Abstract
Communication in ad hoc network, such as wireless sensor networks (WSN), needs the use of decentralized routing algorithms requiring that several sensors behave in an expected way. This introduces vulnerabilities as the global issue of decentralized tasks depends on local behaviors and is compromised in case of failures or malicious intrusions. We propose here an adaptation of a routing protocol for WSN, the MWAC model, that introduces trust decisions to detect and avoid sensors that exhibit an incorrect behavior. The proposed trusted routing algorithms takes into account the low energy, communication and memory capacity of sensors to provide a realistic improvement of the routing robustness.
Article PDF
Similar content being viewed by others
References
Boukerche A., Xu L., El-Khatib K.: Trust-based security for wireless ad hoc and sensor networks. Comput. Commun. 30(11–12), 2413–2427 (2007)
Chen, H., Wu, H., Hu, J., Gao, C.: Agent-based trust management model for wireless sensor networks. In: International Conference on Multimedia and Ubiquitous Engineering, pp. 150–154. IEEE Computer Society (2008)
Dai H., Jia Z., Qin Z.: Trust evaluation and dynamic routing decision based on fuzzy theory for manets. J. Sofw. 4(10), 1091–1101 (2009)
Han, G., Choi, D., Lim, W.: A novel sensor node selection method based on trust for wireless sensor networks. In: International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2397–2400. IEEE Computer Society (2007)
Jamont, J.P., Occello, M.: A multiagent tool to simulate hybrid real/virtual embedded agent societies. In: Proceedings of the IEEE/WIC/ACM Conference on Intelligent Agent Technology, pp. 501–504. IEEE computer society (2009)
Jamont J.P., Occello M., Lagrèze A.: A multiagent approach to manage communication in wireless instrumentation systems. Measurement 43(4), 489–503 (2010)
Kifayat, K., Merabti, M., Shi, Q., Llewellyn-Jones, D.: An efficient algorithm to detect faulty reading in wireless sensor network using the concept of reputation. In: International Conference on Network and Service Security, pp. 1–5. IEEE Computer Society (2009)
Lewis, N., Foukia, N., Govan, D.G.: Using trust for key distribution and route selection in wireless sensor networks. In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubiquitous Networks and Services, pp. 787–790. IEEE (2008)
Liu, T., Zhou, M.Z.: Implementing a trust-aware routing protocol in wireless sensor nodes. In: IEEE International Conference on Progress in Informatics and Computing (PIC), pp. 556–559. IEEE Computer Society (2010)
Luo, J., Xu, L., Jamont, J.P., L., Z., Shi, Z.: Flood decision support system on agent grid: method and implementation. Enterp. Inf. Syst. 1(1), 49–68 (2007)
Pei, Q., Wang, L., Yin, H., Pang, L., Tang, H.: Layer key management scheme on wireless sensor networks. In: Proceedings of the Fifth International Conference on Information Assurance and Security, pp. 427–431. IEEE Computer Society (2009)
Peng, X., Wei, Z.: The trustworthiness based on hash chain in wireless sensor network. In: IEEE/IPIP International Conference on Embedded and Ubiquitous Computing, pp. 101–106. IEEE Computer Society (2008)
Pietro R.D., Michiardi P., Molva R.: Confidentiality and integrity for data aggregation in wsn using peer monitoring. Secur. Commun. Netw. 2(2), 181–194 (2009)
Sabater-Mir, J., Vercouter, L.: Multi-Agent Systems, chap. In: Trust and Reputation in Multiagent Systems, vol. 9, 2nd edn. 9. MIT Press, Cambridge (2012)
Zhou, Y., Huang, T., Wang, W.: A trust establishment scheme for cluster-based sensor networks. In: 5th International Conference Wireless Communications, Networking and Mobile Computing, pp. 1–4. IEEE (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vercouter, L., Jamont, JP. Lightweight trusted routing for wireless sensor networks. Prog Artif Intell 1, 193–202 (2012). https://doi.org/10.1007/s13748-012-0017-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13748-012-0017-7