Advertisement

Trust Based Energy Preserving Routing Protocol in Multi-hop WSN

  • Saima RazaEmail author
  • Waleej Haider
  • Nouman M. Durrani
  • Nadeem Kafi Khan
  • Mohammad Asad Abbasi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9466)

Abstract

Wireless Sensor Networks (WSN) are widely used in many sensitive applications, where human deployment is almost impossible. Due to resource constraints, the network and hence the forwarded information is open for attacks. Hence, it is desirable to ensure source to sink privacy in order to maximize the network lifetime. In this paper we studied security threats and energy constraints while deploying WSN nodes. Moreover, we propose a Trust Based Secure and Energy Preserving Routing Protocol (TEPP), in multi-hop WSN. The proposed solution monitors reputation and trust worthiness of nodes and maintains a history of interaction between nodes to identify secure and trust worthy path. The effectiveness of our proposed protocol has been experimentally verified against various attacks. At the end future research directions have been highlighted.

Keywords

WSN Trust-based Energy efficient Secure routing 

References

  1. 1.
    Stajano, F.: Security issues in ubiquitous computing. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 281–314. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  2. 2.
    Durrani, N.M., et al.: Secure multi-hop routing protocols in wireless sensor networks: requirements, challenges and solutions. In: 8th IEEE ICDIM (2013)Google Scholar
  3. 3.
    Carullo, G., et al.: FeelTrust: providing trustworthy communications in Ubiquitous Mobile environment. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA). IEEE (2013) Google Scholar
  4. 4.
    Pirzada, A.A., McDonald, C.: Trusted greedy perimeter stateless routing. In: 15th IEEE International Conference on Networks, ICON 2007. IEEE (2007)Google Scholar
  5. 5.
    Bao, F., et al.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)Google Scholar
  6. 6.
    Li, X., Lyu, M.R., Liu, J.: A trust model based routing protocol for secure adhoc networks. In: IEEE Proceedings on Aerospace Conference, vol. 2 (2004)Google Scholar
  7. 7.
    Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843–857 (2004)CrossRefGoogle Scholar
  8. 8.
    Sen, S., Sajja, N.: Robustness of reputation-based trust: boolean case. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1, Bologna, Italy, 15–19 July 2002Google Scholar
  9. 9.
    Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V.: dRBAC: distributed role-based access control for dynamic coalition environments. In: Proceedings of the 22nd ICDCS 2002. IEEE Computer Society, July 2002Google Scholar
  10. 10.
    Zhan, G., Shi, W., Deng, J.: TARF: A trust-aware routing framework for wireless sensor networks. In: Sá Silva, J., Krishnamachari, B., Boavida, F. (eds.) EWSN 2010. LNCS, vol. 5970, pp. 65--80. Springer, Heidelberg (2010)Google Scholar
  11. 11.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom). ACM Press, pp. 255–265 (2000)Google Scholar
  12. 12.
    Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. ACM (2003) Google Scholar
  13. 13.
    Soodkhah, M., Mohammadi, A., Bafghi, G.: A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation. In: 9th ISC (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Saima Raza
    • 1
    Email author
  • Waleej Haider
    • 1
  • Nouman M. Durrani
    • 2
  • Nadeem Kafi Khan
    • 2
  • Mohammad Asad Abbasi
    • 1
  1. 1.Sir Syed University of Engineering and TechnologyKarachiPakistan
  2. 2.FAST NUCESKarachiPakistan

Personalised recommendations