Abstract
Fog-assisted Industrial Wireless Sensor Network (F-IWSN) is a novel wireless sensor network (WSN) in the industry. It not only can more efficiently reduce information transmission latency, but also can more conducively achieve real-time control and rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially from internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the analytic hierarchy process is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node. Namely, Trust Management-based Energy Efficient Routing Scheme (TME2R). In addition, GDTMS is also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms, it can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gungor, V.C., Hancke, G.P.: Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56(10), 4258–4265 (2009)
Salam, H.A., Khan, B.M.: IWSN - standards, challenges and future. IEEE Potentials 35(2), 9–16 (2016)
Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the 1st Edition the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)
Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. Comput. Sci. Inf. Syst. 2, 1–8 (2014)
Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R.H., Morrow, M.J., Polakos, P.A.: A Comprehensive Survey on Fog Computing: State-of-the-art and Research Challenges. arXiv preprint arXiv: 1710.11001 (2017)
Song, J., Han, S., Mok, A.K., Chen, D., Lucas, M., Nixon, M.: WirelessHART: applying wireless technology in real-time industrial process control. In: Proceedings of Real-Time and Embedded Technology and Applications Symposium, pp. 377–386. IEEE (2008)
Rezha, F.P., Shin, S.Y.: Performance analysis of ISA100.11a under interference from an IEEE 802.11b wireless network. IEEE Trans. Ind. Electron. 10(2), 919–927 (2014)
Liang, W., Zhang, X., Xiao, Y., Wang, F., Zeng, P., Yu, H.: Survey and experiments of WIA-PA specification of industrial wireless network. Wirel. Commun. Mob. Comput. 11(8), 1197–1212 (2011)
Zhu, J., Zou, Y., Zheng, B.: Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access. 5, 5313–5320 (2017)
Qi, Y., Li, W., Luo, X., Wang, Q.: Security analysis of WIA-PA protocol. In: Wang, X., Cui, L., Guo, Z. (eds.) Advanced Technologies in Ad Hoc and Sensor Networks. LNEE, vol. 295, pp. 287–298. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54174-2_26
Mollah, M.B., Azad, M.A.K., Vasilakos, A.: Security and privacy challenges in mobile cloud computing: survey and way ahead. J. Netw. Comput. Appl. 84, 34–54 (2017)
Zou, Y., Zhu, J., Wang, X., Leung, V.: Improving physical-layer security in wireless communications using diversity techniques. IEEE Network 29(1), 42–48 (2014)
Sun, L., Ren, P., Du, Q., Wang, Y.: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Electron. 12(1), 291–300 (2016)
Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Sur. 13(2), 245–257 (2011)
Chiwewe, T.M., Mbuya, C.F., Hancke, G.P.: Using cognitive radio for interference-resistant industrial wireless sensor networks: an overview. IEEE Trans. Ind. Electron. 11(6), 1466–1481 (2015)
Zhang, H.J., Xing, H., Cheng, J., Nallanathan, A., Leung, V.C.M.: Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Inform. 12(10), 1714–1725 (2016)
Wei, M., Kim, K., Wang, P., Choe, J.: Research and implementation on the security scheme of industrial wireless network. In: Proceedings of International Conference on Information Networking, pp. 37–42 (2011)
Lee, J., Kim, L., Kwon, T.: FlexiCast: energy-efficient software integrity checks to build secure industrial wireless active sensor networks. IEEE Trans. Ind. Inform. 12(1), 6–14 (2016)
Chen, X., Makki, K., Kang, Y., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Sur. 11(2), 52–73 (2009)
Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad Hoc and Sensor Networks (SASN 2004), pp. 66–77. ACM, Washington, D.C. (2004)
Firoozi, F., Zadorozhny, V.I., Li, F.Y.: Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sens. J. 18(15), 6446–6460 (2018)
Sinha, R.K., Jagannatham, A.K.: Gaussian trust and reputation for fading MIMO wireless sensor networks. In: Proceedings of IEEE International Conference on IEEE Electronics, Computing and Communication Technologies (CONECCT) pp. 1–6 (2014)
Janani, V.S., Manikandan, M.S.K.: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. Eurasip J. Wirel. Commun. Networking 1, 25 (2018)
Mahmud, M., Kaiser, M.S., Rahman, M.M., et al.: A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cogn. Comput. (9), 1–10 (2018)
Wang, R., Zhang, Z., Zhang, Z., Jia, Z.: ETMRM: an energy-efficient trust management and routing mechanism for SDWSNs. Comput. Netw. 139, 119–135 (2018)
