| Literature DB >> 24204842 |
Guanghua Zhang1, Yuqing Zhang, Zhenguo Chen.
Abstract
To address the vulnerability of geographic routing to multiple security threats such as false routing information, selective forwarding and the Sybil attack in wireless sensor networks, this paper proposes a trust-based defending model against above-mentioned multiple attacks. Considering the characteristics of resource-constrained sensor nodes, trust values of neighboring nodes on the routing path can be calculated through the Dirichlet distribution function, which is based on data packets' acknowledgements in a certain period instead of energy-consuming monitoring. Trust is combined with the cost of geographic and energy aware routing for selecting the next hop of routing. At the same time, the initial trust is dynamically determined, service requests are restricted for malicious nodes in accordance with trust values, and the impact of node mobility is weakened by the trust evolution. The simulation results and analysis show that the proposed model under multiple attacks has advantages in packet delivery ratio and network lifetime over the existing models.Entities:
Mesh:
Year: 2013 PMID: 24204842 PMCID: PMC3804623 DOI: 10.1371/journal.pone.0077488
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Reliability evaluation and available services.
| Reliability evaluation | Available services |
|
| Clear the node out of the network. |
|
| Does not respond to a forwarding request. |
|
| Respond to a forwarding request. |
Simulation settings and parameters.
| Parameter | Value | Parameter | Value | Parameter | Value |
| Number of nodes | 80 |
| 0.5 | Communication rules | Random source to random destination |
| Network size | 100*100 square units | Initial energy of a sensor node | 500 units | ||
| Transmission range | 16units | Update interval of indirect trust information | 10 s | Energy consumption | 1 unit per sending |
| Network deployment | Random topology | Error probability caused by wireless channels and node malfunction | 0.05 | 0.6 unit per reception | |
| Average neighboring degree of a sensor node | 12 | Simulation duration | 1000 s | Ignored in instruction processing |
Figure 1Trust evolution of a sensor node.
Figure 2Packet delivery ration versus the percentage of malicious nodes.
Figure 3Network lifetime versus the percentage of malicious nodes.