ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks
Top Cited Papers
Open Access
- 19 May 2016
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 11 (9), 2013-2027
- https://doi.org/10.1109/tifs.2016.2570740
Abstract
Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To conquer that challenge, an active detection-based security and trust routing scheme named ActiveTrust is proposed for WSNs. The most important innovation of ActiveTrust is that it avoids black holes through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security. More importantly, the generation and the distribution of detection routes are given in the ActiveTrust scheme, which can fully use the energy in non-hotspots to create as many detection routes as needed to achieve the desired security and energy efficiency. Both comprehensive theoretical analysis and experimental results indicate that the performance of the ActiveTrust scheme is better than that of the previous studies. ActiveTrust can significantly improve the data route success probability and ability against black hole attacks and can optimize network lifetime.Keywords
Funding Information
- National Natural Science Foundation of China (61379110, 61073104, 61572528, 61272494, 61572526)
- National Basic Research Program of China (973 Program) (2014CB046305)
- JSPS KAKENHI (26730056, 16K00117, 15K15976)
- JSPS A3 Foresight Program
This publication has 31 references indexed in Scilit:
- Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNsIEEE Transactions on Information Forensics and Security, 2015
- Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor NetworksIEEE Transactions on Information Forensics and Security, 2014
- Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc NetworksCommunications in Computer and Information Science, 2014
- ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor NetworksIEEE Transactions on Information Technology in Biomedicine, 2012
- Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsIEEE Transactions on Dependable and Secure Computing, 2011
- SensorTrust: A resilient trust model for wireless sensing systemsPervasive and Mobile Computing, 2011
- TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networksJournal of Network and Computer Applications, 2011
- Load-balancing in MANET shortest-path routing protocolsAd Hoc Networks, 2009
- Impact of Denial of Service Attacks on Ad Hoc NetworksIEEE/ACM Transactions on Networking, 2008
- Adaptive security design with malicious node detection in cluster-based sensor networksComputer Communications, 2007