A Trust-based Security Aware Congestion Control Algorithm for Wireless Sensor Networks

被引:1
|
作者
Pandey, Divya [1 ]
Kushwaha, Vandana [1 ]
机构
[1] Banaras Hindu Univ, Inst Sci, Varanasi 221005, Uttar Pradesh, India
关键词
Wireless sensor networks; trust model; congestion; attacks; beta distribution; transmission; ROUTING PROTOCOL; MANAGEMENT; AVOIDANCE; SYSTEMS;
D O I
10.32908/ahswn.v54.9743
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Congestion in the network may result from natural causes or selfish nodes acting as catalysts. It is possible for malicious sensor nodes in Wireless Sensor Networks (WSNs) to create congestion-like situations by sending redundant fake packets or throwing away data packets. As a result, relying solely on congestion control techniques is insufficient to assure fair delivery. It is, therefore, necessary to first prevent this adversity by separating these types of nodes from the network. Existing congestion control strategies in the literature make the erroneous assumption that all the nodes are authentic and act appropriately which is impractical. For this purpose, a Security-Aware Congestion Control (SACC) algorithm has been proposed that would not only take care of the natural mode of congestion occurrence but would also consider the case in which hostile nodes intentionally try to block packets from reaching their destination. A collaborative effort has been undertaken in this study to alleviate congestion and security challenges utilizing the lightweight energy-efficient trust-based model method. The residual energy of nodes, buffer occupancy, and packet delivery ratio of nodes these network parameters have been taken for setting up trust metrics as they play a vital role in identifying malicious behaviour as well as preventing congestion occurrence. We have also explained the strategic way of how to give weights to these metrics so as to get more accurate trust values. The proposed approach beats existing related solutions in terms of energy efficiency, congestion control, and security due to its strong capacity to withstand numerous internal attacks.
引用
收藏
页码:249 / 290
页数:42
相关论文
共 50 条
  • [1] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [2] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [3] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [4] Trust-based QoS Routing Algorithm for Wireless Sensor Networks
    Wang, Junwei
    Wang, Haifeng
    26TH CHINESE CONTROL AND DECISION CONFERENCE (2014 CCDC), 2014, : 2492 - 2495
  • [5] A trust-based probabilistic coverage algorithm for wireless sensor networks
    Taghikhaki, Zahra
    Meratnia, Nirvana
    Havinga, Paul J. M.
    4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 455 - 464
  • [6] A Trust Based Fuzzy Algorithm for Congestion Control in Wireless Multimedia Sensor Networks (TFCC)
    Chakraborty, Arpita
    Ganguly, Srinjoy
    Naskar, Mrinal Kanti
    Karmakar, Anupam
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2013,
  • [7] An Algorithm of Trust-based Secure Data Aggregation for Wireless Sensor Networks
    Ye Z.-W.
    Wen T.
    Liu Z.-Y.
    Fu C.-G.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (06): : 789 - 794
  • [8] An algorithm for congestion control and routing based context-aware in wireless sensor networks
    Oh, Hyun Woo
    Han, In Tark
    Park, Kwang Roh
    Kim, Sang Ha
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 377 - +
  • [9] Trust-based framework for security enhancement of wireless sensor
    Oleshchuk, Vladimir
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 623 - 627
  • [10] CATM : Congestion aware trust model for wireless sensor networks
    Yadava, Rajit Ram
    Ranvijay
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05): : 1475 - 1485