Abstract

Due to the characteristics of limited resources and dynamic topology, wireless sensor networks (WSNs) are facing two major problems: security and energy consumption. Nowadays, the trust based solutions are feasible to cope with different bad behaviors of nodes, but there still exist a variety of attacks, high energy consumption and communication congestion between nodes. Therefore, this paper proposes a new trust based secure and energy efficient routing protocol (TBSEER) to solve these problems. TBSEER calculates the comprehensive trust value through adaptive direct trust value, indirect trust value and energy trust value, which can be resistant to black hole, selective forwarding, sinkhole and hello flood attacks. Moreover, the adaptive penalty mechanism and volatilization factor are used to fast identify the malicious nodes. In addition, the nodes only need to calculate the direct trust value, and the indirect trust value is obtained by the Sink, so as to further reduce the energy consumption caused by iterative calculations. Finally, the cluster heads find the safest multi-hop routes based on the comprehensive trust value, which can actively avoid wormhole attack. The simulation results show that the proposed TBSEER reduces network energy consumption, speeds up the identification of malicious nodes, as well as resists all common attacks.

Highlights

  • With the rapid development of Internet of Things, wireless sensor networks (WSNs) are more and more widely used in military, environmental monitoring, medical and industrial production, traffic control and other fields [1,2,3]

  • When the network runs to the 100th round, 5% of malicious nodes launch black hole attacks, and the comprehensive trust value of TBSEER, trust sensing-based secure routing mechanism (TSSRM) and trust and energy aware secure routing protocol (TESRP) decreases as the network runs

  • This paper proposes a new trust based secure and energy efficient routing protocol TBSEER to deal with various common network attacks

Read more

Summary

INTRODUCTION

With the rapid development of Internet of Things, WSNs are more and more widely used in military, environmental monitoring, medical and industrial production, traffic control and other fields [1,2,3]. How to defend against routing attacks from malicious nodes has become a hot topic in WSNs. In order to guarantee the routing security of wireless sensor networks, many researchers have proposed kinds of secure routing protocols based on cryptography and authentication [13,14,15,16]. Because the premise of implementing these security mechanisms is that all nodes are cooperative and trustworthy, which is unrealistic for internal attacks on the network [19, 20] These mechanisms require complex calculations and high memory capacity, which leads to high energy consumption [21]. To defend against routing attacks in WSNs, especially internal attacks [37], the security mechanisms based on trust awareness have been verified to be effective.

RELATED WORK
DIRECT TRUST VALUE
ENERGY TRUST VALUE
COMPREHENSIVE TRUST VALUE
NETWORK MODEL
CLUSTER HEAD ELECTION
INSPECTOR NODE ELECTION
NEXT HOP CLUSTER HEAD ELECTION
SIMULATION RESULTS AND PERFORMANCE EVALUATION
COMPREHENSIVE TRUST VALUE OF MALICIOUS NODES UNDER ATTACK
AVERAGE END TO END DELAY
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call