Skip to main content

Advertisement

Log in

Trust-based neighbor selection using activation function for secure routing in wireless sensor networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Wireless sensor network (WSN) nodes rely on their neighbors to transmit the sensed information to a sink node. A transmitting node assumes that its neighbor is secure and relays its information in an optimal manner. A network’s wireless communication medium and decentralized nature retards its performance by exposing it to internal and external attacks. Therefore, secure networks are placed and vital in selecting trusted neighbors to secure transmission. Trust models and the reputation management system takes advantage of the network’s limitation, resulting in the weekly node detection of malicious neighbors and inconsistent network performance. This paper proposes an activation function-based trusted neighbor selection (AF-TNS) for resource-constrained WSNs to enhance network security. AF-TNS works in two phases: trust evaluation with energy constraint and additive metric-based node evaluation to retain the trustworthiness of the neighbors. The random transigmoid function employed simplifies the complex decision-making process of the AF by distinguishing trusted and un-trusted node to retain network performance. Simulation results show that AF-TNS improves network performance by improving the malicious detection rate and retaining the network’s lifetime. From the experimental result, AF-TNS method ensures minimum delay (8.5 s), minimum energy (8.53 J), high throughput (149 kbs), high network lifetime (390 s), also have less false detective rate (1.5%) while transmitting the network information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sens J 15(12):6962–6972

    Article  Google Scholar 

  • Ahmed A, Bakar KA, Channa MI, Khan AW (2016a) A secure routing protocol with trust and energy awareness for wireless sensor network. Mob Netw Appl 21(2):272–285‏

    Article  Google Scholar 

  • Ahmed AM, Kong X, Liu L, Xia F, Abolfazli S, Sanaei Z, Tolba A (2016b) BoDMaS: bio-inspired selfishness detection and mitigation in data management for ad-hoc social networks. Ad Hoc Netw 55:119–131

    Article  Google Scholar 

  • Almotiri S, Awan I (2010) Trust routing in MANET for securing DSR routing protocol. PGNet‏

  • Ambigavathi M, Sridharan D (2018) Energy-aware data aggregation techniques in wireless sensor network. In: Advances in power systems and energy management. Springer, Berlin, pp 165–173. ‏https://doi.org/10.1007/978-981-10-4394-9_17

  • Balachandra M, Prema KV, Makkithaya K (2014) Multiconstrained and multipath QoS aware routing protocol for MANETs. Wirel Netw 20(8):2395–2408

    Article  Google Scholar 

  • Bulut E, Szymanski BK (2013) Secure multi-copy routing in compromised delay tolerant networks. Wirel Person Commun 73(1):149–168

    Article  Google Scholar 

  • Devisri S, Balasubramaniam C (2013) Secure routing using trust based mechanism in wireless sensor networks (WSNs). Int J Sci Eng Res 4(2):1–7

    Google Scholar 

  • Duan J, Gao D, Foh CH, Zhang H (2013) TC-BAC: a trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Netw 11(8):2675–2692

    Article  Google Scholar 

  • Duan J, Gao D, Yang D, Foh CH, Chen HH (2014) An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications. IEEE Internet Things J 1(1):58–69

    Article  Google Scholar 

  • He D, Gao Y, Chan S, Chen C, Bu J (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw 10(4):361–371

    Google Scholar 

  • Jiang J, Han G, Wang F, Shu L, Guizani M (2015) An efficient distributed trust model for wireless sensor networks. IEEE Trans Parallel Distrib Syst 26(5):1228–1237

    Article  Google Scholar 

  • Kumar G, Rai MK, Saha R (2017) Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. J Netw Comput Appl 99:10–16

    Article  Google Scholar 

  • Labraoui N, Gueroui M, Sekhri L (2016) A risk-aware reputation-based trust management in wireless sensor networks. Wirel Pers Commun 87(3):1037–1055‏

    Article  Google Scholar 

  • Li X, Jia Z, Zhang P, Zhang R, Wang H (2010) Trust-based on-demand multipath routing in mobile ad hoc networks. IET Inf Secur 4(4):212–232‏

    Article  Google Scholar 

  • Li X, Zhou F, Du J (2013) LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur 8(6):924–935

    Article  Google Scholar 

  • Malik SK, Dave M, Dhurandher SK, Woungang I, Barolli L (2017) An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks. Soft Comput 21(21):6225–6236‏

    Article  Google Scholar 

  • Merad-Boudia OR, Senouci SM, Feham M (2018) Secure and efficient verification for data aggregation in wireless sensor networks. Int J Netw Manag.‏https://doi.org/10.1002/nem.2000

    Google Scholar 

  • Shabut AM, Dahal KP, Bista SK, Awan IU (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115

    Article  Google Scholar 

  • Smail O, Cousin B, Mekki R, Mekkakia Z (2014). A multipath energy-conserving routing protocol for wireless ad hoc networks lifetime improvement. EURASIP J Wirel Commun Netw 2014(1):139.‏ https://doi.org/10.1186/1687-1499-2014-139

    Article  Google Scholar 

  • Stoleru R, Wu H, Chenji H (2012) Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Ad Hoc Netw 10(7):1179–1190‏

    Article  Google Scholar 

  • Tolba A (2017) Organizing multipath routing in cloud computing environments. Int J Adv Comput Sci Appl 8(1):455–462‏

    Google Scholar 

  • Usman AB, Gutierrez J (2018) Trust-based analytical models for secure wireless sensor networks. In security and privacy management, techniques, and protocols. IGI Glob. https://doi.org/10.4018/978-1-5225-5583-4.ch002

    Google Scholar 

  • Wang J, Chen Y (2018) Research and improvement of wireless sensor network secure data aggregation protocol based on SMART. Int J Wirel Inf Netw. https://doi.org/10.1007/s10776-017-0381-0

    Google Scholar 

  • Wang Y, Yu FR, Tang H, Huang M (2014a) A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans Wirel Commun 13(3):1616–1627

    Article  Google Scholar 

  • Wang B, Chen X, Chang W (2014b) A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervas Mob Comput 13:164–180

    Article  Google Scholar 

  • Xia F, Liaqat HB, Ahmed AM, Liu L, Ma J, Huang R, Tolba A (2016a) User popularity-based packet scheduling for congestion control in ad-hoc social networks. J Comput Syst Sci 82(1):93–112

    Article  MathSciNet  Google Scholar 

  • Xia H, Yu J, Pan ZK, Cheng XG, Sha EHM (2016b) Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel Netw 22(7):2239–2257

    Article  Google Scholar 

  • Zahariadis T, Trakadas P, Leligou HC, Maniatis S, Karkazis P (2013) A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel Person Commun 69(2):805–826‏

    Article  Google Scholar 

  • Zhan G, Shi W, Deng J (2012) Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Trans Depend Secur Comput 9(2):184–197‏

    Article  Google Scholar 

  • Zhang B, Huang Z, Xiang Y (2014) A novel multiple-level trust management framework for wireless sensor networks. Comput Netw 72:45–61

    Article  Google Scholar 

  • Zhang P, Wang S, Guo K, Wang J (2018) A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw 70:73–84

    Article  Google Scholar 

Download references

Acknowledgements

The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through Research Group no. RG-1438-070.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama AlFarraj.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

AlFarraj, O., AlZubi, A. & Tolba, A. Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Human Comput (2018). https://doi.org/10.1007/s12652-018-0885-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-018-0885-1

Keywords

Navigation