Skip to main content

TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network

  • Conference paper
  • First Online:
5G for Future Wireless Networks (5GWN 2019)

Abstract

Fog-assisted Industrial Wireless Sensor Network (F-IWSN) is a novel wireless sensor network (WSN) in the industry. It not only can more efficiently reduce information transmission latency, but also can more conducively achieve real-time control and rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially from internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the analytic hierarchy process is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node. Namely, Trust Management-based Energy Efficient Routing Scheme (TME2R). In addition, GDTMS is also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms, it can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 60.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gungor, V.C., Hancke, G.P.: Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56(10), 4258–4265 (2009)

    Article  Google Scholar 

  2. Salam, H.A., Khan, B.M.: IWSN - standards, challenges and future. IEEE Potentials 35(2), 9–16 (2016)

    Article  Google Scholar 

  3. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the 1st Edition the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)

    Google Scholar 

  4. Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. Comput. Sci. Inf. Syst. 2, 1–8 (2014)

    Google Scholar 

  5. Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R.H., Morrow, M.J., Polakos, P.A.: A Comprehensive Survey on Fog Computing: State-of-the-art and Research Challenges. arXiv preprint arXiv: 1710.11001 (2017)

    Google Scholar 

  6. Song, J., Han, S., Mok, A.K., Chen, D., Lucas, M., Nixon, M.: WirelessHART: applying wireless technology in real-time industrial process control. In: Proceedings of Real-Time and Embedded Technology and Applications Symposium, pp. 377–386. IEEE (2008)

    Google Scholar 

  7. Rezha, F.P., Shin, S.Y.: Performance analysis of ISA100.11a under interference from an IEEE 802.11b wireless network. IEEE Trans. Ind. Electron. 10(2), 919–927 (2014)

    Google Scholar 

  8. Liang, W., Zhang, X., Xiao, Y., Wang, F., Zeng, P., Yu, H.: Survey and experiments of WIA-PA specification of industrial wireless network. Wirel. Commun. Mob. Comput. 11(8), 1197–1212 (2011)

    Article  Google Scholar 

  9. Zhu, J., Zou, Y., Zheng, B.: Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access. 5, 5313–5320 (2017)

    Google Scholar 

  10. Qi, Y., Li, W., Luo, X., Wang, Q.: Security analysis of WIA-PA protocol. In: Wang, X., Cui, L., Guo, Z. (eds.) Advanced Technologies in Ad Hoc and Sensor Networks. LNEE, vol. 295, pp. 287–298. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54174-2_26

    Chapter  Google Scholar 

  11. Mollah, M.B., Azad, M.A.K., Vasilakos, A.: Security and privacy challenges in mobile cloud computing: survey and way ahead. J. Netw. Comput. Appl. 84, 34–54 (2017)

    Article  Google Scholar 

  12. Zou, Y., Zhu, J., Wang, X., Leung, V.: Improving physical-layer security in wireless communications using diversity techniques. IEEE Network 29(1), 42–48 (2014)

    Article  Google Scholar 

  13. Sun, L., Ren, P., Du, Q., Wang, Y.: Fountain-coding aided strategy for secure cooperative transmission in industrial wireless sensor networks. IEEE Trans. Ind. Electron. 12(1), 291–300 (2016)

    Google Scholar 

  14. Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Sur. 13(2), 245–257 (2011)

    Article  Google Scholar 

  15. Chiwewe, T.M., Mbuya, C.F., Hancke, G.P.: Using cognitive radio for interference-resistant industrial wireless sensor networks: an overview. IEEE Trans. Ind. Electron. 11(6), 1466–1481 (2015)

    Google Scholar 

  16. Zhang, H.J., Xing, H., Cheng, J., Nallanathan, A., Leung, V.C.M.: Secure resource allocation for OFDMA two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Inform. 12(10), 1714–1725 (2016)

    Article  Google Scholar 

  17. Wei, M., Kim, K., Wang, P., Choe, J.: Research and implementation on the security scheme of industrial wireless network. In: Proceedings of International Conference on Information Networking, pp. 37–42 (2011)

    Google Scholar 

  18. Lee, J., Kim, L., Kwon, T.: FlexiCast: energy-efficient software integrity checks to build secure industrial wireless active sensor networks. IEEE Trans. Ind. Inform. 12(1), 6–14 (2016)

    Article  Google Scholar 

  19. Chen, X., Makki, K., Kang, Y., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Sur. 11(2), 52–73 (2009)

    Article  Google Scholar 

  20. Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad Hoc and Sensor Networks (SASN 2004), pp. 66–77. ACM, Washington, D.C. (2004)

    Google Scholar 

  21. Firoozi, F., Zadorozhny, V.I., Li, F.Y.: Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sens. J. 18(15), 6446–6460 (2018)

    Article  Google Scholar 

  22. Sinha, R.K., Jagannatham, A.K.: Gaussian trust and reputation for fading MIMO wireless sensor networks. In: Proceedings of IEEE International Conference on IEEE Electronics, Computing and Communication Technologies (CONECCT) pp. 1–6 (2014)

    Google Scholar 

  23. Janani, V.S., Manikandan, M.S.K.: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. Eurasip J. Wirel. Commun. Networking 1, 25 (2018)

