A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
Abstract
:1. Introduction
- (1)
- The core of IoT lies in collecting data and enabling data communication between the required nodes to form a coordinated communication network. Therefore, a blocking communication attack that blocks the communication between nodes is a harmful and effective attack behavior [30,31,32]. Existing research shows that over 30 types of blocking communication attack behaviors or strategies have been found for wireless sensor networks. These attack behaviors primarily include black attack [30,31], clone attack [32], Dos attack [30,31], selective forwarding attack [33,34,35] and false data injection attack [34]. These attacks can not only block network communication but also consume the energy of limited sensor nodes, causing the earlier death of the network [36].
- (2)
- Although many routing schemes can resist the security attacks, most defenses are conducted against one type of attack behavior. In other words, a specific scheme only works for one specific type of attack but does not work or works with limited effect for other types [27]. The attack methods and technologies are constantly advancing, so the resistance method against a specific type of attack behavior usually performs less satisfactorily in practice.
- (3)
- The secure routing scheme tends to consider other performances of the network. For example, energy consumption is an important performance metric for sensor-based IoT [37]. Due to the limited battery capacity of sensor-based devices, how to minimize the energy consumption of a network is an important issue in the context of ensuring network security [38,39,40,41,42]. Although the pressure for reducing energy consumption is relieved in the case of energy-harvesting wireless networks, how to reduce energy consumption remains an important issue to be researched because, although energy-harvesting networks can harvest energy from environment, doing so requires extra energy collection hardware. Networks are expected to minimize the cost of the energy collection hardware because of the requirement to reduce the manufacturing cost [20,23,25]. Therefore, overall, even sensor devices with energy harvesting cannot obtain unlimited energy compensation, and the effective utilization of energy remains a severe challenge. Thus, improving network performance is necessary [43,44]. In addition, an energy-harvesting network has another important feature, i.e., when sufficient external energy compensation can be provided, the complemented energy will be fully utilized to improve the network performance, but it is not a good scheme to merely save energy. Thus, in EHWSNs, the power management was usually modeled as energy neutral operation [23,24], which maximizes the utilization of the energy absorbed from the ambient environment and achieves the balance between the energy consumption of the system and the absorbed energy. The features that determine the design and schemes of their secure routing are obviously different from the conventional schemes, which also bring great challenges. For this reason, how to achieve efficient and safe routing in EHWSNs is rarely researched. After a deep analysis on EHWSNs, a trust-based secure routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in energy-harvesting wireless sensor networks (EHWSN). The main contributions of this paper are as follows:
- (1)
- A data and notification disjoint routing approach is proposed for improving the security of networks. In this approach, the source node sends data and notification to the sink through disjoint paths separately; in such a mechanism, the data and notification can be verified independently to ensure their security.
- (2)
- A traceback approach is integrated into the TBSR scheme, which can trace malicious nodes more effectively than ordinary wireless sensor networks. In the TBSR scheme, the data and notification adopt a probability-based marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. In a traceback scheme, the higher the probability of marking is, the safer the system will be, but more energy will be consumed and the network lifetime will be affected. In the TBSR scheme, the probability of marking is determined based on the level of battery remaining. When the level of battery remaining is high, the probability of marking is higher, which can improve the network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. In this paper, we discuss the two cases “the battery on low level” and “the battery on high level” separately, which can enhance the overall network security. If we not, the probability of marking and logging will not be changed. However, in order to maintain the level of battery remaining above 0 or a lower limit at any time, the network will adopt the probability of marking and logging in accordance with the case of “the battery on low level,” so the probability of marking is lower. The sink will receive less notification and find malicious nodes slower, so the network security will be lower.
- (3)
- Compared with past schemes, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the routing success rate by approximately 16.30%.
2. Related Work
- (1)
- Strategies and approaches related to secure routing. Secure routing means adopting proper strategies or approaches to successfully transmit the data produced by source nodes to the sink or an ability to resist a security attack [30,31,32,33,34,35]. Its purpose is to ensure the successful transmission of data to the sink with a high probability even in the event of an attack. This paper classifies secure routing mechanisms into the following types:
- (a)
- The first type of secure routing scheme cannot detect whether an attacker exists in the network or whether the transmission is attacked. These schemes largely adopt the strategy of multiple redundant routings, i.e., one data packet is transmitted to the sink through 2 or more routing paths. In this case, even when an attack behavior exists in the network, the probability of the multiple routing paths being attacked simultaneously is much lower than that of only one routing path being attacked. Thus, the probability of successfully sending the data to the sink can be improved effectively. The advantages of these schemes are that they have wide applicability and can be used in all types of applications, have fewer network requirements and present favorable effects in resisting various attack behaviors. However, the disadvantages are that each data packet is sent through multiple redundant routing paths; thus, energy consumption will be high, which affects network lifetime. Moreover, no detection mechanism is adopted to determine whether the routing is attacked, so the strategy is inflexible and cannot bypass the routing path even after it has been attacked. For relevant research, please see the multi-path routing approach proposed by Karlof et al. [50] and the SEDR scheme proposed by Reference [31].
