Changqin Huang1, Ming Ma2,3, Xiao Liu4, Anfeng Liu5, Zhengbang Zuo6. 1. School of Information Technology in Education, South China Normal University, Guangzhou 510631, China. cqhuang@zju.edu.cn. 2. School of Information Science and Engineering, Central South University, Changsha 410083, China. minma@cs.stonybrook.edu. 3. Department of Computer Science, Stony Brook University, Stony Brook, NY 11794, USA. minma@cs.stonybrook.edu. 4. School of Information Science and Engineering, Central South University, Changsha 410083, China. xiaoliu@csu.edu.cn. 5. School of Information Science and Engineering, Central South University, Changsha 410083, China. afengliu@mail.csu.edu.cn. 6. The affiliated middle school, Hunan Normal University, Changsha 410012, China. zhengbangzuo@sina.com.
Abstract
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.
Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.
Entities:
Keywords:
network lifetime; storage; traceback time; unequal probability marking and migrating; wireless sensor networks
With the development of the Internet of Things (IoT) [1,2], sensing devices have smaller volumes, stronger sensing abilities, larger sensing ranges and longer sensing times [3,4,5,6,7,8,9,10,11,12,13,14,15]. There is an enormous growth in the real-time or semi-real-time data obtained by networks, resulting in the centralized computing paradigm in clouding computing undergoing tremendous traffic pressure [16,17]. In this case, the fog computing mode is proposed to address the deficit of centralized computing for huge amounts of data [1,5,7]. In the fog computing mode, all levels of devices are distributed in the network, which reduces computation delay and network load [18,19,20]. Nowadays, many studies have been conducted on fog computing, with security issues being an important problem [21,22,23,24,25,26,27,28,29]. Thus, wireless sensor networks (WSNs) can be regarded as a special kind of fog computing, as the sensor node can be regarded as the edge devices and the base statin can be regarded as the information collection center. WSNs are widely used in a variety of applications, such as environmental monitoring, healthcare systems, military applications etc. [30,31,32,33]. Wireless sensor networks consist of a large number of sensor nodes that communicate with each other through multi-hop wireless links [34,35]. Due to the natural features of wireless sensor networks, nodes are often unattended and therefore become prone to various attacks [21,22,23,24,25,26,27,28,29,30,31], which includes clone attacks [23], select forwarding attacks [3], privacy preserving attacks [22,24,31], on-off attacks [36], black hole attacks, false data injection attacks [3,37], and so on.The traceback approach is a promising method to hold many attacks back by monitoring the source of the malicious packet(s) or the attack path(s) [21,25,27,28,29,30]. The traceback approach can be divided into two categories: packet marking [21,30] and logging [29]. The main idea of packet marking is to record information (such as the node ID) of all visited nodes on packets [21,30]. The main idea of the logging is to store marked packets in relay nodes with a suitable data structure [29]. When being attacked, nodes can pinpoint the location of malicious nodes by inquiring upstream and broadcasting the information of malicious packet(s) in the traceback request to reconstruct the attack paths [21,30]. The packet marking method will be lengthened in the process of routing and increases the energy consumption of nodes near to the sink. The logging will lead to a phenomenon in which the logged marking information stored in nodes near to the sink are considerably greater than those in nodes far from the sink.To overcome the above defects, Liu et al. proposed a logging and migration traceback (LM) scheme to improve the performance of the traceback scheme. The LM scheme [21] migrates the logged marking information to areas far from the sink, which saves more storage for storing marking information and utilizing the energy in remote areas more efficiently. The LM scheme can improve the security performance of the traceback scheme without reducing the network lifetime [21,35].However, it is observed that much energy and storage is left in remote areas after the death of the whole network in the LM scheme. Therefore, the new strategy that can improve the utilization of storage and energy in remote areas is required to enhance the performance of the traceback approach.In this paper, a new unequal probability marking logging and migration (UPLM) scheme is proposed. Compared with previous studies, the main contributions in this paper are as follows:(1) Based on the logging and migration scheme, the UPLM scheme adopts an unequal probability marking approach. The new approach increases the marking probability of nodes far from the sink, thereby reducing the time needed to reconstruct attack paths when being attacked. Thus, this improves the security performance of the traceback scheme.(2) According to theoretical analysis, the optimized unequal marking probability can improve the performance of previous schemes without reducing the network lifetime. The estimated network lifetime and the required storage capacity are given in this paper.(3) The experimental simulation demonstrates that the UPLM scheme can improve the security performance, storage utilization, and network lifetime simultaneously. Compared with the LM traceback scheme, the energy utilization ratio of UPLM is above 95% and the amount of marking is increased by 2.1–5.2 times. Moreover, the network lifetime is longer than the LM scheme.The rest of this paper is organized as follows: The system model and problem statement are given in Section 2. The unequal probability marking logging and migration (UPLM) scheme for tree-based wireless sensor networks is described in Section 3. Performance analysis is presented in Section 4. The paper is concluded in Section 5.