    Google Scholar 

  24. Mahmud, M., Kaiser, M.S., Rahman, M.M., et al.: A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cogn. Comput. (9), 1–10 (2018)

    Google Scholar 

  25. Wang, R., Zhang, Z., Zhang, Z., Jia, Z.: ETMRM: an energy-efficient trust management and routing mechanism for SDWSNs. Comput. Netw. 139, 119–135 (2018)

    Article  Google Scholar 

  26. Zhu, M., Chen, H., Wu, H.: A rank-based application-driven resilient reputation framework model for wireless sensor networks. In: Proceedings of International Conference on IEEE Computer Application and System Modeling (ICCASM), vol. 9, pp. V9-125–V9-129 (2010)

    Google Scholar 

  27. Labraoui, N.: A reliable trust management scheme in wireless sensor networks. In: IEEE International Symposium Programming System, pp. 1–6 (2015)

    Google Scholar 

  28. Duan, J., Gao, D., Yang, D., et al.: An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet Things J. 1(1), 58–69 (2014)

    Article  Google Scholar 

  29. Fang, W., Zhang, C., Shi, Z., Zhao, Q., Shan, L.: BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J. Network Comput. Appl. 59(1), 88–94 (2017)

    Google Scholar 

  30. Li, M., Hu, J., Du, J.: A data-centric trust evaluation mechanism in wireless sensor networks. In: 2010 Ninth International Symposium on Distributed Computing and Applications to Business Engineering and Science (DCABES), pp. 466–470. IEEE (2010)

    Google Scholar 

  31. Zia, T.A., Islam, M.Z.: Communal reputation and individual trust (CRIT) in wireless sensor networks. In: Proceedings of IEEE International Conference on Availability, Reliability, and Security (ARES 2010), pp. 347–352 (2010)

    Google Scholar 

  32. Fang, W., Shi, Z., Shan, L., Li, F., Wang, X.: Trusted scheme for defending on-off attack based on BETA distribution. J. Syst. Simul. 27(11), 2722–2728 (2015)

    Google Scholar 

  33. Fang, W., Zhang, W., Yang, Y., Liu, Y., Chen, W.: A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. Chin. Inform. Sci. 60(4), 040305 (2017)

    Article  Google Scholar 

  34. Gheorghe, L., Rughinis, R., Tataroiu, R.: Adaptive trust management protocol based on intrusion detection for wireless sensor networks. In: 2013 RoEduNet International Conference 12th Edition Proceedings of Networking in Education and Research, pp. 1–7. IEEE (2013)

    Google Scholar 

  35. Fang, F., Li, J., Li, J.: A reputation management scheme based on multi-factor in WSNs. In: Proceedings of IEEE International Conference on Mechatronic Sciences, Electric Engineering and Computer, pp. 3843–3848 (2013)

    Google Scholar 

  36. Tajeddine, A., Kayssi, A., Chehab, A.: TRACE: a centralized trust and competence-based energy-efficient routing scheme for wireless sensor networks. In: Proceedings of the 7th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 953–958 (2011)

    Google Scholar 

  37. Tajeddine, A., Kayssi, A., Chehab, A.: CENTER: a centralized trust-based efficient routing protocol for wireless sensor networks. In: Proceedings of IEEE Tenth Annual International Conference on Privacy, Security and Trust, pp. 195–202 (2012)

    Google Scholar 

  38. Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., Khan, M.K.: A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15), 2643–2655 (2016)

    Article  Google Scholar 

  39. Gerrigagoitia, K., Uribeetxeberria, R., Zurutuza, U., et al.: Reputation-based intrusion detection system for wireless sensor networks. In: Proceedings of IEEE Complexity in Engineering, pp. 1–5 (2012)

    Google Scholar 

  40. Arijit, U.: Trust and reputation based collaborating computing in wireless sensor networks. In: Proc of the Second IEEE International Conference on Computational Intelligence, Modelling and Simulation, pp. 464–469 (2010)

    Google Scholar 

  41. Zhou, N., Fang, W., Zhang, W., Lv, X., Huang, J.: A novel trust management scheme for defending against On-off attack based on Gaussian distribution. In: Proceedings of IEEE 18th International Conference on Computer and Information Technology (CIT-2018), July 30 - Aug 03, 2018, Halifax, Canada, to be published

    Google Scholar 

Download references

Acknowledgment

Part of this work has been presented at IEEE 18th International Conference on Computer and Information Technology (CIT-2018), July 30 - Aug 03, 2018, Halifax, Canada, [41] This work is partially supported by the National Natural Science Foundation of China (61571004), the Shanghai Natural Science Foundation (No. 17ZR1429100), the Science and Technology Innovation Program of Shanghai (No. 115DZ1100400, No. 17511105903, No. 17DZ1200302), the Scientific Instrument Developing Project of the Chinese Academy of Sciences (No. YJKYYQ20170074) and Fujian Science and Technology Plan STS Program (2017T3009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fang, W., Zhang, W., Chen, W., Liu, Y., Tang, C. (2019). TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network. In: Leung, V., Zhang, H., Hu, X., Liu, Q., Liu, Z. (eds) 5G for Future Wireless Networks. 5GWN 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 278. Springer, Cham. https://doi.org/10.1007/978-3-030-17513-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-17513-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-17512-2

  • Online ISBN: 978-3-030-17513-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics