2016, 5, 23–29. [Google Scholar] [CrossRef]
  2. Hu, Y.; Dong, M.; Ota, K.; Liu, A.; Guo, M. Mobile Target Detection in Wireless Sensor Networks with Adjustable Sensing Frequency. IEEE Syst. J. 2016, 10, 1160–1171. [Google Scholar] [CrossRef]
  3. Lu, R.; Lin, X.; Zhu, H.; Liang, X.; Shen, X. BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 32–43. [Google Scholar]
  4. Liu, A.; Liu, X.; Wei, T.; Yang, T.; Rho, S.; Paul, A. Distributed Multi-representative Re-Fusion approach for Heterogeneous Sensing Data Collection. ACM Trans. Embed. Comput. Syst. 2017. [Google Scholar] [CrossRef]
  5. Li, H.; Yang, Y.; Luan, T.H.; Liang, X.; Zhou, L.; Shen, X.S. Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Depend. Secur. Comput. 2016, 13, 312–325. [Google Scholar] [CrossRef]
  6. Liu, X.; Dong, M.; Ota, K.; Hung, P.; Liu, A. Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory. IEEE Trans. Serv. Comput. 2016, 9, 186–198. [Google Scholar] [CrossRef]
  7. Su, Z.; Xu, Q.; Fei, M.; Dong, M. Game Theoretic Resource Allocation in Media Cloud with Mobile Social Users. IEEE Trans. Multimed. 2016, 18, 1650–1660. [Google Scholar] [CrossRef]
  8. Xu, Y.; Liu, A.; Huang, C. Delay-Aware Program Codes Dissemination Scheme in Internet of Everything. Mob. Inf. Syst. 2016. [Google Scholar] [CrossRef]
  9. Liu, X.; Liu, A.; Deng, Q.; Liu, H. Large-scale Programing Code Dissemination for Software Defined Wireless Networks. Comput. J. 2017. [Google Scholar] [CrossRef]
  10. Li, H.; Liu, D.; Dai, Y.; Luan, T.H. Engineering searchable encryption of mobile cloud networks: When QoE meets QoP. IEEE Wirel. Commun. 2015, 22, 74–80. [Google Scholar] [CrossRef]
  11. He, S.; Shin, D.; Zhang, J.; Chen, J.; Sun, Y. Full-view area coverage in camera sensor networks: Dimension reduction and near-optimal solutions. IEEE Trans. Veh. Technol. 2016, 65, 7448–7461. [Google Scholar] [CrossRef]
  12. Gui, J.; Hui, L.; Xiong, N. A Game-Based Localized Multi-Objective Topology Control Scheme in Heterogeneous Wireless Networks. IEEE Access 2017, 5, 2396–2416. [Google Scholar] [CrossRef]
  13. He, S.; Chen, J.; Li, X.; Shen, X.; Sun, Y. Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans. Mob. Comput. 2014, 13, 1268–1282. [Google Scholar]
  14. Xu, Q.; Su, Z.; Guo, S. A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans. Veh. Technol. 2016, 65, 6692–6702. [Google Scholar] [CrossRef]
  15. Li, T.; Liu, A.; Huang, C. A Similarity Scenario-based Recommendation Model with Small Disturbances for Unknown Items in Social Networks. IEEE Access 2016. [Google Scholar] [CrossRef]
  16. Chen, Z.; Liu, A.; Li, Z.; Choi, Y.; Li, J. Distributed Duty Cycle Control for Delay Improvement in Wireless Sensor Networks. Peer Peer Netw. Appl. 2017, 10, 559–578. [Google Scholar] [CrossRef]
  17. Chen, X.; Xu, Y.; Liu, A. Cross Layer Design for Optimal Delay, Energy Efficiency and Lifetime in Body Sensor Networks. Sensors 2017, 17, 900. [Google Scholar] [CrossRef]
  18. Liu, X.; Liu, A.; Huang, C. Adaptive Information Dissemination Control to Provide Diffdelay for Internet of Things. Sensors 2017, 17, 138. [Google Scholar] [CrossRef]
  19. Zeng, D.; Li, P.; Guo, S.; Miyazaki, T.; Hu, J.; Xiang, Y. Energy minimization in multi-task software-defined sensor networks. IEEE Trans. Comput. 2015, 64, 3128–3139. [Google Scholar] [CrossRef]
  20. Liu, X.; Dong, M.; Ota, K.; Yang, L.T.; Liu, A. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. 2016. [Google Scholar] [CrossRef]
  21. Liu, Y.; Liu, A.; He, S. A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs. AEU-Int. J. Electron. Commun. 2015, 69, 1464–1482. [Google Scholar] [CrossRef]
  22. Lu, R.; Lin, X.; Liang, X.; Shen, X. A dynamic privacy-preserving key management scheme for location-based services in vanets. IEEE Trans. Intell. Transp. Syst. 2012, 13, 127–139. [Google Scholar] [CrossRef]
  23. Dong, M.; Ota, K.; Yang, L.T.; Liu, A.; Guo, M. LSCD: A Low Storage Clone Detecting Protocol for Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2016, 35, 712–723. [Google Scholar] [CrossRef]
  24. Li, H.; Lin, X.; Yang, H.; Liang, X.; Lu, R.; Shen, X. EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2053–2064. [Google Scholar] [CrossRef]
  25. Wong, T.Y.; Law, K.T.; Lui, J.C.; Wong, M.H. An efficient distributed algorithm to identify and traceback ddos traffic. Comput. J. 2006, 49, 418–442. [Google Scholar] [CrossRef]
  26. Liu, Y.; Dong, M.; Ota, K.; Liu, A. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