2. System Model and Problem Statement
2.1. System Model
(1) The network model studied in this paper is a tree-based wireless sensor network [34,38,39]. Tree-based wireless sensor networks consist of several linear networks. The root of the networks is the location named the sink (see Figure 1). One round is defined as the process where every node in this network generates a packet and forwards it to the sink [21,34]. The linear network is a special case of network design topology, which can be regarded as a type of basic research in the network. The results in the linear network can be applied in many scenarios, especially in the physical inspection of sensors and long distance multi-hop transmission. For example, many networks can be considered as linear networks, such as oil pipelines, the boundary line of a country, a road line, and underground coalmine tunnels. In comparison, the network routing can be considered as linear topology. This paper mainly studies long infrastructures, such as oil and gas pipelines, which have great significance. The studies in this paper are similar to a previous study [14]. In this study, the main research object was a network with small network traffic, which did not take into account the collision or interference from hidden nodes. We are prepared to consider these issues in the next step of research.
Figure 1
Tree-based wireless sensor networks.
In real networks, the transmission of some pipelines is often not a single linear network. The nodes of the sensor near the base station can receive the information transmitted by a plurality of linear networks before transmitting the data to the base station. However, the tree network is such a network.(2) The packet format is shown in Figure 2 [21]. Data and marking information are stored in different fields. Due to the resource-constrained nature of WSNs, a packet can be marked by no more than nodes. The structure of the marking field is shown in Figure 2b. In this figure, f_log is a flag indicating whether the marking information has been logged into a node or not. 0 means a node does not store this marking information, while 1 indicates that a node does store this marking information. The f_mig is a flag which denotes whether the marking information has been migrated by this node or not. 0 means the node does not migrate the marking information, while 1 means the node does migrate the marking information. N_ID is the ID of the node and Hkey (P.data) denotes the hash code of the data field of the packet.
Figure 2
The structure of packets.
2.2. Energy Consumption Model and Related Definitions
A typical energy consumption model is adopted in this paper [21,34]. Equation (1) is the energy consumption model of sending data, while Equation (2) is the energy consumption model of receiving data.
where represents the energy loss in transmitting circuits. If the transmitting distance is less than a threshold of , the consumption of power amplification adopts the free space model. If the transmitting distance is more than a threshold of , it adopts the multipath attenuation model. and are the energy required to amplify power in the two models, respectively. denotes the number of bits of data. All parameters mentioned above refer to previous studies [21,34], which are shown in Table 1.
Table 1
Network parameters.
