Cargando…
A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximi...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5876602/ https://www.ncbi.nlm.nih.gov/pubmed/29494561 http://dx.doi.org/10.3390/s18030751 |
_version_ | 1783310543731294208 |
---|---|
author | Tang, Jiawei Liu, Anfeng Zhang, Jian Xiong, Neal N. Zeng, Zhiwen Wang, Tian |
author_facet | Tang, Jiawei Liu, Anfeng Zhang, Jian Xiong, Neal N. Zeng, Zhiwen Wang, Tian |
author_sort | Tang, Jiawei |
collection | PubMed |
description | The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%. |
format | Online Article Text |
id | pubmed-5876602 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-58766022018-04-09 A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks Tang, Jiawei Liu, Anfeng Zhang, Jian Xiong, Neal N. Zeng, Zhiwen Wang, Tian Sensors (Basel) Article The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%. MDPI 2018-03-01 /pmc/articles/PMC5876602/ /pubmed/29494561 http://dx.doi.org/10.3390/s18030751 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tang, Jiawei Liu, Anfeng Zhang, Jian Xiong, Neal N. Zeng, Zhiwen Wang, Tian A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks |
title | A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks |
title_full | A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks |
title_fullStr | A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks |
title_full_unstemmed | A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks |
title_short | A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks |
title_sort | trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5876602/ https://www.ncbi.nlm.nih.gov/pubmed/29494561 http://dx.doi.org/10.3390/s18030751 |
work_keys_str_mv | AT tangjiawei atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT liuanfeng atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT zhangjian atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT xiongnealn atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT zengzhiwen atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT wangtian atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT tangjiawei trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT liuanfeng trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT zhangjian trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT xiongnealn trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT zengzhiwen trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks AT wangtian trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks |