Abstract
Wireless sensor network (WSN) nodes rely on their neighbors to transmit the sensed information to a sink node. A transmitting node assumes that its neighbor is secure and relays its information in an optimal manner. A network’s wireless communication medium and decentralized nature retards its performance by exposing it to internal and external attacks. Therefore, secure networks are placed and vital in selecting trusted neighbors to secure transmission. Trust models and the reputation management system takes advantage of the network’s limitation, resulting in the weekly node detection of malicious neighbors and inconsistent network performance. This paper proposes an activation function-based trusted neighbor selection (AF-TNS) for resource-constrained WSNs to enhance network security. AF-TNS works in two phases: trust evaluation with energy constraint and additive metric-based node evaluation to retain the trustworthiness of the neighbors. The random transigmoid function employed simplifies the complex decision-making process of the AF by distinguishing trusted and un-trusted node to retain network performance. Simulation results show that AF-TNS improves network performance by improving the malicious detection rate and retaining the network’s lifetime. From the experimental result, AF-TNS method ensures minimum delay (8.5 s), minimum energy (8.53 J), high throughput (149 kbs), high network lifetime (390 s), also have less false detective rate (1.5%) while transmitting the network information.
Similar content being viewed by others
References
Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sens J 15(12):6962–6972
Ahmed A, Bakar KA, Channa MI, Khan AW (2016a) A secure routing protocol with trust and energy awareness for wireless sensor network. Mob Netw Appl 21(2):272–285
Ahmed AM, Kong X, Liu L, Xia F, Abolfazli S, Sanaei Z, Tolba A (2016b) BoDMaS: bio-inspired selfishness detection and mitigation in data management for ad-hoc social networks. Ad Hoc Netw 55:119–131
Almotiri S, Awan I (2010) Trust routing in MANET for securing DSR routing protocol. PGNet
Ambigavathi M, Sridharan D (2018) Energy-aware data aggregation techniques in wireless sensor network. In: Advances in power systems and energy management. Springer, Berlin, pp 165–173. https://doi.org/10.1007/978-981-10-4394-9_17
Balachandra M, Prema KV, Makkithaya K (2014) Multiconstrained and multipath QoS aware routing protocol for MANETs. Wirel Netw 20(8):2395–2408
Bulut E, Szymanski BK (2013) Secure multi-copy routing in compromised delay tolerant networks. Wirel Person Commun 73(1):149–168
Devisri S, Balasubramaniam C (2013) Secure routing using trust based mechanism in wireless sensor networks (WSNs). Int J Sci Eng Res 4(2):1–7
Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692
Duan J, Gao D, Yang D, Foh CH, Chen HH (2014) An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet Things J 1(1):58–69
He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371
Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237
Kumar G, Rai MK, Saha R (2017) Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. J Netw Comput Appl 99:10–16
Labraoui N, Gueroui M, Sekhri L (2016) A risk-aware reputation-based trust management in wireless sensor networks. Wirel Pers Commun 87(3):1037–1055
Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232
Li X, Zhou F, Du J (2013) LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur 8(6):924–935
Malik SK, Dave M, Dhurandher SK, Woungang I, Barolli L (2017) An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks. Soft Comput 21(21):6225–6236
Merad-Boudia OR, Senouci SM, Feham M (2018) Secure and efficient verification for data aggregation in wireless sensor networks. Int J Netw Manag.https://doi.org/10.1002/nem.2000
Shabut AM, Dahal KP, Bista SK, Awan IU (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115
Smail O, Cousin B, Mekki R, Mekkakia Z (2014). A multipath energy-conserving routing protocol for wireless ad hoc networks lifetime improvement. EURASIP J Wirel Commun Netw 2014(1):139. https://doi.org/10.1186/1687-1499-2014-139
Stoleru R, Wu H, Chenji H (2012) Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Ad Hoc Netw 10(7):1179–1190
Tolba A (2017) Organizing multipath routing in cloud computing environments. Int J Adv Comput Sci Appl 8(1):455–462
Usman AB, Gutierrez J (2018) Trust-based analytical models for secure wireless sensor networks. In security and privacy management, techniques, and protocols. IGI Glob. https://doi.org/10.4018/978-1-5225-5583-4.ch002
Wang J, Chen Y (2018) Research and improvement of wireless sensor network secure data aggregation protocol based on SMART. Int J Wirel Inf Netw. https://doi.org/10.1007/s10776-017-0381-0
Wang Y, Yu FR, Tang H, Huang M (2014a) A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans Wirel Commun 13(3):1616–1627
Wang B, Chen X, Chang W (2014b) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervas Mob Comput 13:164–180
Xia F, Liaqat HB, Ahmed AM, Liu L, Ma J, Huang R, Tolba A (2016a) User popularity-based packet scheduling for congestion control in ad-hoc social networks. J Comput Syst Sci 82(1):93–112
Xia H, Yu J, Pan ZK, Cheng XG, Sha EHM (2016b) Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel Netw 22(7):2239–2257
Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2013) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Person Commun 69(2):805–826
Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Depend Secur Comput 9(2):184–197
Zhang B, Huang Z, Xiang Y (2014) A novel multiple-level trust management framework for wireless sensor networks. Comput Netw 72:45–61
Zhang P, Wang S, Guo K, Wang J (2018) A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw 70:73–84
Acknowledgements
The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through Research Group no. RG-1438-070.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
AlFarraj, O., AlZubi, A. & Tolba, A. Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Human Comput (2018). https://doi.org/10.1007/s12652-018-0885-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12652-018-0885-1