Parameter
Value
Threshold distance (d0) (m)
87
Sensing range rs(m)
15
Eelec(nJ/bit)
50
efs(pJ/bit/m2)
10
eamp(pJ/bit/m4)
0.0013
Initial energy (J)
0.5
2.3. Problem Statement
The traceback approach mainly studies how to choose a traceback protocol in order to minimize the cost needed to determine the malicious source node after the victims being attacked. The goal of this paper can be categorized into several aspects:(1) To prolong the network lifetime.The network lifetime can be defined as the duration between the birth of the network and the moment of the death of the first node [21,34]. Assume is the energy consumption of node and is the energy consumption of node . The goal of maximizing the network lifetime can be expressed by the following formula:(2) To minimize the requirement of storage capacity.The storage capacity of every node in a homogeneous sensor network is the same. Furthermore, the storage capacity is subject to the node that consumes the most storage. Assuming that the storage capacity of node is , the second goal of this paper is to minimize the requirement of storage capacity .(3) To maximize logged marking information.More logged marking information in the scheme will significantly reduce the time needed to reconstruct an attack path when being attacked and thereby will increase the security performance. The security problem is that when normal nodes send data packets to the sink, the sink can make full use of the received information to take measures to determine malicious nodes. However, there are some malicious nodes in the network, which can attack the normal nodes and then damage the data packet generated by normal nodes. When the damaged data packets are transmitted to the sink, the sink receives false information and takes false measures to deal with the event. Thus, false measures can negatively affect network events and can even be harmful to the entire network, resulting in the collapse of the entire network.In order to delete malicious nodes, the proposed scheme in this paper increases the probability of nodes far from the sink and decreases the probability of nodes near to the sink. This results in the marking information of the data packet in the proposed scheme being more than that of the previous scheme. Thus, the required time for determining malicious nodes is less. For example, when one data packet is transmitted from the source node to the sink, the data packet can be marked by the information with the nodes’ IDs far from the sink with a higher probability, resulting in a greater amount of stored information in the nodes. Although the probability of nodes near to the sink will have declined, the proposed scheme always adopts the same probability as the previous scheme. Thus, the total stored information in the nodes along the routing path in the proposed scheme is much more than that of the previous scheme. When one malicious node attacks one normal node and sends a false data packet, the stored information in the nodes is greater. When the sink receives data packets, the sink can use enough information stored in the nodes to build a routing path quickly. This allows for the malicious node to be determined in a short time so that the network can take measures to delete the malicious nodes to ensure network security. Assuming is the marking information stored in node , the goal of maximizing logged marking information is = .In general, the optimization goal of the UPLM scheme can be summarized into the following formulas:
3. UPLM Scheme
3.1. Research Motivation
Figure 3 illustrates the structure of tree-based WSNs. The equal marking probability approach in the LM scheme can lead to the following disadvantages, which become the primary motivation of the UPLM scheme:
Figure 3
An example of the unequal probability marking logging and migration (UPLM) scheme.
(1) Although all nodes are given equal marking probability, the actual probability that a certain node is being marked is different. Assume the assigned probability that a node is being marked is in the LM scheme. As illustrated in Figure 3, it is obvious that node is the convergence of two routing paths. Hence, all packets routing along these two paths will arrive at to be forwarded to the sink, while node will be marked by every packet at probability . The actual marking probability for node will be about two times higher than other nodes in these two paths. Similarly, node is about three times higher than other nodes. The probability of nodes marking data packets is different, which cause some nodes to not mark data packets when the sink receives data packets. Thus, the data packet must be transmitted several times in order for all the received nodes to contain all nodes’ IDs in the routing path. It can consume more energy and take a longer period of time.(2) The storage in remote areas is not utilized effectively. The effects of the scheme that migrates the marking information to remote areas in the LM scheme is not satisfied, and much storage is wasted in remote areas. In the LM scheme, the probability of nodes is all the same when one data packet is transmitted from the source node to the sink. Due to the same probability of nodes, the marking information will be stored in nodes near to the sink. It will cause nodes far from the sink to be unable to store marking information. The storage of nodes far from the sink is wasted.