- (b)
- The second type of routing schemes introduces the following improvements based on the first type: multiple routing paths will consume additional energy and therefore significantly affect network lifetime. Thus, sequential routing schemes try one routing path first and, if the routing fails, transmit the data through another, different routing path, which improves the probability of the data successfully reaching the sink. For example, the multi-dataflow topology (MDT) scheme proposed by Hung-Min Sun et al. [51] is representative of this type of scheme. In the MDT scheme, the network is divided into two disjoint topology structures, and a node can send the data to the sink through any topology structure. Therefore, if the source node fails to send the data through one topology structure, it can resend the data through the other topology structure unless the attacker simultaneously attacks 2 topology structures, which will cause routing failure. Obviously, there is a much lower probability of the attackers simultaneously attacking two topology structures, so the MDT scheme can effectively improve routing security. Compared with past schemes, such routing schemes have the advantage of low cost, i.e., they do not require sending data simultaneously through m routing paths, which saves energy and lifts efficiency. The schemes’ disadvantages include that they cannot identify and locate malicious nodes or adapt themselves to improve the success rate of routing and are weak in resisting intelligent attackers. Their cost and energy consumption are also significant. For example, the MDT scheme requires constructing multiple topology networks simultaneously, which increases the requirements for the network and the costs of construction.
- (c)
- The purpose of the third type of routing scheme is adopting a proper mechanism to detect whether the routing is successful and identifying and locating the position of malicious nodes, thereby increasing the success rate of routing as time passes. For example, a checkpoint-based multi-hop acknowledgement (CHEMAS) scheme is proposed by Xiao, B et al. [33] for identifying suspect nodes. In the CHEMAS scheme, some nodes on the routing path from the source node to the sink are selected as check nodes. When each check node receives the data, it will return the ACK information in the data-source direction. If the data packets are attacked, the check node will fail to receive the pre-defined number of ACKs and recognize that malicious nodes exist on the routing path. Finally, the position of malicious nodes can be largely determined by the different number of ACKs received by different check nodes. Obviously, the scheme has suppressive effects on malicious nodes and can guide data transmission to avoid the position of malicious nodes during the next routing. The administrators can even remove the malicious nodes physically through powerful strategies. However, the CHEMAS scheme also has disadvantages. In the CHEMAS scheme, the ACK information is returned along the original routing path of data instead of via an independent path, so it will also be attached by the attacker. Another commonly used scheme is a trust-based strategy. ActiveTrust [30] is a good secure routing scheme proposed for wireless sensor networks and is based on active trust. In the ActiveTrust scheme, the remaining energy in the remote sink is fully utilized to initiate a detective routing. A detective routing is not a real data routing, but it is the same as the real routing. Therefore, malicious nodes will attack the detective routing as it does a data routing; thus, the suspected hostile nodes will be exposed. The trust for suspected and normal nodes will be lowered and lifted respectively. As this process proceeds, the trust for malicious nodes will become lower and that for normal nodes will become higher to allow the routing to effectively improve the success rate of routing by selecting nodes with high trust. The scheme performs well in defending intelligent malicious nodes and resisting various attacks and has high energy efficiency and recognized significance.
- (2)
- Relevant research on Traceback. The Traceback approach is also an effective approach to improve network security [27,47,48,49]. The important difference between Traceback and the conventional approaches is that it saves the path information of nodes during the routing process so that it can reconstruct the path of the attacker when the network is attacked to identify the malicious nodes, then notify the system and remove these malicious nodes physically, ensuring network security. Multiple traceback approaches have been proposed, and most are based on the following 2 traceback schemes: (a) Marking-based traceback scheme (also known as marking scheme) [47], and (b) Logging-based traceback scheme (also known as logging scheme) [48].
