Conference paper
Trusted routing for resource-constrained Wireless Sensor Networks
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.666-671
IEEE
6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010) (Hong Kong, 11/12/2010–13/12/2010)
2010
Abstract
Designing a reliable and trusted routing scheme for resource-constrained Wireless Sensor Networks (WSNs) is a challenging task due to the lack of infrastructure and the highly dynamic network topology. To ensure trustworthy end-to-end communications between wirelessly connected sensor nodes, a considerable amount of bidirectional traffic must be relayed either between neighboring sensor nodes or between source sensor nodes and the base station. Such scenarios may lead to an added routing overhead, higher energy depletion rate and network life time minimization. The existing trusted routing protocols focus on trusted data dissemination while lacking the consideration of the restricted resources of sensor nodes and low-power radio link failures. To solve this problem, we propose a reliability-oriented routing scheme that takes into account the link reliability and residual energy of sensor nodes, thus allowing for better trustworthy data exchange, traffic balancing and network lifetime extension. Based on real testbed experiments and large-scale simulations, the attained results show the benefits stemming from the adoption of our scheme to be a reliable and energy efficient data delivery platform for potential trusted data exchange models. Our results show that the scheme is able to reduce energy consumption without affecting the connectivity of the network.
Details
- Title
- Trusted routing for resource-constrained Wireless Sensor Networks
- Authors/Creators
- K. Daabaj (Author/Creator) - Murdoch UniversityM.W. Dixon (Author/Creator) - Murdoch UniversityT. Koziniec (Author/Creator) - Murdoch UniversityK. Lee (Author/Creator) - Murdoch University
- Publication Details
- 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.666-671
- Conference
- 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010) (Hong Kong, 11/12/2010–13/12/2010)
- Publisher
- IEEE
- Identifiers
- 991005540904707891
- Copyright
- © 2010 by The Institute of Electrical and Electronics Engineers
- Murdoch Affiliation
- School of Information Technology
- Language
- English
- Resource Type
- Conference paper
- Note
- Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.This paper appears in: Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), 2010, pp 666 - 671.
Metrics
276 File views/ downloads
48 Record Views