Zhu, M., Chen, H., Wu, H.: A rank-based application-driven resilient reputation framework model for wireless sensor networks. In: Proceedings of International Conference on IEEE Computer Application and System Modeling (ICCASM), vol. 9, pp. V9-125–V9-129 (2010)
Labraoui, N.: A reliable trust management scheme in wireless sensor networks. In: IEEE International Symposium Programming System, pp. 1–6 (2015)
Duan, J., Gao, D., Yang, D., et al.: An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet Things J. 1(1), 58–69 (2014)
Fang, W., Zhang, C., Shi, Z., Zhao, Q., Shan, L.: BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J. Network Comput. Appl. 59(1), 88–94 (2017)
Li, M., Hu, J., Du, J.: A data-centric trust evaluation mechanism in wireless sensor networks. In: 2010 Ninth International Symposium on Distributed Computing and Applications to Business Engineering and Science (DCABES), pp. 466–470. IEEE (2010)
Zia, T.A., Islam, M.Z.: Communal reputation and individual trust (CRIT) in wireless sensor networks. In: Proceedings of IEEE International Conference on Availability, Reliability, and Security (ARES 2010), pp. 347–352 (2010)
Fang, W., Shi, Z., Shan, L., Li, F., Wang, X.: Trusted scheme for defending on-off attack based on BETA distribution. J. Syst. Simul. 27(11), 2722–2728 (2015)
Fang, W., Zhang, W., Yang, Y., Liu, Y., Chen, W.: A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. Chin. Inform. Sci. 60(4), 040305 (2017)
Gheorghe, L., Rughinis, R., Tataroiu, R.: Adaptive trust management protocol based on intrusion detection for wireless sensor networks. In: 2013 RoEduNet International Conference 12th Edition Proceedings of Networking in Education and Research, pp. 1–7. IEEE (2013)
Fang, F., Li, J., Li, J.: A reputation management scheme based on multi-factor in WSNs. In: Proceedings of IEEE International Conference on Mechatronic Sciences, Electric Engineering and Computer, pp. 3843–3848 (2013)
Tajeddine, A., Kayssi, A., Chehab, A.: TRACE: a centralized trust and competence-based energy-efficient routing scheme for wireless sensor networks. In: Proceedings of the 7th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 953–958 (2011)
Tajeddine, A., Kayssi, A., Chehab, A.: CENTER: a centralized trust-based efficient routing protocol for wireless sensor networks. In: Proceedings of IEEE Tenth Annual International Conference on Privacy, Security and Trust, pp. 195–202 (2012)
Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., Khan, M.K.: A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15), 2643–2655 (2016)
Gerrigagoitia, K., Uribeetxeberria, R., Zurutuza, U., et al.: Reputation-based intrusion detection system for wireless sensor networks. In: Proceedings of IEEE Complexity in Engineering, pp. 1–5 (2012)
Arijit, U.: Trust and reputation based collaborating computing in wireless sensor networks. In: Proc of the Second IEEE International Conference on Computational Intelligence, Modelling and Simulation, pp. 464–469 (2010)
Zhou, N., Fang, W., Zhang, W., Lv, X., Huang, J.: A novel trust management scheme for defending against On-off attack based on Gaussian distribution. In: Proceedings of IEEE 18th International Conference on Computer and Information Technology (CIT-2018), July 30 - Aug 03, 2018, Halifax, Canada, to be published
Acknowledgment
Part of this work has been presented at IEEE 18th International Conference on Computer and Information Technology (CIT-2018), July 30 - Aug 03, 2018, Halifax, Canada, [41] This work is partially supported by the National Natural Science Foundation of China (61571004), the Shanghai Natural Science Foundation (No. 17ZR1429100), the Science and Technology Innovation Program of Shanghai (No. 115DZ1100400, No. 17511105903, No. 17DZ1200302), the Scientific Instrument Developing Project of the Chinese Academy of Sciences (No. YJKYYQ20170074) and Fujian Science and Technology Plan STS Program (2017T3009).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Fang, W., Zhang, W., Chen, W., Liu, Y., Tang, C. (2019). TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network. In: Leung, V., Zhang, H., Hu, X., Liu, Q., Liu, Z. (eds) 5G for Future Wireless Networks. 5GWN 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 278. Springer, Cham. https://doi.org/10.1007/978-3-030-17513-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-17513-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17512-2
Online ISBN: 978-3-030-17513-9
eBook Packages: Computer ScienceComputer Science (R0)