Trusted routing for resource-constrained Wireless Sensor Networks
Daabaj, K., Dixon, M.W., Koziniec, T. and Lee, K. (2010) Trusted routing for resource-constrained Wireless Sensor Networks. In: 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), 11 - 13 December, Hong Kong pp. 666-671.
*Subscription may be required
Designing a reliable and trusted routing scheme for resource-constrained Wireless Sensor Networks (WSNs) is a challenging task due to the lack of infrastructure and the highly dynamic network topology. To ensure trustworthy end-to-end communications between wirelessly connected sensor nodes, a considerable amount of bidirectional traffic must be relayed either between neighboring sensor nodes or between source sensor nodes and the base station. Such scenarios may lead to an added routing overhead, higher energy depletion rate and network life time minimization. The existing trusted routing protocols focus on trusted data dissemination while lacking the consideration of the restricted resources of sensor nodes and low-power radio link failures. To solve this problem, we propose a reliability-oriented routing scheme that takes into account the link reliability and residual energy of sensor nodes, thus allowing for better trustworthy data exchange, traffic balancing and network lifetime extension. Based on real testbed experiments and large-scale simulations, the attained results show the benefits stemming from the adoption of our scheme to be a reliable and energy efficient data delivery platform for potential trusted data exchange models. Our results show that the scheme is able to reduce energy consumption without affecting the connectivity of the network.
|Publication Type:||Conference Paper|
|Murdoch Affiliation:||School of Information Technology|
|Copyright:||© 2010 by The Institute of Electrical and Electronics Engineers|
|Notes:||Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.This paper appears in: Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), 2010, pp 666 - 671.|
|Item Control Page|
Downloads per month over past year