Cargando…
Information-Aware Secure Routing in Wireless Sensor Networks
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and stat...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6982967/ https://www.ncbi.nlm.nih.gov/pubmed/31888095 http://dx.doi.org/10.3390/s20010165 |
_version_ | 1783491411059933184 |
---|---|
author | Shi, Qiong Qin, Li Ding, Yinghua Xie, Boli Zheng, Jiajie Song, Lipeng |
author_facet | Shi, Qiong Qin, Li Ding, Yinghua Xie, Boli Zheng, Jiajie Song, Lipeng |
author_sort | Shi, Qiong |
collection | PubMed |
description | Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm. |
format | Online Article Text |
id | pubmed-6982967 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-69829672020-02-06 Information-Aware Secure Routing in Wireless Sensor Networks Shi, Qiong Qin, Li Ding, Yinghua Xie, Boli Zheng, Jiajie Song, Lipeng Sensors (Basel) Article Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm. MDPI 2019-12-26 /pmc/articles/PMC6982967/ /pubmed/31888095 http://dx.doi.org/10.3390/s20010165 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shi, Qiong Qin, Li Ding, Yinghua Xie, Boli Zheng, Jiajie Song, Lipeng Information-Aware Secure Routing in Wireless Sensor Networks |
title | Information-Aware Secure Routing in Wireless Sensor Networks |
title_full | Information-Aware Secure Routing in Wireless Sensor Networks |
title_fullStr | Information-Aware Secure Routing in Wireless Sensor Networks |
title_full_unstemmed | Information-Aware Secure Routing in Wireless Sensor Networks |
title_short | Information-Aware Secure Routing in Wireless Sensor Networks |
title_sort | information-aware secure routing in wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6982967/ https://www.ncbi.nlm.nih.gov/pubmed/31888095 http://dx.doi.org/10.3390/s20010165 |
work_keys_str_mv | AT shiqiong informationawaresecureroutinginwirelesssensornetworks AT qinli informationawaresecureroutinginwirelesssensornetworks AT dingyinghua informationawaresecureroutinginwirelesssensornetworks AT xieboli informationawaresecureroutinginwirelesssensornetworks AT zhengjiajie informationawaresecureroutinginwirelesssensornetworks AT songlipeng informationawaresecureroutinginwirelesssensornetworks |