(3) There is still a large amount of energy remaining in remote areas after the death of the network. In the network, we can see that many packets are transmitted to the sink, which will cause nodes near to the sink to transmit too many packets. Thus, nodes near to the sink consume a considerable amount of energy. Nodes far from the sink consume less energy. When the energy of nodes near to the sink runs out, nodes far from the sink may have more energy.To conquer the disadvantages of the LM scheme, an unequal probability marking logging and migration (UPLM) scheme for tree-based WSNs is proposed in this paper. In the UPLM scheme, a higher marking probability is given to nodes in remote areas, while a lower marking probability is applied to nodes in nearby areas. The former designation is based on the fact that nodes in remote areas have more remaining energy and storage. They can be utilized to transmit more packets and store more marking information by being given a higher marking probability. The latter designation is ascribed to the fact that nodes in nearby areas are much more likely to be the convergence of several routing paths. Hence, the actual marking probability of nodes in nearby areas will be higher than the assigned marking probability. A lower assigned marking probability will balance the actual marking probability in WSNs, thereby reducing energy consumption and storage requirement in nearby areas significantly.Compared to the LM scheme, the probability of nodes are the same. Figure 3 shows the structure of UPLM. It can be seen that the probability of nodes far from the sink is higher, while the probability of nodes near to the sink is lower. Thus, we can see that in Figure 3, , , , , , and have a higher probability, with the probability of those nodes being 1 in the UPLM scheme. Thus, we can see that the data packet can be marked with the information with those nodes. However, when data packets are transmitted to nodes near to the sink, those nodes have lower probability, meaning that nodes near to the sink do not mark data packets when they receive them. Thus, the nodes , , and do not mark data packets.The effectiveness of the UPLM scheme can be demonstrated with the tree-based WSNs in Figure 3. There are three linear branches in Figure 3. The first branch is the path:
sink; the second one is the path:
; and the third one is the path:
. According to the unequal marking probability approach in the UPLM scheme, the nodes , , , , , , , , and are assigned with a marking probability of 1 (in other word, packets arriving at these nodes will be marked) and other nodes will be assigned with lower marking probability. Both the lengths of the marked fields of the packet travelling from to via and the packets travelling from to via are 3. Similarly, the length of the marked fields of the packet travelling from to is 3.If we set = 3, the logging will be processed when the length of the marked field reaches 3 and the marking information will be stored in nodes , , and . Compared with the LM scheme, more marking information will be logged. The same marking probability of the peripheral area in the UPLM scheme is adopted with the LM scheme. As a result, the UPLM scheme can increase the number of logged marking information and therefore enhances the network performance, such as extending the network lifetime.
3.2. The Pseudocode of the UPLM Scheme
Based on the arguments above, the UPLM scheme will be presented in this subsection. In the UPLM scheme, when receiving packets, different probabilities will be adopted in different nodes according to their distances from the nodes to the sink. Once the number of marking information stored in a node exceeds , a part of them will be migrated to the node whose distance to sink is hops larger than the original node. Algorithm 1 gives the pseudocode of the UPLM scheme.
3.3. The Probability Analysis of the UPLM Scheme
In this subsection, the computation method of marking probability in the UPLM scheme will be described. In the UPLM scheme, the factors that influence the marking probability are as follows:(1) The 1-hop nodes (n-hop nodes are defined as the nodes that can transmit packets to the sink in n-hop) will transmit far more packets than other nodes. Hence, the marking probability of them should not be larger. Similarly, the marking probability of 2-hop nodes should also not be large. Migration is needed to further reduce the pressure of hotspots. To achieve the goal of the UPLM scheme, nodes in remote areas should be assigned with a higher marking probability.(2) As the packets of every upstream node will be marked at a probability of by node , the total marking probability of node is still high, even if the assigned marking probability is low. Hence, the strategy is to increase the assigned marking probability in remote areas and decrease the marking probability in areas near to the sink in the UPLM scheme. According to the reasoning above, assume the distance of a node with -hop from the sink is . If the marking probability adopted by the LM scheme is , is the migrated hop of marking information and is the hop counts that marking information is logged in nodes. The marking probability of in the UPLM scheme is:The marking probability of nodes in the UPLM scheme is divided into three aspects. The first one includes nodes in the range of hops areas near to the sink. This section should reduce the probability to increase network lifetime. Thus, we know the probability of nodes in the LM scheme is , if there are hops in this area. The total marking probability in the LM scheme is . However, in this area, we used in the UPLM scheme to reduce marking information in this area, to increase the network lifetime. If nodes in the area near to the sink have hops, nodes are far from the sink when one packet passes by the nodes in the range of hops. Nodes mark the packets with a probability of 1, making it feasible. It does not affect the network lifetime. If nodes in the area near to the sink have hops, the total marking probability of nodes in the LM scheme is . There are hops in this area. In the UPLM scheme, the probability of nodes in this area is . The total marking information in this area in the UPLM scheme is equal to the total marking information in this area in the LM scheme; it does not affect the network lifetime and storage space.
