Trust-based secure directed diffusion routing protocol in WSN
- PDF / 1,838,612 Bytes
- 13 Pages / 595.276 x 790.866 pts Page_size
- 102 Downloads / 223 Views
ORIGINAL RESEARCH
Trust‑based secure directed diffusion routing protocol in WSN Xinying Yu1 · Fengyin Li1 · Tao Li1 · Nan Wu2 · Hua Wang1 · Huiyu Zhou3 Received: 14 June 2020 / Accepted: 24 October 2020 © Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract Deployed in the monitoring environment, Wireless Sensor Network (WSN) is a measurement and control network composed of miniature and low-cost sensors with sensing, computing, and communication capabilities. The design of the Directed Diffusion (DD) routing protocol is one of the key problems in WSN. In order to obtain the confidentiality of sensing data and solve the unreliability of relay nodes in the existing DD routing protocols, this paper designs an Energy Trust Model (ETM) by introducing the remaining energy and trust of a node. We further propose a Trust-based Secure Directed Diffusion Routing protocol (TSDDR) based on the model. The proposed protocol achieves the establishment of a credible communication path and the transmission of confidential data in WSN. Meanwhile, the balance of energy consumption and the privacy of sensing data can be ensured. The performance analysis results show that the TSDDR protocol can effectively defeat against MITM attacks and prevent the malicious nodes’ impersonation. At the same time, the protocol achieves secure end-to-end anonymous communication with acceptable energy overhead and computational complexity. Keywords Wireless sensor network · Directed diffusion routing protocol · Relay node · Energy trust model · Anonymous communication
1 Introduction Since the concept of Internet of Things (IoTs) was formally proposed in 2005, the idea of the interconnection of everything has gradually penetrated people’s lives. From smart * Fengyin Li [email protected] Xinying Yu [email protected] Tao Li [email protected] Nan Wu [email protected] Hua Wang [email protected] Huiyu Zhou [email protected] 1
School of Information Science and Engineering, Qufu Normal University, Rizhao 276826, China
Science and Technology Department, Qufu Normal University, Qufu 273165, China
2
3
School of Informatics, University of Leicester, Leicester LE1 7RH, UK
home, smart transportation and smart city to agricultural production, medical care, national defense and military, the application field of the Internet of Things has been involved in all aspects. In recent years, the Trust models and e-voting schemes (Li et al. 2019) are often used to assess the trustworthiness of entities in IoTs. Meanwhile, the high-resolution remote sensing image registration (Liu et al. 2019) and the crowd sensing in sensing applications (Jiang et al. 2020) have developed rapidly, which has put forward higher requirements for the Internet of Things. The wireless sensor network has become an important part of the IoTs, and the sensor nodes are the key part of the wireless sensor network. However, the resource-constrained sensor nodes are usually distributed in various environments in a multi-hop, self-organizing manner and are vulnerable to atta
Data Loading...