25
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.

          Related collections

          Most cited references60

          • Record: found
          • Abstract: not found
          • Article: not found

          Power management in energy harvesting sensor networks

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Secure routing in wireless sensor networks: attacks and countermeasures

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Identity-Based Encryption with Outsourced Revocation in Cloud Computing

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                01 March 2018
                March 2018
                : 18
                : 3
                : 751
                Affiliations
                [1 ]School of Information Science and Engineering, Central South University, Changsha 410083, China; tangjiawei@ 123456csu.edu.cn (J.T.); afengliu@ 123456mail.csu.edu.cn (A.L.); zengzhiwen@ 123456mail.csu.edu.cn (Z.Z.)
                [2 ]Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK 74464, USA; xiongnaixue@ 123456gmail.com
                [3 ]College of Computer Science & Technology, Huaqiao University, Xiamen 361021, China; wangtian@ 123456hqu.edu.cn
                Author notes
                [* ]Correspondence: csu_jianzhang@ 123456263.net ; Tel.: +86-731-8887-9628
                Author information
                https://orcid.org/0000-0001-5190-4761
                https://orcid.org/0000-0002-0394-4635
                Article
                sensors-18-00751
                10.3390/s18030751
                5876602
                29494561
                0e35127c-3039-4402-9ebf-5e93e0e36209
                © 2018 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 31 January 2018
                : 26 February 2018
                Categories
                Article

                Biomedical engineering
                wireless energy harvesting networks,security,disjoint routing,marking,network lifetime

                Comments

                Comment on this article