3.4. The Improved UPLM Scheme
Although the UPLM scheme can balance storage utilization to some extent, there is still an unbalanced situation as a greater amount of storage is required by the nodes near the sink, which seriously increases the cost of the whole system. Therefore, an improved UPLM scheme is proposed to solve this issue. In the former UPLM scheme, the process of migration starts when the number of marked packets exceeds a given threshold, which causes a phenomenon in which nodes near the sink more frequently run the process. This strategy significantly increases the storage and energy consumption of those nodes. We propose an improved UPLM scheme, with a buffer area introduced into this scheme. A buffer area is a set of nodes. Once packets are forwarded into the buffer area, the marking information of these packets are entirely stored or migrated. We no longer control the process by setting a threshold. In this paper, nodes that have a distance to the sink within 5 hops are set to be the buffer area. The buffer area can assist and balance the process of storage and transference, which further improves the network performance [40,41,42,43].
4. Performance Analysis
4.1. Analysis of the Amount of Marking Information Processed by Nodes
In this subsection, the number of marking information processed by nodes, logged marking information, and migrated marking information of node in a round will be analyzed.In a single-branched network, the number of packets node :Single-branched network contains nodes and one sink. The packets received by node are from other nodes. Thus, node receives packets in a round. When node receives or generates a packet, it will forward it to the next node using shortest routing algorithm [21]. As a result, the number of packets that node forwards is .In a single-branched network, packets will be marked at a certain probability. Assume the probability that node marks packets is . In the process, when a packet generated by node 1 is forwarded to node , the total marking information is as follows:The logged marking information will be migrated backwards with -hop once the number of marking information exceeds . After completing forwarding packets generated by node 1 to node , the marking information received by node is .In the process where a packet generated by node 2 is forwarded to node , the total marking information is = . Similarly, the marking information from node 2 received by node is . The marking information from node 3 received by node is . In the process where the packet generated by node is forwarded to node , the marking information received by node is . The total marking information received by node is .As packets will travel through node when being forwarded to node , all the marking information in the packets will be migrated to nodes far away from the sink and only the data field will be sent to node . All marking information will be logged once the packets arrive at node . The marking probability of node is . The number of packets received by the node is . Hence, the number of marking information received by node is .Likewise, migration will be processed once the number of marking information reaches . For node , the number of marking information is . When = 0, all marking information that arrives at the node will be logged and migrated. Therefore, the number of marking information sent by node is . If , marking information will be forwarded.According to the reasoning above, the amount of marking information received by node is and hence, the amount of marking information sent by node is .All the marking information in the packet will be migrated to nodes with larger hops to the sink when the packet arrives at node . The packet will be marked at probability, before being forwarded to the next node . The number of marking information sent by node is .The packet will be marked at probability after being received by node , before being forwarded to other nodes. As the number of marking information received by node is and all data in these packets will be marked at probability , the total amount of marking information is . In addition, node will generate its own packets and forward them out at a probability of . Therefore, the amount of marking information forwarded bynode is .The analysis of the migration of node is described in this paragraph. As the marking information will be migrated backwards with -hop when the number of marking information reaches , the number of migrated marking information of node is the summation of the amount of migrated marking information of node , , …, . The total amount of migrated marking information of these nodes is , , …, . Therefore, the total amount of migrated marking information of node is .The analysis of storage is described in this paragraph. As node will store the marking information from node , migration will be conducted when the amount of marking information reaches after node receives the packet. The number of marking information migrated to node is and no marking information is migrated from other nodes. The following formula describes the idea:Hence, the marking information stored at node is entirely from node , which is the amount of migrated marking information of node . If , the storage requirement of node is .