A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network

Abstract

Mobile wireless sensor network (MWSN) has the features of self-organization, multiple-hop and limited energy resources. It is vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. In this paper, the existing security problems and solutions in MWSN are summarized, and then a trust management system based on neighbor monitoring is proposed. In the trust management system, the trust value is calculated by the neighbor monitoring mechanism, and the direct trust value and the indirect trust value are combined to establish the distributed trust model to detect the malicious nodes. The consistency check algorithm is capable of defending against the attacks on the trust model. In addition, because of the limited energy of the sensor nodes, the energy-balanced algorithm is introduced to prolong the lifespan of MWSN. The residual energy and energy density are considered in the routing decision. Finally, the simulation experiments show that the proposed algorithm can detect the malicious nodes effectively and achieve the energy-balanced goal to prolong the lifespan of MWSN.

Share and Cite:

Liu, B. and Wu, Y. (2015) A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network. Wireless Sensor Network, 7, 137-148. doi: 10.4236/wsn.2015.711012.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Akyildiz, I.F., Melodia, T. and Chowdury, K.R. (2007) Wireless Multimedia Sensor Networks: A Survey. IEEE Wireless Communications, 14, 32-39.
http://dx.doi.org/10.1109/MWC.2007.4407225
[2] Deng, J., Han, R. and Mishra, S. (2006) INSENS: Intrusion-Tolerant Routing for Wireless Sensor Networks. Computer Communications, 29, 216-230.
http://dx.doi.org/10.1016/j.comcom.2005.05.018
[3] Wood, A.D., Fang, L., Stankovic, J.A., et al. (2006) SIGF: A Family of Configurable, Secure Routing Protocols for Wireless Sensor Networks. Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, 30 October 2006.
http://dx.doi.org/10.1145/1180345.1180351
[4] Dong, J., Curtmola, R. and Nita-Rotaru, C. (2011) Secure High-Throughput Multicast Routing in Wireless Mesh Networks. IEEE Transactions on Mobile Computing, 10, 653-668.
http://dx.doi.org/10.1109/TMC.2010.194
[5] Hur, J., Lee, Y., Yoon, H., Choi, D. and Jin, S. (2005) Trust Evaluation Model for Wireless Sensor Networks. Proceedings of Advanced Communication Technology Conference, ICACT 2005, 1, 491-496.
[6] Ganeriwal, S., Balzano, L.K. and Srivastava, M. (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks, 4, 3.
[7] Crosby, G., Pissinou, N. and Makki, K. (2006) Location-Aware, Trust-Based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. International Journal of Network Security, 12, 107-117.
[8] Theodorakopoulos, G. and Baras, J.S. (2006) On Trust Models and Trust Evaluation Metrics for Ad-Hoc Networks. IEEE Journal on Selected Areas in Communications (JSAC), 24, 318-328.
http://dx.doi.org/10.1109/JSAC.2005.861390
[9] Sun, Y., Yu, W., Han, Z. and Liu, K.J.R. (2006) Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks, 24, 305-317.
[10] Li, H. and Singhal, M. (2006) A Secure Routing Protocol for Wireless Ad Hoc Networks. Proceedings of the 39th Hawaii International Conference on System Sciences.
http://www.computer.org/csdl/proceedings/hicss/2006/2507/09/250790225a.pdf
[11] Kang, K.D., Liu, K. and Abu-Ghazaleh, N. (2006) Securing Geographic Routing in Wireless Sensor Networks. 9th Annual NYS Cyber Security Conference: Symposium on Information Assurance, Albany, 14-15 June 2006, 38-49.
http://www.albany.edu/iasymposium/proceedings/2006/kang.pdf
[12] Akyildiz, I.F., et al. (2002) A Survey on Sensor Networks. IEEE Communications Magazine, 40, 102-114.
http://dx.doi.org/10.1109/MCOM.2002.1024422
[13] Lindsey, S. and Raghavendra, C.S. (2002) PEGASIS: Power-Efficient Gathering in Sensor Information Systems. IEEE Aerospace Conference Proceedings, 3, 1125-1130.
http://dx.doi.org/10.1109/aero.2002.1035242
[14] Hung, K.S., Lui, K.S. and Kwok, Y.K. (2007) A Trust-Based Geographical Routing Scheme in Sensor Networks. Proceedings of IEEE Wireless Communications and Networking Conference, Hongkong, 11-15 March 2007, 3123-3127.
http://dx.doi.org/10.1109/wcnc.2007.577
[15] Eghbali, A.N., Javan, N.T. and Dehghan, M. (2007) Load-Balancing Using Multi-Path Directed Diffusion in Wireless Sensor Networks. Lecture Note on Computer Science, 4864, 44-55.
http://dx.doi.org/10.1007/978-3-540-77024-4_6
[16] Cicirello, P., Mottola, L. and Picco, G.P. (2007) Efficient Routing from Multiple Sources to Multiple Sinks in Wireless Sensor Networks. Proceedings of the 4th European Conference on Wireless Sensor Networks (EWSN 2007), Delft, 29-31 January 2007, 34-50.
http://dx.doi.org/10.1007/978-3-540-69830-2_3
[17] Heinzelman, W., Chandrakasan, A. and Balakrishnan, H. (2000) Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS’00), 4-7 January 2000.
http://dx.doi.org/10.1109/hicss.2000.926982
[18] Ren, F.Y., et al. (2011) EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, 22, 2108-2125.
http://dx.doi.org/10.1109/TPDS.2011.40

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.