Skip to main content

Advertisement

Log in

A trust aware routing protocol for energy constrained wireless sensor network

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated cost and incapability to counter nodes misbehavior attacks. Recently, trust based solutions have proved to be more effective to address nodes’ misbehavior attacks. Apart from isolating misbehaving nodes, the existing trust based schemes lacks the capability to minimize link failure notifications due to transient transmission disruption which consequently give rise to frequent route breakages thereby undermining throughput and route stability. Moreover, the existing solutions give rise to high energy consumption and control overhead in pursuit of trust estimation and network-wide dissemination which not only adds to network congestion but also undermines network lifetime. In this paper, we present a Trust and Energy aware Routing Protocol (TERP) that makes use of a distributed trust model for the detection and isolation of misbehaving nodes. TERP incorporates a composite routing function that encompasses trust, residual-energy, and hop count of neighbor nodes in making routing decisions. This multi-facet routing strategy helps to balance out energy consumption among trusted nodes while routing data using shorter paths. Moreover, TERP intelligently evaluates the actual link breakage thereby avoiding unnecessary route discoveries. Simulation results demonstrate improved throughput, network lifetime and route stability of TERP when compared to existing work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175–192. doi:10.1016/S1570-8705(03)00019-2.

    Article  Google Scholar 

  2. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38. doi:10.1007/s11276-004-4744-y.

    Article  Google Scholar 

  3. Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510. doi:10.1002/ett.2635.

    Article  Google Scholar 

  4. Momani, M., & Challa, S. (2010). Survey of trust Models in different network domains. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(3), 1–19.

    Article  Google Scholar 

  5. Das, M. L. (2009). Two-factor user Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.

    Article  Google Scholar 

  6. Duan, J., Yang, D., Zhu, H., Zhang, S., & Zhao, J. (2014). TSRF: A trust-aware secure routing framework in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 1–14. doi:10.1155/2014/209436.

    Article  Google Scholar 

  7. Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140. doi:10.1016/j.entcs.2007.12.022.

    Article  Google Scholar 

  8. Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298. doi:10.1109/SURV.2011.042711.00083.

    Article  Google Scholar 

  9. Ishmanov, F., Malik, A. S., Kim, S. W., & Begalov, B. (2013). Trust management system in wireless sensor networks: Design considerations and research challenges. Transactions on Emerging Telecommunications Technologies, pp. 1–24. doi:10.1002/ett.2674.

  10. Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880. doi:10.1016/j.jnca.2011.03.005.

    Article  Google Scholar 

  11. Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In Third IEEE International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU (pp. 25–30).

  12. Mamoun, M. H. (2011). A new proactive routing protocol for MANET. Advances in Information Sciences and Service Sciences, 3(2), 132–140. doi:10.4156/aiss.

    Article  Google Scholar 

  13. Youn, J. (2006). Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks. Journal of Networks, 1(1), 1–11.

    Article  Google Scholar 

  14. Roy, B., Banik, S., Chaki, N., & Saha, B. (2010). An improved route maintenance strategy for QoS based AODV routing protocol. International Conference on Advances in Recent Technologies in Communication and Computing, pp. 51–55. doi:10.1109/ARTCom.2010.62.

  15. Chakeres, I. D., & Belding-royer, E. M. (2002). The utility of hello messages for determining link connectivity. In The 5th International Symposium on Wireless Personal Multimedia Communications. (pp. 504–508).

  16. Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180. doi:10.1016/j.pmcj.2013.06.004.

    Article  Google Scholar 

  17. Duan, J., Gao, D., Foh, C. H., & Zhang, H. (2013). TC-BAC: A trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Networks, 11(8), 2675–2692. doi:10.1016/j.adhoc.2013.05.005.

    Article  Google Scholar 

  18. Qu, C., Ju, L., Jia, Z., Xu, H., & Zheng, L. (2013). Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 42–49). doi:10.1109/TrustCom.2013.9.

  19. Leligou, H. C., Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2012). Combining trust with location information for routing in wireless sensor networks. Wireless Communications and Mobile Computing, 12(12), 1091–1103. doi:10.1002/wcm.1038.

    Article  Google Scholar 

  20. Sun, Y., Luo, H., & Das, S. K. (2012). A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 9(6), 785–797.

    Article  Google Scholar 

  21. Chen, S., Zhang, Y., Liu, Q., & Feng, J. (2012). Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks, 10(8), 1603–1618. doi:10.1016/j.adhoc.2011.07.014.

    Article  Google Scholar 

  22. Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K.-Y. (2010). Trust based outing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551–558. doi:10.4304/jnw.5.5.551-558.

    Article  Google Scholar 

  23. Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.

    Article  Google Scholar 

  24. Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM.

  25. Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM.

  26. Zahariadis, T., Trakadas, P., Leligou, H. C., Maniatis, S., & Karkazis, P. (2012). A novel trust-aware geographical routing scheme for wireless sensor networks. Wireless Personal Communications, 69(2), 805–826. doi:10.1007/s11277-012-0613-7.

  27. Eissa, T., Abdul Razak, S., Khokhar, R. H., & Samian, N. (2013). Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Networks and Applications, 18(5), 666–677. doi:10.1007/s11036-011-0328-0.

    Article  Google Scholar 

  28. Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF?: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.

    Article  Google Scholar 

  29. Abusalah, L., Khokhar, A., & Guizani, M. (2006). Trust aware routing in mobile ad Hoc networks. In IEEE Global Telecommunications Conference (GLOBECOM ’06) (pp. 1–5).

  30. Channa, M. I., & Ahmed, K. M. (2011). A reliable routing scheme for post-disaster ad hoc communication networks. Journal of Communications, 6(7), 549–557. doi:10.4304/jcm.6.7.549-557.

    Article  Google Scholar 

  31. Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83. doi:10.1049/iet-ifs.2010.0160.

    Article  Google Scholar 

  32. Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (pp. 275–283).

  33. Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., & Luke, J. A. (2009). Trust-aware in-network aggregation for wireless sensor networks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (pp. 1–8).

  34. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM. doi:10.1145/345910.345955.

  35. Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia.

  36. Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., et al. (2013). Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 6(6), 669–688. doi:10.1002/sec.

    Article  Google Scholar 

  37. Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer.

  38. Yi, Y., & Shakkottai, S. (2007). Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking, 15(1), 133–144.

    Article  Google Scholar 

  39. Issariyakul, T., & Hossain, E. (2012). Introduction to Network Simulator NS2 (2nd ed.). New York: Springer.

    Book  Google Scholar 

Download references

Acknowledgments

We are thankful to Universiti Teknologi Malaysia (UTM), Malaysia and Quaid-e-Awam University of Engineering, Science & Technology (Q.U.E.S.T), Pakistan for providing us tools, technical support, research environment and facilities to accomplish this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adnan Ahmed.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, A., Abu Bakar, K., Channa, M.I. et al. A trust aware routing protocol for energy constrained wireless sensor network. Telecommun Syst 61, 123–140 (2016). https://doi.org/10.1007/s11235-015-0068-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-015-0068-8

Keywords

Navigation