Murdoch University Research Repository

Welcome to the Murdoch University Research Repository

The Murdoch University Research Repository is an open access digital collection of research
created by Murdoch University staff, researchers and postgraduate students.

Learn more

Trusted routing for resource-constrained Wireless Sensor Networks

Daabaj, K., Dixon, M.W., Koziniec, T. and Lee, K. (2010) Trusted routing for resource-constrained Wireless Sensor Networks. In: 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), 11 - 13 December, Hong Kong pp. 666-671.

PDF - Published Version
Download (246kB)
Link to Published Version:
*Subscription may be required


Designing a reliable and trusted routing scheme for resource-constrained Wireless Sensor Networks (WSNs) is a challenging task due to the lack of infrastructure and the highly dynamic network topology. To ensure trustworthy end-to-end communications between wirelessly connected sensor nodes, a considerable amount of bidirectional traffic must be relayed either between neighboring sensor nodes or between source sensor nodes and the base station. Such scenarios may lead to an added routing overhead, higher energy depletion rate and network life time minimization. The existing trusted routing protocols focus on trusted data dissemination while lacking the consideration of the restricted resources of sensor nodes and low-power radio link failures. To solve this problem, we propose a reliability-oriented routing scheme that takes into account the link reliability and residual energy of sensor nodes, thus allowing for better trustworthy data exchange, traffic balancing and network lifetime extension. Based on real testbed experiments and large-scale simulations, the attained results show the benefits stemming from the adoption of our scheme to be a reliable and energy efficient data delivery platform for potential trusted data exchange models. Our results show that the scheme is able to reduce energy consumption without affecting the connectivity of the network.

Item Type: Conference Paper
Murdoch Affiliation: School of Information Technology
Publisher: IEEE
Copyright: © 2010 by The Institute of Electrical and Electronics Engineers
Notes: Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.This paper appears in: Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), 2010, pp 666 - 671.
Item Control Page Item Control Page


Downloads per month over past year