- (a)
- Marking-based traceback scheme. Actually, marking is the main strategy of traceback [47]. It adopts a method in which all nodes on the routing path attach their node ID and other information to the data packet during the routing process (the information attached to the data packet is called notification). When the network is attacked, the path from the source node to the sink can be reconstructed by extracting the notification. Combining the data from multiple source nodes can determine the scope of malicious nodes with a very high probability and achieve the purpose of tracing the malicious nodes.
- (b)
- Logging-based traceback scheme. The logging-based scheme is another malicious node tracing technology [48]. The above introduction shows that the marking-based traceback approach adds many loads to the network, which affects the network lifetime. This logging scheme adopts the following approach to reduce the effect of notification on the network lifetime. Its essential idea is that each node in the network has a fixed storage capacity. Therefore, the storage capacity of nodes in the network can be fully utilized to store the notification on these nodes instead of sending it to the sink. When the network is attacked, these nodes will be requested to send the notification to the sink for traceback. Then, the traceback path can be reconstructed. Therefore, the specific approach to adopt the logging scheme is that the node adds the notification to the passing data packet with a certain probability, and when the quantity of notification in the data packet reaches a certain value, such as k, all notification will be recorded on nodes through the logging process. The notification that has been recorded on nodes will not be forwarded during the routing of subsequent data packets to the sink. The adopted scheme can effectively reduce the amount of data to be transmitted by the network and save network energy. CPMLT (combined packet marking and logging scheme for traceback) [53] is a representative of this type of scheme.
- (3)
- Energy Consumption Features of Energy-Harvesting Wireless Sensor Networks (EHWSNs) and relevant Management Schemes
3. System Model and Problem Statement
3.1. System Model
- (1)
- (2)
- The size of a data packet and notification are set to bytes and bytes respectively. The success rate of each hop is set to , the initial battery level and the maximum battery level of each sensor node was set to and respectively.
3.2. Data Aggregation Model
3.3. Security Model
3.4. Energy Consumption Model
3.5. Problem Statement
4. TBSR Scheme Design
4.1. Research Motivation
- (1)
- The past multi-path routing schemes consume much energy and cannot ensure data integrity. The research objective of secure data collection is to ensure the monitoring data of sensor nodes can be routed to the sink safely. The attacker can appear at any position in the network, and the data packet can be attacked when it passes the area in which the attacker is located and then dropped. The principle of avoiding such attack is bypassing the area in which the attacker is located. However, the location of attacker cannot be determined in advance and bypassed. Therefore, most research adopts a multi-path or disjoint routing approach. The main feature of this approach is that multiple data packets are simultaneously sent to the destination through different routing paths, so although some routing paths are attacked, some data packets can reach the sink safely. The research [31] proposed the multi-path routing approach to defend against a selective forwarding attack. The multi-path routing approach sends multiple data packets through different routing paths. Thus, when the data packet on one path is attacked and dropped, the data packet can nonetheless reach the sink through other paths. Obviously, the multi-path scheme ensures data security to some extent. Nevertheless, the scheme has the disadvantage of sending one data packet multiple times, which increases energy consumption by a multiplier and seriously affects the network lifetime. Another important disadvantage of the scheme is that it cannot ensure data integrity. If the data packet is altered, it cannot be identified by the sink.
- (2)
- The existing scheme to ensure the data integrity cannot avoid dropping of the data packet. Reference [59] proposed an ID-based aggregate signature scheme that can add a signature during data aggregation. The proposed scheme is able to ensure that the data packet with the signature can be authenticated, thereby ensuring data integrity. However, the scheme of adopting a digital signature cannot prevent the data packet from being dropped by the attacker.
- (3)
- Although we proposed an Aggregate Signature-based Trust Routing scheme (ASTR) [58] that combines the digital signature and security data routing, the function of locating malicious nodes remains a requirement, so the scheme remains a positive secure defense approach. In ASTR scheme [58], the node sends data and abstract packets (known as routing approach) to ensure both data routing security and data integrity. Despite high-energy consumption when the node sends data and abstract packets, this research continues to lack the function to determine the position of malicious nodes.
4.2. Trust-Based Secure Routing Scheme Design
- (a)
- Marking: For all data packets, before they reach the sink, the nodes generating the data packets and on the routing paths will be marked with a certain probability, and all nodes in the network are marked with the same probability at that time.