  27. Jeong, E.; Lee, B. An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole router and data mining based on network forensics against network attacks. Future Gener. Comp. Syst. 2014, 33, 42–52. [Google Scholar] [CrossRef]
  28. Siddiqui, M.S.; Obaid, A.S.; Hong, C.S. Hop-by-hop traceback in wireless sensor networks. IEEE Commun. Lett. 2012, 16, 242–245. [Google Scholar] [CrossRef]
  29. Xu, J.; Zhou, X.; Yang, F. Traceback in wireless sensor networks with packet marking and logging. Front. Comput. Sci. China 2011, 5, 308–315. [Google Scholar] [CrossRef]
  30. Cheng, B.C.; Chen, H.; Li, Y.J.; Tseng, R.Y. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks. Comput. Commun. 2008, 31, 4352–4359. [Google Scholar] [CrossRef]
  31. Huang, C.; Ma, M.; Liu, Y.; Liu, A. Preserving Source Location Privacy for Energy Harvesting WSNs. Sensors 2017, 17, 724. [Google Scholar] [CrossRef]
  32. Lin, X.; Lu, R.; Shen, X.; Kato, N. SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J. Sel. Areas Commun. 2009, 27, 365–378. [Google Scholar]
  33. Dong, M.; Ota, K.; Liu, A. RMER: Reliable and Energy Efficient Data Collection for Large-scale Wireless Sensor Networks. IEEE Internet Things J. 2016, 3, 511–519. [Google Scholar] [CrossRef]
  34. He, S.; Li, X.; Chen, J.; Cheng, P.; Sun, Y.; Simplot-Ryl, D. EMD: Energy-Efficient P2P Message Dissemination in Delay-Tolerant Wireless Sensor and Actor Networks. IEEE J. Sel. Areas Commun. 2013, 31, 75–84. [Google Scholar]
  35. Chen, Z.; Liu, A.; Li, Z.; Choi, Y.-J.; Sekiya, H.; Li, J. Energy-efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks. Mob. Inf. Syst. 2017. [Google Scholar] [CrossRef]
  36. Xu, Y.; Chen, X.; Liu, A.; Hu, C. A Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-hoc Networks. Sensors 2017, 17, 888. [Google Scholar] [CrossRef]
  37. Hsueh, C.H.; Wen, C.; Ouyang, Y.C. A. Secure Scheme against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks. IEEE Sens. J. 2015, 15, 3590–3602. [Google Scholar] [CrossRef]
  38. Liu, A.; Zheng, Z.; Zhang, C.; Chen, Z.; Shen, X. Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Trans. Veh. Technol. 2012, 61, 3255–3265. [Google Scholar] [CrossRef]
  39. Villas, L.A.; Boukerche, A.; Ramos, HS.; de Oliveira, H.A.B.F.; de Araujo, R.B.; Loureiro, A.A.F. DRINA: A lightweight and reliable routing approach for in-network aggregation in wireless sensor networks. IEEE Trans. Comput. 2013, 62, 676–689. [Google Scholar] [CrossRef]
  40. Wang, J.; Hu, C.; Liu, A. Comprehensive Optimization of Energy Consumption and Delay Performance for Green Communication in Internet of Things. Mob. Inf. Syst. 2017. [Google Scholar] [CrossRef]
  41. Li, T.; Zhao, M.; Liu, A.; Huang, C. On Selecting Vehicles as Recommenders for Vehicular Social Networks. IEEE Access 2017. [Google Scholar] [CrossRef]
  42. Liu, A.; Li, X.; Tang, Z.; Yang, L.T.; Shao, Z. Preserving Smart Sink Location Privacy with Delay Guaranteed Routing Scheme for WSNs. ACM Trans. Embed. Comput. Syst. 2017, 16, 68. [Google Scholar] [CrossRef]
  43. Liu, Y.; Liu, A.; Guo, A.; Li, Z.; Choi, Y.; Sekiy, H. Context-aware collect data with energy efficient in Cyber-physical cloud systems. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
  44. Varga, A. The OMNET++ Discrete Event Simulation System, Version 4.1. Available online: http://www.omnetpp.org (accessed on 24 March 2016).
Figure 1. Tree-based wireless sensor networks.
Figure 1. Tree-based wireless sensor networks.
Sensors 17 01418 g001
Figure 2. The structure of packets.
Figure 2. The structure of packets.
Sensors 17 01418 g002
Figure 3. An example of the unequal probability marking logging and migration (UPLM) scheme.
Figure 3. An example of the unequal probability marking logging and migration (UPLM) scheme.
Sensors 17 01418 g003
Figure 4. Tree-based wireless sensor network.
Figure 4. Tree-based wireless sensor network.
Sensors 17 01418 g004
Figure 5. The number of marking packets received and sent in different schemes.
Figure 5. The number of marking packets received and sent in different schemes.
Sensors 17 01418 g005
Figure 6. The number of marking packets received and sent in different schemes.
Figure 6. The number of marking packets received and sent in different schemes.
Sensors 17 01418 g006
Figure 7. The total number of marking packets received and sent in different schemes.
Figure 7. The total number of marking packets received and sent in different schemes.
Sensors 17 01418 g007
Figure 8. The maximum number of marking information under different transmission radii.
