Reputation-based Energy Efficient Opportunistic Routing for Wireless Sensor Network
Keywords:
End-to-end Delay, Energy Efficiency, NextHop Selection, Reputation, Trust, Opportunistic Routing, Throughput,Abstract
Selection of the best next-hop in Opportunistic Routing (OR) is a crucial task in wireless sensor networks (WSN). To increase the throughput, network lifetime and reliability of WSN, there is a need of an optimal OR protocol. To improve the reliability of network, reputation management is important. Reputation management gives a chance to nodes to transmit data on secure and reliable routes. This paper gives a new reputation based OR metric and protocol, in which the next hop selection is based on its reputation. The proposed OR metric considers the reputation level as a primary selection parameter for next-hop. New OR metric relies on energy efficiency and packet delivery ratio of next-hop. Proposed OR protocol selects all middle position neighbors as next-hop and potential forwarder will be decided on the basis of new OR metric. Energy consumption is considered to be dynamic. The protocol has been compared with Middle Position Dynamic Energy Opportunistic Routing (MDOR), and Trust and Location Aware Routing Protocol (TLAR). Simulation results depict that the proposed OR protocol optimized the throughput and network lifetime.References
Akyildiz, I.F., and Kasimoglu, I.H.: ‘Wireless sensor and actor networks: research challenges’, Ad hoc networks, 2004, 2 (4), pp. 351-367.
Lyu, C., Gu, D., Zhang, X., Sun, S., Zhang, Y., and Pande, A.: ‘SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs’, Computer Communications, 2015, 59, pp. 37-51.
Shaikh, R.A., Jameel, H., d'Auriol, B.J., Lee, H., Lee, S., and Song, Y.-J.: ‘Group-based trust management scheme for clustered wireless sensor networks’, IEEE transactions on parallel and distributed systems, 2009, 20 (11), pp. 1698-1712.
Yao, L., Man, Y., Huang, Z., Deng, J., and Wang, X.: ‘Secure Routing based on Social Similarity in Opportunistic Networks’, IEEE Transactions on Wireless Communications, 2016, 15 (1), pp. 594-605.
Yao, Z., Kim, D., and Doh, Y.: ‘PLUS: Parameterized and localized trust management scheme for sensor networks security’, in proceedings of International Conference on Mobile Ad Hoc and Sensor Systems (IEEE), Vancover, BC, 2006, pp. 437-446.
Zhou, Y., Tan, X., He, X., Qin, G., and Xi, H.: ‘Secure Opportunistic Routing for Wireless Multi-Hop Networks Using LPG and Digital Signature’, Information Assurance and Security Letters 1, 2010, pp. 18-23.
Kumar, N., and Singh, Y.: ‘Routing Protocols in Wireless Sensor Networks’, in Niranjan, K.R., and Ashok Kumar, T. (Eds.): ‘Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures’ (IGI Global, 2016), pp. 86-128.
Biswas, S., and Morris, R.: ‘ExOR: opportunistic multi-hop routing for wireless networks’, in Proceedings of 35th SIGCOMM Computer Communication Review (ACM, 2005), Philadelphia, Pennsylvania, USA, pp. 133-144.
Zhong, Z., Wang, J., Nelakuditi, S., and Lu, G.-H.: ‘On selection of candidates for opportunistic anypath forwarding’, ACM SIGMOBILE Mobile Computing and Communications Review, 2006, 10 (4), pp. 1- 2.
Hsu, C.-J., Liu, H.-I., and Seah, W.K.G.: ‘Opportunistic routing: A review and the challenges ahead’, Computer Networks, 2011, 55 (15), pp. 3592-3603.
Liu, K., Abu-Ghazaleh, N., and Kang, K.-D.: ‘Location verification and trust management for resilient geographic routing’, Journal of Parallel and Distributed Computing, 2007, 67 (2), pp. 215-228.
Dubois-Ferriare, H., Grossglauser, M., and Vetterli, M.: ‘Valuable detours: Least-cost anypath routing’, IEEE/ACM Transactions on Networking, 2011, 19 (2), pp. 333-346.
Rozner, E., Seshadri, J., Mehta, Y.A., and Qiu, L.: ‘SOAR: Simple opportunistic adaptive routing protocol for wireless mesh networks’, IEEE Transactions on Mobile Computing, 2009, 8, (12), pp. 1622- 1635
Ganeriwal, S., Balzano, L.K., and Srivastava, M.B.: ‘Reputationbased framework for high integrity sensor networks’, ACM Transactions on Sensor Networks (TOSN), 2008, 4 (3), pp. 15.
Michiardi, P., and Molva, R.: ‘Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks’: ‘Advanced communications and multimedia security’ (Springer, 2002), pp. 107-121.
He, Q., Wu, D., and Khosla, P.: ‘SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks’, in Proceedings of Wireless communications and networking conference (IEEE, 2004), Atlanta, GA, USA, pp. 825-830.
Salehi, M., Boukerche, A., Darehshoorzadeh, A., and Mammeri, A.: ‘Towards a novel trust-based opportunistic routing protocol for wireless networks’, Wireless Networks, 2016, 22 (3), pp. 927-943
Deng, H., Yang, Y., Jin, G., Xu, R., and Shi, W.: ‘Building a trustaware dynamic routing solution for wireless sensor networks’, in Proceedings of Globecom Workshops (IEEE), Miami, Florida, USA, 2010, pp. 153-157.
Maarouf, I., Baroudi, U., and Naseer, A.R.: ‘Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks’, IET communications, 2009, 3 (5), pp. 846-858.
Gong, P., Chen, T.M., and Xu, Q.: ‘ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks’, Journal of Sensors, 2015.
Adnan, A., Kamalrulnizam Abu, B., Muhammad Ibrahim, C., and Abdul Waheed, K.: ‘A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network’, Mob. Netw. Appl., 2016, 21 (2), pp. 272-285.
Vamsi, P.R., and Kant, K.: ‘Trust and Location-Aware Routing Protocol for Wireless Sensor Networks’, IETE Journal of Research, 2016, 63, pp. 1-11.
Kumar, N., and Singh, Y.: ‘An Energy Efficient Opportunistic Routing Metric for Wireless Sensor Networks’, Indian Journal of Science and Technology, 2016, 9 (32), pp. 1-7.
Sharma, M., & Singh, Y. Middle Position Dynamic Energy Opportunistic Routing for Wireless Sensor Networks. In IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, pp. 948-953.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.