- (b)
- Logging: Before reaching the sink, all data packets will be logged starting from the next hop destination of the source node with a certain probability, and all nodes in the network are logged in the same probability at a given time. The probability of marking and logging at each moment is determined by the current available power. The specific value should be calculated based on Algorithm 1:
Algorithm 1. the algorithm of obtaining available energy and obtaining the probability of marking and logging |
INPUT: the observed solar radiation power // is the th day, is the th hour of the th day, // is the observed solar radiation power at ; is the initial energy of the node battery, // is the max electricity in battery. OUTPUT: the available energy // is the available energy at ; is the remaining battery level. (1) get available energy stage 1: Find a day with the minimum total observed solar radiation power in the whole day using the formula . In addition, define this day as . 2: If is the time to start the sunshine. Get using the formula . Get is the highest observed solar radiation time of the day. If ; ;} If ; ; If ; ; If ; End if End if 3: If Switch () Case1: If ; ; Break; Case2: If ; Break; Case3: If ; ; If ; Break; Case4: If ; ; If ; Break; Default: If ; ; If ; Break; End if (2) get the probability of marking stage 4: For each in the set {} Do Get the probability of marking using Equation (41); End for (3) get the probability of logging stage 5: For each in the set {} Do Get the probability of logging using Equation (50); End for |
Algorithm 2. the algorithm of a trust-based secure routing (TBSR) scheme |
INPUT: receive a packet // is the th hour of the th day; is the available energy at , // is the probability of marking at , is the probability of logging at , and is the hop from the sink. OUTPUT: Forward a new packet to next hop node (1) aggregate signature stage 1: For each node Do running aggregator determining algorithm which is similar to cluster-head selection algorithm in Reference [59]; End for // now, nodes either belong to aggregators or belong to member nodes 2: For each member node Do send its data and node ID, data time to its aggregator End for 3: For each aggregator node Do aggregate its member nodes’ data into a data packet using ID-based aggregate signature technology as Reference [58]; aggregate its member nodes’ abstract into an abstract using ID-based aggregate signature technology as Reference [58]; End for (2) Adopt the variable probability marking and logging stage 4: For each receive packet in node and is not sink Do Mark all received packets P with . // using Equation (41). End for 5: For each receive packet generated by last node Do Log the amount of notification in packet with . // using Equation (50); End for 6: Forward New packets to next hop node. |
4.3. Optimized Selection of Parameters
5. Performance Analysis
5.1. Experimental Result
5.2. Performance Comparison with the Traceback with Stationary Parameter Scheme
6. Conclusions
Acknowledgments
Author Contributions
Conflicts of interest
References
- Le Nguyen, P.; Ji, Y.; Liu, Z.; Vu, H.; Nguyen, K.-V. Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing. Comput. Netw. 2017, 129, 232–250. [Google Scholar]
- Liu, X.; Zhao, S.; Liu, A.; Xiong, N.; Vasilakos, A.V. Knowledge-aware Proactive Nodes Selection Approach for Energy management in Internet of Things. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
- Gui, J.; Deng, J. Multi-hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality. IEEE Access 2018. [Google Scholar] [CrossRef]
- Huang, M.; Liu, A.; Wang, T.; Huang, C. Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things. Wirel. Commun. Mob. Comput. 2018, 2018, 9715428. [Google Scholar] [CrossRef]
- Chen, X.; Ma, M.; Liu, A. Dynamic power management and adaptive packet size selection for IoT in e-Healthcare. Comput. Electr. Eng. 2017. [Google Scholar] [CrossRef]
