Cargando…

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximi...

Descripción completa

Detalles Bibliográficos
Autores principales: Tang, Jiawei, Liu, Anfeng, Zhang, Jian, Xiong, Neal N., Zeng, Zhiwen, Wang, Tian
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5876602/
https://www.ncbi.nlm.nih.gov/pubmed/29494561
http://dx.doi.org/10.3390/s18030751
_version_ 1783310543731294208
author Tang, Jiawei
Liu, Anfeng
Zhang, Jian
Xiong, Neal N.
Zeng, Zhiwen
Wang, Tian
author_facet Tang, Jiawei
Liu, Anfeng
Zhang, Jian
Xiong, Neal N.
Zeng, Zhiwen
Wang, Tian
author_sort Tang, Jiawei
collection PubMed
description The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.
format Online
Article
Text
id pubmed-5876602
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-58766022018-04-09 A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks Tang, Jiawei Liu, Anfeng Zhang, Jian Xiong, Neal N. Zeng, Zhiwen Wang, Tian Sensors (Basel) Article The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%. MDPI 2018-03-01 /pmc/articles/PMC5876602/ /pubmed/29494561 http://dx.doi.org/10.3390/s18030751 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tang, Jiawei
Liu, Anfeng
Zhang, Jian
Xiong, Neal N.
Zeng, Zhiwen
Wang, Tian
A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
title A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
title_full A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
title_fullStr A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
title_full_unstemmed A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
title_short A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
title_sort trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5876602/
https://www.ncbi.nlm.nih.gov/pubmed/29494561
http://dx.doi.org/10.3390/s18030751
work_keys_str_mv AT tangjiawei atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT liuanfeng atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT zhangjian atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT xiongnealn atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT zengzhiwen atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT wangtian atrustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT tangjiawei trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT liuanfeng trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT zhangjian trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT xiongnealn trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT zengzhiwen trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks
AT wangtian trustbasedsecureroutingschemeusingthetracebackapproachforenergyharvestingwirelesssensornetworks