Abstract
Compared to conventional Wireless Sensor Networks (WSNs), Software-Defined WSNs (SD-WSNs) introduce the software defined networking (SDN) paradigm to offer more adaptivity, flexibility and scalability. Research on reliable and trusted routing for SD-WSNs is a fundamental but very challenging task due to their unstable wireless connectivity, low security assurance and diverse inner adversaries. Hence, we propose a trusted link-separation multipath selection method for SD-WSNs in adversarial environments by jointly considering routing efficiency and security. Specifically, we introduce a Bayesian model to evaluate the nodes’ trustworthiness based on their communication behaviors. After that, we formulate the trusted link-separation multipath selection as a multi-objective optimization problem. Then, we generate k trusted link-separation paths by solving the optimization problem using a greedy algorithm. Comparative experiments using six different topologies, including three random networks (Waxman, ER random graphs, and WS small-world topologies) and three real ones (Cernet, Bandcon, and DFN), validate the superior performance of the proposed method compared with the delay-first and the trust-first baseline routing schemes.
The corresponding author of this paper is Qiang Liu. The work is supported by National Key Research and Development Program of China (No. 2018YFB0204301), National Natural Science Foundation of China (No. 61702539 and U1811462), Hunan Provincial Natural Science Foundation of China (No. 2018JJ3611), and NUDT Research Project (No. ZK-18-03-47).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Access URL: http://www.topology-zoo.org/files/Cernet.gml.
- 2.
Access URL: http://www.topology-zoo.org/files/Bandcon.gml.
- 3.
Access URL: http://www.topology-zoo.org/files/Dfn.gml.
References
Alrawi, O., Lever, C., Antonakakis, M., Monrose, F.: Sok: Security evaluation of home-based iot deployments. In: 2019 IEEE Symposium on Security and Privacy (SP). pp. 1362–1380, IEEE (2019)
Baranov, N., Bashkin, V., Bashkin, M.: A lightweight cryptographic scheme of route hiding for the on-demand route discovery algorithms. In: 2018 7th Mediterranean Conference on Embedded Computing (MECO). pp. 1–4, IEEE (2018)
Boychev, I.Z.: Research algorithms to optimize the drone route used for security. In: 2018 IEEE XXVII International Scientific Conference Electronics-ET. pp. 1–4, IEEE (2018)
Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surveys Tuts. 13(4), 562–583 (2010)
Duan, J., Wang, Z., Wu, C.: Responsive multipath tcp in sdn-based datacenters. In: IEEE International Conference on Communications (2015)
Javed, M., Zeadally, S.: Repguide: Reputation-based route guidance using internet of vehicles. IEEE Commun. Mag. 2(4), 81–87 (2018)
Koerner, M., Kao, O.: Evaluating sdn based rack-to-rack multi-path switching for data-center networks. Procedia Comput. Sci. 34, 118–125 (2014)
Vinoth Kumar, V., Ramamoorthy, S.: Secure adhoc on-demand multipath distance vector routing in MANET. In: Mandal, J.K., Saha, G., Kandar, D., Maji, A.K. (eds.) Proceedings of the International Conference on Computing and Communication Systems. LNNS, vol. 24, pp. 49–63. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-6890-4_5
Liu, K.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305–317 (2006)
Luckie, M., Beverly, R., Koga, R., Keys, K., Kroll, J.A., claffy, k.: Network hygiene, incentives, and regulation: Deployment of source address validation in the internet. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. pp. 465–480 (2019)
Meng, Y., Li, W., Kwok, L.: Evaluation of detecting malicious nodes using bayesian model in wireless intrusion detection. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 40–53. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38631-2_4
Paasch, C., Ferlin, S., Alay, O., Bonaventure, O.: Experimental evaluation of multipath tcp schedulers. In: Proceedings of the 2014 ACM SIGCOMM workshop on Capacity sharing workshop. pp. 27–32, ACM (2014)
Rajeswari, A.R., Kulothungan, K., Ganapathy, S., Kannan, A.: A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer Peer Netw. Appl. 12(5), 1076–1096 (2019). https://doi.org/10.1007/s12083-019-00766-8
Shin, D., Yun, K., Kim, J., Astillo, P.V., Kim, J.N., You, I.: A security protocol for route optimization in dmm-based smart home iot networks. IEEE Access 7, 142531–142550 (2019)
Sommer, R., Paxson, V.: Outside the closed world: On using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy (2010)
Valente, J., Wynn, M.A., Cardenas, A.A.: Stealing, spying, and abusing: consequences of attacks on internet of things devices. IEEE Secur. Priv. 17(5), 10–21 (2019)
Wang, X.: Study on the Technology and Prototype of Software-Defined Mobile Ad-Hoc Networking. Ph.D. thesis, Nanjing University of Posts and Telecommunications (2015)
Zhang, T., Yan, L., Yang, Y.: Trust evaluation method for clustered wireless sensor networks based on cloud model. Wirel. Netw. 24(3), 777–797 (2016). https://doi.org/10.1007/s11276-016-1368-y
Zhao, P., Zhao, W., Liu, Q.: Multi-objective link-separation multipath selection using k max-min for software-defined manets. In: Proceedings of the 15th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2019). pp. 259–264, IEEE (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhao, P., Zhao, W., Liu, Q., Wang, A. (2020). Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-9129-7_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9128-0
Online ISBN: 978-981-15-9129-7
eBook Packages: Computer ScienceComputer Science (R0)