Skip to main content

Advertisement

Log in

Trust-based secure directed diffusion routing protocol in WSN

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Deployed in the monitoring environment, Wireless Sensor Network (WSN) is a measurement and control network composed of miniature and low-cost sensors with sensing, computing, and communication capabilities. The design of the Directed Diffusion (DD) routing protocol is one of the key problems in WSN. In order to obtain the confidentiality of sensing data and solve the unreliability of relay nodes in the existing DD routing protocols, this paper designs an Energy Trust Model (ETM) by introducing the remaining energy and trust of a node. We further propose a Trust-based Secure Directed Diffusion Routing protocol (TSDDR) based on the model. The proposed protocol achieves the establishment of a credible communication path and the transmission of confidential data in WSN. Meanwhile, the balance of energy consumption and the privacy of sensing data can be ensured. The performance analysis results show that the TSDDR protocol can effectively defeat against MITM attacks and prevent the malicious nodes’ impersonation. At the same time, the protocol achieves secure end-to-end anonymous communication with acceptable energy overhead and computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Dai S, Tang J, Zhang A (2010) Gossiping-based directed diffusion for wireless sensor network. Inf Secur Commun Priv 4:1418–1430

    Google Scholar 

  • El Mougy A, Sameh S (2018) Preserving privacy in wireless sensor networks using onion routing. 2018 international symposium on networks. computers and communications (ISNCC), IEEE, pp 1–6

  • Fang W, Zhang X, Shi Z, Sun Y, Shan L (2015) Binomial-based trust management system in wireless sensor networks. Chin J Sens Actuators 28(5):703–708

    Google Scholar 

  • Fei S, Yu G, Hao Z (2007) Secure directed diffusion protocol based on random key predistribution model. J Xian Jiaotong Univ 41(12):1423

    MATH  Google Scholar 

  • Feng L, Li Q, Zhang M (2014) Improvement in spin protocol based on dynamic routing. J Dali Univ 12:8

    Google Scholar 

  • Hiller J, Pennekamp J, Dahlmanns M, Henze M, Panchenko A, Wehrle K (2019) Tailoring onion routing to the internet of things: Security and privacy in untrusted environments. In: 2019 IEEE 27th international conference on network protocols (ICNP), IEEE, pp 1–12

  • Jiang N, Xu D, Zhou J, Yan H, Wan T, Zheng J (2020) Toward optimal participant decisions with voting-based incentive model for crowd sensing. Inf Sci 512:1–17

    Article  Google Scholar 

  • Li Q, Meng X, Huang L (2014) VPN technology realization and network influence analysis based on Diffie-Hellman algorithm. Software Engineer

  • Li J, Wang X, Huang Z, Wang L, Xiang Y (2019) Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. J Parallel Distrib Comput 130:91–97

    Article  Google Scholar 

  • Liu Z, Wang L, Wang X, Shen X, Li L (2019) Secure remote sensing image registration based on compressed sensing in cloud setting. IEEE Access 7:36516–36526

    Article  Google Scholar 

  • Luo W, Ma W, Gao Q (2016) A dynamic trust management system for wireless sensor networks. Secur Commun Netw 9(7):613–621

    Article  Google Scholar 

  • Ren B, Liu L, Ma J (2006) A novel directed diffusion mechanism for wireless sensor networks. J Electron Inf Technol 28(3):562–568

    Google Scholar 

  • Roy S, Das AK (2014) Secure hierarchical routing protocol (SHRP) for wireless sensor network. In: International symposium on security in computing and communication, Springer, pp 20–29

  • Sengupta J, Ruj S, Das Bit S (2018) An efficient and secure directed diffusion in industrial wireless sensor networks. In: Proceedings of the 1st international workshop on future industrial communication networks, pp 41–46

  • Sengupta J, Ruj S, Bit SD (2019) End to end secure anonymous communication for secure directed diffusion in IoT. In: Proceedings of the 20th international conference on distributed computing and networking, pp 445–450

  • Sinha RK, Jagannatham AK (2014) Gaussian trust and reputation for fading mimo wireless sensor networks. 2014 IEEE international conference on electronics, computing and communication technologies (CONECCT), IEEE, pp 1–6

  • Wang X, Zhang Y, Gupta BB, Zhu H, Liu D (2019) An identity-based signcryption on lattice without trapdoor. J UCS 25(3):282–293

    MathSciNet  Google Scholar 

  • Ye J, Yang J, Song X (2012) Cross-layer congestion control approach based on directed diffusion routing protocol in WSN. Chin J Sens Actuators 1:1–16

    Google Scholar 

  • Ye Z, Wen T, Liu Z, Fu C (2019) An algorithm of trust-based secure data aggregation for wireless sensor networks. J Northeastern Univ 12:98–110

    Google Scholar 

  • Zhang F, Safavi Naini R, Susilo W (2004) An efficient signature scheme from bilinear pairings and its applications. In: International workshop on public key cryptography, Springer, pp 277–290

  • Zhao S, Aggarwal A, Frost R, Bai X (2012) A survey of applications of identity-based cryptography in mobile ad-hoc networks. IEEE Commun Surv Tutor 14(2):380–400

    Article  Google Scholar 

  • Zheng M, Li Y, Zhao XC, Zhou H (2013) Behavior simulation for wireless sensor networks based on directed diffusion. Comput Syst Appl

Download references

Acknowledgements

This work was partly funded by EU Horizon 2020 DOMINOES Project (Grant Number: 771066) and CERNET Innovation Project (NGII20181201)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengyin Li.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, X., Li, F., Li, T. et al. Trust-based secure directed diffusion routing protocol in WSN. J Ambient Intell Human Comput 13, 1405–1417 (2022). https://doi.org/10.1007/s12652-020-02638-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02638-z

Keywords

Navigation