■In the UPLM scheme, the number of packets received and sent by nodeIn the UPLM scheme, the number of packets received by node is the number of nodes whose packets will be forwarded to the sink through node , namely . Hence, = . The number of packets sent by node is = ( is the number of packets sent by node because node will forward a packet to every path).There are paths going through node . For a certain path , the amount of marking information received by node is . The number of marking information received by node is the summation of all paths, namely . Similarly, the number of marking information sent by node is .As the amount of migrated marking information in path that passes through node is , and there are paths going through node , therefore, its amount of migrated marking information is . Similarly, as the amount of stored marking information in path that passes through node is and there are paths going through node , its amount of stored marking information is .The storage required is , the storage space of node in path is and there are paths going through node . Therefore, its storage space is . ■In the UPLM scheme, the initial energy consumption of node :In the UPLM scheme, according to Equations (1) and (2), the energy consumption of node is the sum of the energy consumption for receiving data and the energy consumption for sending data. Thus, the energy consumption of node is as follows:
4.2. Energy Consumption and Network Lifetime
According to Equations (1) and (2),According to Theorem 2, the number of packets received and sent by a node is and in the tree network, respectively. The amount of marking information received and sent by a node is and in the tree network, respectively. The storage required is in the tree network. The number of migrated marking information is in the tree network.Due to the initial energy consumption of node being , the network lifetime of a node is as follows:
5. Experiment Results
Omnet++ is adopted to evaluate the UPLM scheme performance [44]. In this simulation, if not specified, the experimental simulation scenario is as follows: 600 nodes are deployed in a network, each node produces a data packet in a data collection cycle and these packets are sent to the sink using multiple hops. The transmission radius of a node is = 50 m, = 3, = 2. The maximum storage space is 300 bits. However, the probability of nodes is 0.5 in the LM schemes.In this section, the performance of the UPLM scheme was analyzed by comparison with previous schemes. Two schemes are used in comparison. The first scheme is the baseline version probability traceback (BVP) scheme. This involves a data packet being marked with relayed nodes’ ID information in the routing path with some probability when one data packet is transmitted to the sink. When the marking information of one data packet reaches , the marking information will be stored in this node. Following this, the data packet will be transmitted to the next node. However, the marking information in the BVP scheme cannot be migrated to nodes far from the sink [29]. The second scheme is the LM scheme. This scheme is based on tree-based WSNs (as illustrated in Figure 4) and proposed by a previous study [21]. The LM scheme is also referred to as the equal probability scheme in this paper. In this scheme, nodes mark packets with equal probability and require the -hop migration, which will migrate the marking information to other nodes when the number of marking information reaches .
Figure 4
Tree-based wireless sensor network.
5.1. Analysis of the Amount of Marking Information Processed by Nodes
Figure 5 and Figure 6 illustrate the total amount of marking information received by nodes in all three schemes. It can be inferred from these figures that the amount of marking information received and sent by the nodes near to the sink is at the maximum. It is worthy to notice that the nodes in the UPLM scheme that have a longer distance to the sink receive a larger amount of marking information when compared with other schemes. This can be attributed to the following fact. On the one hand, lower marking probabilities were assigned to nodes closer to the sink, while higher marking probabilities were assigned to nodes farther away from the sink. On the other hand, the marking information stored in nodes will be migrated once its length exceeds . Therefore, the amount of marking information stored in remote areas will increase. In the UPLM scheme, the logged marking information were distributed more evenly in whole WSNs. In addition, the maximum storage required to store the marking information is no greater than other schemes.
