| Literature DB >> 31888095 |
Qiong Shi1,2,3, Li Qin1,2, Yinghua Ding3, Boli Xie4, Jiajie Zheng3, Lipeng Song3.
Abstract
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, associated information such as its trust value and status is considered in the protocol. The trust value is defined as the attack probability of the node according to previous packet-forwarding behaviors, and the status is a hybrid metric that combines the residual energy and distance to the sink node. Therefore, the route generated by the protocol is secure against malicious attacks and globally optimal according to the associated information. We used an improved variant of the Dijkstra algorithm to generate the secure route for WSNs in the presence of malicious nodes. Compared with the Reputation-Based Mechanism to Stimulate Cooperation (RBMSC) model in the same simulation environment, the proposed model can maintain a higher delivery ratio, which verifies the effectiveness of the proposed model on the basis of global optimization. Furthermore, compared with the traditional Dijkstra algorithm, the packet loss ratio in the improved Dijkstra algorithm is lower because it can more effectively avoid malicious nodes, thus verifying the effectiveness of the improved algorithm.Entities:
Keywords: attack probability; global optimization; information-aware; secure routing; trust calculation
Year: 2019 PMID: 31888095 PMCID: PMC6982967 DOI: 10.3390/s20010165
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Calculation process of the attack probability.
Figure 2Direct or indirect attack probability.
Figure 3Route in wireless sensor networks (WSNs) based on the serial–parallel system.
Comparison of the improved Dijkstra algorithm and the traditional Dijkstra algorithm.
| Algorithm | Weight Factor | Weight Calculation (Node) | Weight Calculation (Path) |
|---|---|---|---|
| Traditional Dijkstra | Sum of all node weights in a path | ||
| Improved Dijkstra | Equation ( |
Figure 4Radio energy dissipation model.
Parameters in the model.
| Parameter | Description |
|---|---|
|
| Initial energy |
|
| Simulation area |
|
| Number of nodes |
|
| Location of sink node |
|
| Energy consumption of electronic devices for accepting and transmitting 1-bit data |
|
| Free space factor |
|
| Transmission radius |
|
| Adjustment factor |
|
| Minimum forwarding threshold |
The setting of parameters.
| Parameter | Value |
|---|---|
|
| 1 J |
|
| |
|
| 100 |
|
|
|
|
|
|
|
| 50 nJ/bit |
|
| 10 pJ/bit/m |
|
| 50 m |
|
| 1000 |
|
|
Figure 5Packet loss ratios under different proportions of malicious nodes ( = 20%, 40%, and 60%) in information-aware secure routing (IASR).
Figure 6The energy consumption of the 18 nodes near the sink node when the proportion of malicious nodes is 20%, 40%, and 60%.
Figure 7Comparison of packet delivery ratios in two models for different numbers of malicious nodes.
Figure 8Comparison between the improved algorithm and the traditional algorithm.
Figure 9The time-varying number of key nodes with residual energy less than in the two algorithms.
Figure 10Comparison of energy consumption of malicious nodes a and b between the improved algorithm and the traditional algorithm.
Figure 11Trend of the packet loss ratio in two algorithms during the dynamic change in the number of malicious nodes.
Figure 12Packet loss ratios in ten independent topologies.