- Liu, Z.; Tsuda, T.; Watanabe, H.; Ryuo, S.; Iwasawa, N. Data Driven Cyber-Physical System for Landslide Detection. Mob. Netw. Appl. 2018. [Google Scholar] [CrossRef]
- Wu, M.; Wu, Y.; Liu, X.; Ma, M.; Liu, A.; Zhao, M. Learning Based Synchronous Approach from Forwarding Nodes to Reduce the Delay for Industrial Internet of Things. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 10. [Google Scholar] [CrossRef]
- Liu, X.; Xiong, N.; Zhang, N.; Liu, A.; Shen, H.; Huang, C. A Trust with Abstract Information Verified Routing Scheme for Cyber-physical Network. IEEE Access 2018, 6, 3882–3898. [Google Scholar]
- Tan, J.; Liu, A.; Zhao, M.; Shen, H.; Ma, M. Cross Layer Design for Reducing Delay and Maximizing Lifetime in Industrial Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2018, 2018. [Google Scholar] [CrossRef]
- Ota, K.; Dong, M.; Gui, J.; Liu, A. QUOIN: Incentive Mechanisms for Crowd Sensing Networks. IEEE Netw. Mag. 2017. [Google Scholar] [CrossRef]
- Zhu, H.; Xiao, F.; Sun, L.; Wang, R.; Yang, P. R-TTWD: Robust Device-free Through-The-Wall Detection of Moving Human with WiFi. IEEE J. Sel. Areas Commun. 2017, 35, 1090–1103. [Google Scholar]
- Li, J.; Li, Y.K.; Chen, X.; Lee, P.P.C.; Lou, W. A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1206–1216. [Google Scholar]
- Chen, X.; Li, J.; Weng, J.; Ma, J.; Lou, W. Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 2016, 65, 3184–3195. [Google Scholar]
- Liu, A.; Huang, M.; Zhao, M.; Wang, T. A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs. IEEE Access 2018. [Google Scholar] [CrossRef]
- Li, J.; Li, J.; Chen, X.; Jia, C.; Lou, W. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 2015, 64, 425–437. [Google Scholar] [CrossRef]
- Ren, Y.; Liu, A.; Zhao, M.; Huang, C.; Wang, T. A Quality Utilization Aware based Data Gathering for Vehicular Communication Networks. Wirel. Commun. Mob. Comput. 2018, 6353714. [Google Scholar] [CrossRef]
- Liu, Y.; Ota, K.; Zhang, K.; Ma, M.; Xiong, N.; Liu, A.; Long, J. QTSAC: A Energy efficient MAC Protocol for Delay Minimized in Wireless Sensor networks. IEEE Access 2018. [Google Scholar] [CrossRef]
- Liu, A.; Chen, Z.; Xiong, N. An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs. Inf. Sci. 2017. [Google Scholar] [CrossRef]
- Liu, X.; Li, G.; Zhang, S.; Liu, A. Big program code dissemination scheme for emergency software-define wireless sensor networks. Peer Peer Netw. Appl. 2017, 1–22. [Google Scholar] [CrossRef]
- Manfredi, S.; Di Tucci, E. Decentralized Control Algorithm for Fast Monitoring and Efficient Energy Consumption in Energy Harvesting Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2017, 13, 1513–1520. [Google Scholar]
- Badawy, G.H.; Sayegh, A.A.; Todd, T.D. Energy provisioning in solar-powered wireless mesh networks. IEEE Trans. Veh. Technol. 2010, 59, 3859–3871. [Google Scholar]
- Valera, A.C.; Soh, W.S.; Tan, H.P. Energy-neutral scheduling and forwarding in environmentally-powered wireless sensor networks. Ad Hoc Netw. 2013, 11, 1202–1220. [Google Scholar]
- Peng, S.; Low, C.P. Prediction free energy neutral power management for energy harvesting wireless sensor nodes. Ad Hoc Netw. 2014, 13, 351–367. [Google Scholar]
- Niyato, D.; Hossain, E.; Rashid, M.M.; Bhargava, V.K. Wireless sensor networks with energy harvesting technologies: A game-theoretic approach to optimal energy management. IEEE Trans. Wirel. Commun. 2007, 14, 90–96. [Google Scholar]
- Kansal, A.; Hsu, J.; Zahedi, S.; Srivastava, M.B. Power management in energy harvesting sensor networks. ACM Trans. Embed. Comput. Syst. 2007, 6. [Google Scholar] [CrossRef]
- Vigorito, C.M.; Ganesan, D.; Barto, A.G. Adaptive control of duty cycling in energy-harvesting wireless sensor networks. In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON’07, San Diego, CA, USA, 18–21 June 2007; pp. 21–30. [Google Scholar]
- Liu, X.; Dong, M.; Ota, K.; Yang, L.T.; Liu, A. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. 2016. [Google Scholar] [CrossRef]
