Abstract
Deployed in the monitoring environment, Wireless Sensor Network (WSN) is a measurement and control network composed of miniature and low-cost sensors with sensing, computing, and communication capabilities. The design of the Directed Diffusion (DD) routing protocol is one of the key problems in WSN. In order to obtain the confidentiality of sensing data and solve the unreliability of relay nodes in the existing DD routing protocols, this paper designs an Energy Trust Model (ETM) by introducing the remaining energy and trust of a node. We further propose a Trust-based Secure Directed Diffusion Routing protocol (TSDDR) based on the model. The proposed protocol achieves the establishment of a credible communication path and the transmission of confidential data in WSN. Meanwhile, the balance of energy consumption and the privacy of sensing data can be ensured. The performance analysis results show that the TSDDR protocol can effectively defeat against MITM attacks and prevent the malicious nodes’ impersonation. At the same time, the protocol achieves secure end-to-end anonymous communication with acceptable energy overhead and computational complexity.
Similar content being viewed by others
References
Dai S, Tang J, Zhang A (2010) Gossiping-based directed diffusion for wireless sensor network. Inf Secur Commun Priv 4:1418–1430
El Mougy A, Sameh S (2018) Preserving privacy in wireless sensor networks using onion routing. 2018 international symposium on networks. computers and communications (ISNCC), IEEE, pp 1–6
Fang W, Zhang X, Shi Z, Sun Y, Shan L (2015) Binomial-based trust management system in wireless sensor networks. Chin J Sens Actuators 28(5):703–708
Fei S, Yu G, Hao Z (2007) Secure directed diffusion protocol based on random key predistribution model. J Xian Jiaotong Univ 41(12):1423
Feng L, Li Q, Zhang M (2014) Improvement in spin protocol based on dynamic routing. J Dali Univ 12:8
Hiller J, Pennekamp J, Dahlmanns M, Henze M, Panchenko A, Wehrle K (2019) Tailoring onion routing to the internet of things: Security and privacy in untrusted environments. In: 2019 IEEE 27th international conference on network protocols (ICNP), IEEE, pp 1–12
Jiang N, Xu D, Zhou J, Yan H, Wan T, Zheng J (2020) Toward optimal participant decisions with voting-based incentive model for crowd sensing. Inf Sci 512:1–17
Li Q, Meng X, Huang L (2014) VPN technology realization and network influence analysis based on Diffie-Hellman algorithm. Software Engineer
Li J, Wang X, Huang Z, Wang L, Xiang Y (2019) Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J Parallel Distrib Comput 130:91–97
Liu Z, Wang L, Wang X, Shen X, Li L (2019) Secure remote sensing image registration based on compressed sensing in cloud setting. IEEE Access 7:36516–36526
Luo W, Ma W, Gao Q (2016) A dynamic trust management system for wireless sensor networks. Secur Commun Netw 9(7):613–621
Ren B, Liu L, Ma J (2006) A novel directed diffusion mechanism for wireless sensor networks. J Electron Inf Technol 28(3):562–568
Roy S, Das AK (2014) Secure hierarchical routing protocol (SHRP) for wireless sensor network. In: International symposium on security in computing and communication, Springer, pp 20–29
Sengupta J, Ruj S, Das Bit S (2018) An efficient and secure directed diffusion in industrial wireless sensor networks. In: Proceedings of the 1st international workshop on future industrial communication networks, pp 41–46
Sengupta J, Ruj S, Bit SD (2019) End to end secure anonymous communication for secure directed diffusion in IoT. In: Proceedings of the 20th international conference on distributed computing and networking, pp 445–450
Sinha RK, Jagannatham AK (2014) Gaussian trust and reputation for fading mimo wireless sensor networks. 2014 IEEE international conference on electronics, computing and communication technologies (CONECCT), IEEE, pp 1–6
Wang X, Zhang Y, Gupta BB, Zhu H, Liu D (2019) An identity-based signcryption on lattice without trapdoor. J UCS 25(3):282–293
Ye J, Yang J, Song X (2012) Cross-layer congestion control approach based on directed diffusion routing protocol in WSN. Chin J Sens Actuators 1:1–16
Ye Z, Wen T, Liu Z, Fu C (2019) An algorithm of trust-based secure data aggregation for wireless sensor networks. J Northeastern Univ 12:98–110
Zhang F, Safavi Naini R, Susilo W (2004) An efficient signature scheme from bilinear pairings and its applications. In: International workshop on public key cryptography, Springer, pp 277–290
Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400
Zheng M, Li Y, Zhao XC, Zhou H (2013) Behavior simulation for wireless sensor networks based on directed diffusion. Comput Syst Appl
Acknowledgements
This work was partly funded by EU Horizon 2020 DOMINOES Project (Grant Number: 771066) and CERNET Innovation Project (NGII20181201)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yu, X., Li, F., Li, T. et al. Trust-based secure directed diffusion routing protocol in WSN. J Ambient Intell Human Comput 13, 1405–1417 (2022). https://doi.org/10.1007/s12652-020-02638-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02638-z