Trust-based backpressure routing in wireless sensor networks
نویسندگان
چکیده
In this paper, we apply a Vector AutoRegression (VAR) based trust model over the Backpressure Collection Protocol (BCP), a collection mechanism based on dynamic backpressure routing in Wireless Sensor Networks (WSN) and show that the VAR trust model is suited for resource constraint networks. The backpressure scheduling is known for being throughput-optimal. However, it is usually assumed that nodes cooperate with each other to forward the network traffic. In the presence of malicious nodes, the throughput optimality no longer holds and this affects the network performance in collection tree applications of sensor networks. We apply an autoregression based scheme to embed trust into the link weights, making it more likely for trusted links to be scheduled. The novelty in our approach is that the notion of trust can be easily incorporated in a new state of the art distributed and dynamic routing Backpressure Collection Protocol in sensor networks. We have evaluated our work in a real sensor network testbed and shown that by carefully setting the trust parameters, substantial benefit in terms of throughput can be obtained with minimal overheads. Our performance analysis of VAR in comparison with other existing trust models demonstrate that even when 50% of network nodes are malicious, VAR trust offers approximately 73% throughput and ensures reliable routing, with a small trade-off in the end-to-end packet delay and energy consumptions.
منابع مشابه
Improving Energy Consumption by Using Cluster Based Routing Algorithm in Wireless Sensor Networks
Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distributetraffic, as well as considerate fault tolerance. In this paper, a new clustering based multi path routingprotocol namely ECRR (Energy efficient Cluster based Routing algorithm for improving Reliability) isproposed, which is a new routing algorithm and guarantees the achievement to required QoS ...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA Priority-based Routing Algorithm for Underwater Wireless Sensor Networks (UWSNs)
Advances in low-power electronics design and wireless communication have enabled the development of low cost, low power micro-sensor nodes. These sensor nodes are capable of sensing, processing and forwarding which have many applications such as underwater networks. In underwater wireless sensor networks (UWSNs) applications, sensors which are placed in underwater environments and predicted ena...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملA Novel Comprehensive Taxonomy of Intelligent-Based Routing Protocols in Wireless Sensor Networks
Routing in ad-hoc networks, specifically intelligent-based ones, is a highly interested research topic in recent years. Most of them are simulation-based study. Large percentages have not even mentioned some of the fundamental parameters. This strictly reduces their validity and reliability. On the other hand, there is not a comprehensive framework to classify routing algorithms in wireless sen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJSNet
دوره 17 شماره
صفحات -
تاریخ انتشار 2015