- Bhuiyan, M.Z.A.; Wu, J.; Wang, G.; Wang, T.; Hassan, M.M. e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems. ACM Trans. Auton. Adapt. Syst. 2017, 12. [Google Scholar] [CrossRef]
- Zhang, H.; Cai, Z.; Liu, Q.; Xiao, Q.; Li, Y.; Cheang, C. A Survey on Security-aware Measurement in SDN. Secur. Commun. Netw. 2018, 2018, 2459154. [Google Scholar] [CrossRef]
- Jiang, W.; Wang, G.; Bhuiyan, M.Z.A.; Wu, J. Understanding graph-based trust evaluation in online social networks: Methodologies and challenges. ACM Comput. Surv. 2016, 49. [Google Scholar] [CrossRef]
- Xu, J.; Liu, A.; Xiong, N.; Wang, T.; Zuo, Z. Integrated Collaborative Filtering Recommendation in Social Cyber-Physical Systems. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717749745. [Google Scholar] [CrossRef]
- Dong, M.; Ota, K.; Yang, L.T.; Liu, A.; Guo, M. LSCD: A Low Storage Clone Detecting Protocol for Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2016, 35, 712–723. [Google Scholar]
- Xiao, B.; Yu, B.; Gao, C. CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 2007, 67, 1218–1230. [Google Scholar]
- Sun, H.M.; Chen, C.M.; Hsiao, Y.C. An efficient countermeasure to the selective forwarding attack in wireless sensor networks. In Proceedings of the TENCON 2007 IEEE Region 10 Conference, Taipei, Taiwan, 30 October–2 November 2007; pp. 1–4. [Google Scholar]
- Liu, A.; Liu, X.; Li, H.; Long, J. MDMA: A multi-data and multi-ACK verified Selective Forwarding Attack Detection Scheme in WSNs. IEICE Trans. Inf. Syst. 2016, E99-D, 2010–2018. [Google Scholar]
- Liu, Q.; Liu, A. On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electr. Eng. 2017. [Google Scholar] [CrossRef]
- Ma, F.; Liu, X.; Liu, A.; Zhao, M.; Huang, C.; Wang, T. A Time and Location Correlation Incentive Scheme for Deeply Data Gathering in Crowdsourcing Networks. Wirel. Commun. Mob. Comput. 2018, 2018, 8052620. [Google Scholar] [CrossRef]
- Bhuiyan, M.Z.A.; Wang, G.; Wu, J.; Cao, J.; Liu, X.; Wang, T. Dependable structural health monitoring using wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2017, 14, 363–376. [Google Scholar]
- Dai, H.; Chen, G.; Wang, C.; Wang, S.; Wu, X.; Wu, F. Quality of Energy Provisioning for Wireless Power Transfer. IEEE Trans. Parallel Distrib. Syst. 2014, 26, 527–537. [Google Scholar]
- Li, J.; Chen, X.; Huang, X.; Tang, S.; Xiang, Y.; Hassan, M.M.; Alelaiwi, A. Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 2015, 64, 3569–3579. [Google Scholar]
- Wang, J.; Liu, A.; Yan, T.; Zeng, Z. A resource allocation model based on double-sided combinational auctions for transparent computing. Peer Peer Netw. Appl. 2017. [Google Scholar] [CrossRef]
- Teng, H.; Liu, X.; Liu, A.; Shen, H.; Huang, C.; Wang, T. Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor based Networks. Wirel. Commun. Mob. Comput. 2018, 2018, 2068375. [Google Scholar] [CrossRef]
- Peng, S.; Low, C.P. Throughput optimal energy neutral management for energy harvesting wireless sensor networks. In Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC 2012), Paris, France, 1–4 April 2012; pp. 2347–2351. [Google Scholar]
- Sun, W.; Cai, Z.; Li, Y.; Liu, F.; Fang, S.; Wang, G. Security and Privacy in the Medical Internet of Things. Secur. Commun. Netw. 2018, 5978636. [Google Scholar] [CrossRef]
- Ettus, M. System capacity, latency, and power consumption in multihop-routed SS-CDMA wireless networks. In Proceedings of the IEEE InRadio and Wireless Conference, RAWCON 98, Colorado Springs, CO, USA, 9–12 August 1998; pp. 55–58. [Google Scholar]
- Zytoune, O.; Aboutajdine, D. A uniform balancing energy routing protocol for wireless sensor networks. Wirel. Pers. Commun. 2010, 55, 147–161. [Google Scholar]
- Cheng, B.C.; Chen, H.; Li, Y.J.; Tseng, R.Y. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks. Comput. Commun. 2008, 31, 4352–4359. [Google Scholar]
- Xu, J.; Zhou, X.; Yang, F. Traceback in wireless sensor networks with packet marking and logging. Front. Comput. Sci. China 2011, 5, 308–315. [Google Scholar]
