Document Type : Review Article

Authors

Department of Computer Engineering, Tabriz branch, Islamic Azad University, Tabriz, Iran

Abstract

Security is considered to be one of the most important challenges in wireless sensor networks (WSNs). Due to inherent resource constraints in WSNs, traditional security mechanisms may not be used in these networks. In recent years, trust and reputation management in distributed systems has been proposed as a novel and accurate way for handling security deficiencies. Such deficiencies are deemed to be inherent in WSNs. Detecting malicious nodes is an important role of Trust models in WSNs. In line with reducing the above-mentioned deficiencies, the present paper has proposed a trust-based scheme for increasing security (TSIS) model for WSNs. The proposed trust-based scheme divides the network into some clusters. Inside each cluster, a special node named supervisor node is responsible for calculating the trust values of other nodes. When supervisor nodes calculate trust values of other nodes in a cluster, they do not distribute these values. The receiver node requests the sender node authentication from its own supervisor node. The proposed method was simulated in the NS-2 environment. The simulation results indicate that the proposed method has improved energy efficiency and packet delivery rate. Hence, it has better performance than the earlier works with respect to the above-mentioned parameters.

Keywords

[1] S. V. Vajdi, A. R. Hilal, S. A. Abeer, and O. A. Basir, "Multi-hop Interference-Aware Routing Protocol for Wireless Sensor Networks," Procedia Computer Science, vol. 10, pp. 933-938, 2012.
[2] J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Computer Communications, vol. 33, pp. 1086-1093, 2010.
[3] M. Azharuddin, P. Kuila, and P. K. Jana, "Energy efficient fault tolerant clustering and routing algorithms for wireless sensor networks," Computers & Electrical Engineering.
[4] I. Banerjee, P. Chanak, H. Rahaman, and T. Samanta, "Effective fault detection and routing scheme for wireless sensor networks," Computers & Electrical Engineering, vol. 40, pp. 291-306, 2014.
[5] J. Lee, K. Kapitanova, and S. H. Son, "The price of security in wireless sensor networks," Computer Networks, vol. 54, pp. 2967-2978, 2010.
[6] L. B. Oliveira, A. Ferreira, M. A. Vilaça, H. C. Wong, M. Bern, R. Dahab, et al., "SecLEACH—On the security of clustered sensor networks," Signal Processing, vol. 87, pp. 2882-2895, 2007.
[7] J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, pp. 2292-2330, 2008.
[8] A. A. Cardenas, T. Roosta, and S. Sastry, "Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems," Ad Hoc Networks, vol. 7, pp. 1434-1447, 2009.
[9] Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, pp. 867-880, 2012.
[10] Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference on, 2006, pp. 437-446.
[11] J. Duan, D. Gao, C. H. Foh, and H. Zhang, "TC-BAC: A trust and centrality degree based access control model in wireless sensor networks," Ad Hoc Networks, vol. 11, pp. 2675-2692, 2013.
[12] G. Sharma, S. Bala, and A. K. Verma, "Security Frameworks for Wireless Sensor Networks-Review," Procedia Technology, vol. 6, pp. 978-987, 2012.
[13] A. Boukerch, L. Xu, and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol. 30, pp. 2413-2427, 2007.
[14] H. Xia, Z. Jia, X. Li, L. Ju, and E. H.-M. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks," Ad Hoc Networks, vol. 11, pp. 2096-2114, 2013.
[15] G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, "Management and applications of trust in Wireless Sensor Networks: A survey," Journal of Computer and System Sciences, vol. 80, pp. 602-617, 2014.
[16] S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 4, p. 15, 2008.
[17] R. Mitchell and I.-R. Chen, "A survey of intrusion detection in wireless network applications," Computer Communications, vol. 42, pp. 1-23, 2014.
[18] T. K. Kim and H. S. Seo, "A trust model using fuzzy logic in wireless sensor network," World academy of science, engineering and technology, vol. 42, pp. 63-66, 2008.
[19] R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y.-J. Song, "Group-based trust management scheme for clustered wireless sensor networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 20, pp. 1698-1712, 2009.
[20] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on, 2000, p. 10 pp. vol. 2.
[21] X. Anita, M. Bhagyaveni, and J. M. L. Manickam, "Collaborative Lightweight Trust Management Scheme for Wireless Sensor Networks," Wireless Personal Communications, pp. 1-24, 2014.
[22] Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, 2003, pp. 1976-1986.
[23] Y.-C. Hu, A. Perrig, and D. B. Johnson, "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 370-380, 2006.
[24] E.-H. Ngai, J. Liu, and M. R. Lyu, "On the intruder detection for sinkhole attack in wireless sensor networks," in Communications, 2006. ICC'06. IEEE International Conference on, 2006, pp. 3383-3389.
[25] K. Fall and K. Varadhan, "The ns Manual (formerly ns Notes and Documentation)," The VINT project, vol. 47, 2005.
[26] M. U. s. Guide, "The mathworks," Inc., Natick, MA, vol. 5, 1998.
[27] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002.
[28] A. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, pp. 54-62, 2002.
[29] J. Zhao and R. Govindan, "Understanding packet delivery performance in dense wireless sensor networks," in Proceedings of the 1st international conference on Embedded networked sensor systems, 2003, pp. 1-13.
[30] Ghaffari, Ali. "Congestion control mechanisms in wireless sensor networks: A survey." Journal of network and computer applications 52 (2015): 101-115.
[31] Ghaffari, Ali. "Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms." Wireless Networks 23, no. 3 (2017): 703-714.
[32] Masoudi, Rahim, and Ali Ghaffari. "Software defined networks: A survey." Journal of Network and Computer Applications 67 (2016): 1-25.
[33] Nikokheslat, Hossein Dabbagh, and Ali Ghaffari. "Protocol for Controlling Congestion in Wireless Sensor Networks." Wireless Personal Communications: 1-19.
[34] Ghebleh, Reza, and Ali Ghaffari. "A Multi-criteria Method for Resource Discovery in Distributed Systems Using Deductive Fuzzy System." International Journal of Fuzzy Systems: 1-11.
[35] KeyKhosravi, Davood, Ali Ghaffari, Ali Hosseinalipour, and Batool Abadi Khasragi. "New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs." Int. J. Adv. Comp. Techn. 2, no. 2 (2010): 117-121.
[36] Azari, Leila, and Ali Ghaffari. "Proposing a novel method based on network-coding for optimizing error recovery in wireless sensor networks." Indian Journal of Science and Technology 8, no. 9 (2015): 859-867.