Figure 5
The number of marking packets received and sent in different schemes.
Figure 6
The number of marking packets received and sent in different schemes.
Figure 7 illustrates the statistical distribution of receiving packets, sending packets, and migration marking information in different areas of the network. It can be observed from the figure that in the UPLM scheme, the amount of marking information that every node processed is balanced.
Figure 7
The total number of marking packets received and sent in different schemes.
If we sort the amount of marking information processed by each node in descending order, the largest one is called the maximum marking information (MMI). Figure 8 illustrates the maximum amount of marking information in the network in several traceback schemes. These facts can be inferred from Figure 8. The maximum amount of marking information in the BVP scheme is the greatest, while the UPLM scheme achieves the lowest value.
Figure 8
The maximum number of marking information under different transmission radii.
Figure 9 illustrates the total marking information received by nodes in the improved UPLM scheme and the UPLM scheme. It is obvious that the amount of marking information in both schemes are nearly equal. Due to the buffer area in the improved UPLM scheme, marking information will be migrated to nodes far away from the sink. The process of migration will utilize the remaining energy of these nodes effectively, and thereby optimizes the network lifetime and shows the effectiveness of the improved UPLM scheme.
Figure 9
The number of marking information received and sent by nodes.
Figure 10 illustrates the total marking information stored in the network under different transmission radii. It is obvious that the total amount of stored marking information of the UPLM scheme is 1.00943–9.22717 times higher than that of the equal marking probability approach, which indicates the UPLM scheme can utilize the remaining storage of non-hotspot areas more effectively to store more marking information. Thus, the convergence time needed to determine the malicious node is reduced when a certain node is being attacked.
Figure 10
The total marking information stored under different transmission radii.
Figure 11 and Figure 12 illustrate the comparison of the total marking information in the UPLM scheme and the equal marking probability approach under different network radii. It can be inferred that the total marking information in the UPLM scheme under different network radii is 3.4186–381.6 times more than that of the equal marking probability approach.
Figure 11
The stored total marking information under different network radii.
Figure 12
The ratio of total stored marking information in the UPLM scheme and the improved UPLM scheme.
5.2. Energy Consumption and Network Lifetime
Figure 13 illustrates the energy consumption in different areas and different approaches. As the energy consumption of data collection in different traceback approaches are equal, this part is only described once in the section. Figure 13 shows the maximum energy consumption in different schemes. The UPLM scheme and BVP scheme are approximately equal. Although the energy consumption is nearly equal in these three schemes, the energy consumption patterns in the BVP scheme and equal marking probability approach are significantly different in different areas, which implies an imbalance of energy consumption in these two schemes. A small amount of energy is consumed in remote areas and a large amount of energy is consumed in nearby areas. However, the energy consumption pattern of the UPLM scheme is balanced, which infers that it is capable of balancing energy consumption.
Figure 13
The total energy consumption of nodes in different schemes.
Figure 14 and Figure 15 illustrate the network lifetime under different transmission radii in different schemes. The network lifetime of the UPLM scheme, BVP scheme, and equal marking probability approach under different transmission radii are only slightly different from each other, which implies that the UPLM scheme will not affect the network lifetime.
Figure 14
The network lifetime under different transmission radii.
Figure 15
The ratio of network lifetime under different transmission radii.
Figure 16 illustrates the network lifetime under different network radii in different schemes. The network lifetime of the UPLM scheme, BVP scheme, and equal marking probability approach under different network radius do not vary greatly.
Figure 16
The network lifetime under different network radii and transmission radii.
Figure 17 and Figure 18 illustrate the network lifetime under different transmission radii in the UPLM scheme and the improved UPLM scheme. The network lifetime of the improved UPLM scheme is longer than the network lifetime of the UPLM scheme under the different transmission radii , which implies the better performance of the improved UPLM scheme.
Figure 17
The network lifetime under different transmission radii.
