Cargando…

Information-Aware Secure Routing in Wireless Sensor Networks

Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and stat...

Descripción completa

Detalles Bibliográficos
Autores principales: Shi, Qiong, Qin, Li, Ding, Yinghua, Xie, Boli, Zheng, Jiajie, Song, Lipeng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6982967/
https://www.ncbi.nlm.nih.gov/pubmed/31888095
http://dx.doi.org/10.3390/s20010165
_version_ 1783491411059933184
author Shi, Qiong
Qin, Li
Ding, Yinghua
Xie, Boli
Zheng, Jiajie
Song, Lipeng
author_facet Shi, Qiong
Qin, Li
Ding, Yinghua
Xie, Boli
Zheng, Jiajie
Song, Lipeng
author_sort Shi, Qiong
collection PubMed
description Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm.
format Online
Article
Text
id pubmed-6982967
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-69829672020-02-06 Information-Aware Secure Routing in Wireless Sensor Networks Shi, Qiong Qin, Li Ding, Yinghua Xie, Boli Zheng, Jiajie Song, Lipeng Sensors (Basel) Article Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm. MDPI 2019-12-26 /pmc/articles/PMC6982967/ /pubmed/31888095 http://dx.doi.org/10.3390/s20010165 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shi, Qiong
Qin, Li
Ding, Yinghua
Xie, Boli
Zheng, Jiajie
Song, Lipeng
Information-Aware Secure Routing in Wireless Sensor Networks
title Information-Aware Secure Routing in Wireless Sensor Networks
title_full Information-Aware Secure Routing in Wireless Sensor Networks
title_fullStr Information-Aware Secure Routing in Wireless Sensor Networks
title_full_unstemmed Information-Aware Secure Routing in Wireless Sensor Networks
title_short Information-Aware Secure Routing in Wireless Sensor Networks
title_sort information-aware secure routing in wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6982967/
https://www.ncbi.nlm.nih.gov/pubmed/31888095
http://dx.doi.org/10.3390/s20010165
work_keys_str_mv AT shiqiong informationawaresecureroutinginwirelesssensornetworks
AT qinli informationawaresecureroutinginwirelesssensornetworks
AT dingyinghua informationawaresecureroutinginwirelesssensornetworks
AT xieboli informationawaresecureroutinginwirelesssensornetworks
AT zhengjiajie informationawaresecureroutinginwirelesssensornetworks
AT songlipeng informationawaresecureroutinginwirelesssensornetworks