- Khan, S.; Loo, K. Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks. Netw. Secur. 2009, 9–16. [Google Scholar]
- Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 2003, 1, 293–315. [Google Scholar]
- Yang, G.; He, S.; Shi, Z. Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks. IEEE Internet Things J. 2017, 4, 330–339. [Google Scholar]
- Huang, C.; Ma, M.; Liu, X.; Liu, A.; Zuo, Z. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs. Sensors 2017, 17, 1418. [Google Scholar] [CrossRef]
- Cheng, B.C.; Chen, H.; Liao, G.T. FBT: An efficient traceback scheme in hierarchical wireless sensor network. Secur. Commun. Netw. 2009, 2, 133–144. [Google Scholar]
- Liu, Y.; Liu, A.; He, S. A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs. AEU Int. J. Electron. Commun. 2015, 69, 1464–1482. [Google Scholar]
- Gui, J.; Zhou, K. Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. J. Netw. Syst. Manag. 2016, 24, 789–812. [Google Scholar]
- Kong, Q.; Lu, R.; Ma, M.; Bao, H. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing. Sensors 2017, 17, 1829. [Google Scholar] [CrossRef]
- Deng, R.; Xiao, G.; Lu, R.; Liang, H.; Vasilakos, A.V. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey. IEEE Trans. Ind. Inform. 2017, 13, 411–423. [Google Scholar]
- Tang, J.; Liu, A.; Zhao, M.; Wang, T. An Aggregate Signature based Trust Routing for Data Gathering in Sensor Networks. Secur. Commun. Netw. 2018, 2018, 6328504. [Google Scholar] [CrossRef]
- Shen, L.; Ma, J.; Liu, X.; Wei, F.; Miao, M. A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Int. Things J. 2017, 4, 546–554. [Google Scholar]
- Canyon Solar Raditaion Dataset. TEXAS Solar Radiation Database. Retrived on 1st May 2013. Available online: http://www.me.utexas.edu/solarlab/data/canyon/index.html (accessed on 1 October 2017).
Symbol | Description | Value |
---|---|---|
Duration of communication | 100 ms | |
Duration of masthead | 0.26 ms | |
Duration of confirmation window | 0.26 ms | |
Duration of data packet | 0.93 ms | |
Transmission power consumption | 0.0511 w | |
Receiving power consumption | 0.0588 w | |
Sleeping power consumption | 2.4 × 10−7 w | |
Power required to execute LPL operation (duration of ) | Related to calculation | |
Power of nodes for receiving data packet | Related to calculation | |
Power of nodes for transmitting data packet | Related to calculation | |
Duty cycle | 0.5 |
Available Energy (wh) | ||||
---|---|---|---|---|
7 | ||||
8 | ||||
9 | ||||
10 | ||||
11 |
Available Energy (wh) | When Convergence Time is min, Sink’s Notification | Storage Space | ||
---|---|---|---|---|
7 | 0.6 | 0.9 | 971,989.79 | 48.6 |
8 | 0.7 | 0.8 | 2,228,412.17 | 50.4 |
9 | 0.7 | 0.7 | 3,322,836.25 | 44.1 |
10 | 0.4 | 0.2 | 5,025,689.53 | 7.2 |
11 | 1 | 0.6 | 6,276,459.91 | 54.0 |
Symbol | Description | Value |
---|---|---|
Length of data packet | 500 | |
Length of marking | 100 | |
Success rate of transmission of each hop | 0.9 | |
Network radius | 200 m | |
Emission radius of node | 20 m | |
Distribution density of node | 0.5 | |
the initial level of battery | 55 wh | |
the maximum level of battery | 111 wh |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tang, J.; Liu, A.; Zhang, J.; Xiong, N.N.; Zeng, Z.; Wang, T. A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks. Sensors 2018, 18, 751. https://doi.org/10.3390/s18030751
Tang J, Liu A, Zhang J, Xiong NN, Zeng Z, Wang T. A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks. Sensors. 2018; 18(3):751. https://doi.org/10.3390/s18030751
Chicago/Turabian StyleTang, Jiawei, Anfeng Liu, Jian Zhang, Neal N. Xiong, Zhiwen Zeng, and Tian Wang. 2018. "A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks" Sensors 18, no. 3: 751. https://doi.org/10.3390/s18030751
APA StyleTang, J., Liu, A., Zhang, J., Xiong, N. N., Zeng, Z., & Wang, T. (2018). A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks. Sensors, 18(3), 751. https://doi.org/10.3390/s18030751