Figure 18
The ratio of the network lifetime under different transmission radii.
Figure 19 and Figure 20 illustrate the network lifetime under different network radii in the UPLM scheme and the improved UPLM scheme. The network lifetime of the improved UPLM scheme is longer than the network lifetime of the UPLM scheme under different network radii , which implies a better performance of the improved UPLM scheme.
Figure 19
The network lifetime under different network radii.
Figure 20
The ratio of the network lifetime under different network radii.
5.3. Analysis of Storage Capacity
In this section, the storage capacity required is analyzed. Figure 21 and Figure 22 show that the UPLM scheme is better than the BVP scheme in balancing the storage requirement in WSNs. Despite the truth that the maximum storage requirement of the BVP scheme is not higher than that of the UPLM scheme and the equal marking probability approach, the network lifetime of the BVP scheme is still low as all packets and its marking information are sent to the sink. By comparing the UPLM scheme with the equal marking probability approach, it is obvious to see that the maximum storage requirement of the UPLM scheme is not increased and the balance of the storage capacity of each node in the network is maintained.
Figure 21
The required storage in different areas.
Figure 22
The required storage under different transmission radii.
Figure 23 shows the storage requirement of each node under different network radii . The UPLM scheme will not bring extra storage consumption to the network, compared with the equal marking probability.
Figure 23
The required storage under different network radii.
Figure 24 and Figure 25 show the storage consumption and its related ratio of the whole network under different transmission radii . The storage utilization of the UPLM scheme is enhanced compared with the BVP scheme and the equal marking probability approach. The total available storage space is 0.043–0.418 times higher than that of the equal marking probability approach. Although the storage requirement of the UPLM scheme is no more than the equal marking probability approach, the migration strategy in the UPLM scheme will increase the storage consumption of nodes in remote areas. On the other hand, the marking probability of nodes in remote areas is higher in the UPLM scheme. Hence, the process of migration is frequent, which balances the storage capacity of nodes in remote areas.
Figure 24
The total utilized storage under different network radii.
Figure 25
The ratio of utilized storage under different network radii.
Figure 26 illustrates the storage requirement of each node under different transmission radii . Combining Figure 26 with Figure 27, the storage performance of the UPLM scheme and the improved UPLM scheme were analyzed. The storage requirement of the improved UPLM scheme is not greater than that of the UPLM scheme, with no extra storage consumption brought, which shows the superiority of the improved UPLM scheme.
Figure 26
The required storage under different transmission radii.
Figure 27
The ratio of required storage under different transmission radii in different schemes.
Figure 28 shows the storage requirement of each node under different network radii . Combining Figure 28 with Figure 29, no extra storage consumption was brought by the improved UPLM scheme.
Figure 28
The required storage under different network radii.
Figure 29
The ratio of required storage under different network radii in different schemes.
6. Conclusions
In this paper, the UPLM scheme was proposed based on the LM scheme. In tree-based WSNs, a large marking probability is assigned to nodes in nearby areas, while the small marking probability is assigned to nodes in remote areas in the LM scheme. This leads to a phenomenon in which a great amount of logged marking information is stored in nearby areas, while the storage of the nodes in remote areas is not utilized effectively. Moreover, the nodes in remote areas still possess too much remaining energy in the LM scheme. The UPLM scheme can significantly increase the total marking information of the network, reduce the required traceback time, and enhance the security performance by increasing the amount of marking information in nearby areas and reducing it in remote areas. The UPLM scheme also migrates the logged marking information stored in nodes with a higher marking probability to further improve the performance of the network. The effectiveness of the UPLM scheme is proven by experiments. The marking information of the UPLM scheme is 1.12–1.28 times more than that of the equal marking probability scheme; the storage capacity of the UPLM scheme is 1.15–1.26 times more than that of the equal marking probability scheme; and the energy utilization is increased by 17.89% in the UPLM scheme. In addition, the buffer area is introduced into an improved version of the UPLM scheme to further enhance the network performance.