Figure 8. The maximum number of marking information under different transmission radii.
Sensors 17 01418 g008
Figure 9. The number of marking information received and sent by nodes.
Figure 9. The number of marking information received and sent by nodes.
Sensors 17 01418 g009
Figure 10. The total marking information stored under different transmission radii.
Figure 10. The total marking information stored under different transmission radii.
Sensors 17 01418 g010
Figure 11. The stored total marking information under different network radii.
Figure 11. The stored total marking information under different network radii.
Sensors 17 01418 g011
Figure 12. The ratio of total stored marking information in the UPLM scheme and the improved UPLM scheme.
Figure 12. The ratio of total stored marking information in the UPLM scheme and the improved UPLM scheme.
Sensors 17 01418 g012
Figure 13. The total energy consumption of nodes in different schemes.
Figure 13. The total energy consumption of nodes in different schemes.
Sensors 17 01418 g013
Figure 14. The network lifetime under different transmission radii.
Figure 14. The network lifetime under different transmission radii.
Sensors 17 01418 g014
Figure 15. The ratio of network lifetime under different transmission radii.
Figure 15. The ratio of network lifetime under different transmission radii.
Sensors 17 01418 g015
Figure 16. The network lifetime under different network radii and transmission radii.
Figure 16. The network lifetime under different network radii and transmission radii.
Sensors 17 01418 g016
Figure 17. The network lifetime under different transmission radii.
Figure 17. The network lifetime under different transmission radii.
Sensors 17 01418 g017
Figure 18. The ratio of the network lifetime under different transmission radii.
Figure 18. The ratio of the network lifetime under different transmission radii.
Sensors 17 01418 g018
Figure 19. The network lifetime under different network radii.
Figure 19. The network lifetime under different network radii.
Sensors 17 01418 g019
Figure 20. The ratio of the network lifetime under different network radii.
Figure 20. The ratio of the network lifetime under different network radii.
Sensors 17 01418 g020
Figure 21. The required storage in different areas.
Figure 21. The required storage in different areas.
Sensors 17 01418 g021
Figure 22. The required storage under different transmission radii.
Figure 22. The required storage under different transmission radii.
Sensors 17 01418 g022
Figure 23. The required storage under different network radii.
Figure 23. The required storage under different network radii.
Sensors 17 01418 g023
Figure 24. The total utilized storage under different network radii.
Figure 24. The total utilized storage under different network radii.
Sensors 17 01418 g024
Figure 25. The ratio of utilized storage under different network radii.
Figure 25. The ratio of utilized storage under different network radii.
Sensors 17 01418 g025
Figure 26. The required storage under different transmission radii.
Figure 26. The required storage under different transmission radii.
Sensors 17 01418 g026
Figure 27. The ratio of required storage under different transmission radii in different schemes.
Figure 27. The ratio of required storage under different transmission radii in different schemes.
Sensors 17 01418 g027
Figure 28. The required storage under different network radii.
Figure 28. The required storage under different network radii.
Sensors 17 01418 g028
Figure 29. The ratio of required storage under different network radii in different schemes.
Figure 29. The ratio of required storage under different network radii in different schemes.
Sensors 17 01418 g029
Table 1. Network parameters.
Table 1. Network parameters.
ParameterValue
Threshold distance (d0) (m)87
Sensing range rs (m)15
Eelec (nJ/bit)50
efs (pJ/bit/m2)10
eamp (pJ/bit/m4)0.0013
Initial energy (J)0.5

Share and Cite

MDPI and ACS Style

Huang, C.; Ma, M.; Liu, X.; Liu, A.; Zuo, Z. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs. Sensors 2017, 17, 1418. https://doi.org/10.3390/s17061418

AMA Style

Huang C, Ma M, Liu X, Liu A, Zuo Z. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs. Sensors. 2017; 17(6):1418. https://doi.org/10.3390/s17061418

Chicago/Turabian Style

Huang, Changqin, Ming Ma, Xiao Liu, Anfeng Liu, and Zhengbang Zuo. 2017. "Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs" Sensors 17, no. 6: 1418. https://doi.org/10.3390/s17061418

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop