Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 Mar 1;18(3):751. doi: 10.3390/s18030751

A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks

Jiawei Tang 1, Anfeng Liu 1, Jian Zhang 1,*, Neal N Xiong 2, Zhiwen Zeng 1, Tian Wang 3
PMCID: PMC5876602  PMID: 29494561

Abstract

The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.

Keywords: wireless energy harvesting networks, security, disjoint routing, marking, network lifetime

1. Introduction

Ubiquitous sensor-based devices (e.g., sensor nodes, wearable sensing devices, and smartphones) [1,2,3,4,5] have been playing a vital role in the evolution of the Internet of Things (IoT) [2,4,5,6,7,8,9], which bridges the gap between digital and physical spaces [6,7,8]. However, the energy issue of sensor terminals poses significant challenges to the widespread use of IoT, in which the sensor devices generally have small volume and battery with limited capacity [10,11,12,13,14,15]. Therefore, the sustainable issue of IoT has attracted considerable attention from both academia and industry [16,17,18,19]. Wireless energy harvesting and transfer technology was recently proposed as an effective mean to address this issue. Energy-Harvesting Wireless Sensor Networks (EHWSNs) refer to networks whose nodes can collect and complement energy by relying on the ambient environment (such as solar energy, wind energy, thermal energy and vibration energy) [20,21]. EHWSNs are able to charge themselves via renewable resources; thus, they can be applied to unattended but important and complex environments for long-term (even permanent) monitoring. These networks are called green networks because they use renewable energy and cause less interference or damage to the ambient environment [21,22,23]. For the above reasons, EHWSNs have widely gained the attention of researchers and are especially suitable for applications in the national economy, national defense and military, battlefield protection, protection of wide and rare animals and medical and health monitoring [24,25,26]. Security has been always a critical point in the development and application of sensor networks [6,10,27,28,29,30,31]. For EHWSNs, there are three issues that be taken into consideration in designing the secure routing scheme:

  • (1)

    The core of IoT lies in collecting data and enabling data communication between the required nodes to form a coordinated communication network. Therefore, a blocking communication attack that blocks the communication between nodes is a harmful and effective attack behavior [30,31,32]. Existing research shows that over 30 types of blocking communication attack behaviors or strategies have been found for wireless sensor networks. These attack behaviors primarily include black attack [30,31], clone attack [32], Dos attack [30,31], selective forwarding attack [33,34,35] and false data injection attack [34]. These attacks can not only block network communication but also consume the energy of limited sensor nodes, causing the earlier death of the network [36].

  • (2)

    Although many routing schemes can resist the security attacks, most defenses are conducted against one type of attack behavior. In other words, a specific scheme only works for one specific type of attack but does not work or works with limited effect for other types [27]. The attack methods and technologies are constantly advancing, so the resistance method against a specific type of attack behavior usually performs less satisfactorily in practice.

  • (3)
    The secure routing scheme tends to consider other performances of the network. For example, energy consumption is an important performance metric for sensor-based IoT [37]. Due to the limited battery capacity of sensor-based devices, how to minimize the energy consumption of a network is an important issue in the context of ensuring network security [38,39,40,41,42]. Although the pressure for reducing energy consumption is relieved in the case of energy-harvesting wireless networks, how to reduce energy consumption remains an important issue to be researched because, although energy-harvesting networks can harvest energy from environment, doing so requires extra energy collection hardware. Networks are expected to minimize the cost of the energy collection hardware because of the requirement to reduce the manufacturing cost [20,23,25]. Therefore, overall, even sensor devices with energy harvesting cannot obtain unlimited energy compensation, and the effective utilization of energy remains a severe challenge. Thus, improving network performance is necessary [43,44]. In addition, an energy-harvesting network has another important feature, i.e., when sufficient external energy compensation can be provided, the complemented energy will be fully utilized to improve the network performance, but it is not a good scheme to merely save energy. Thus, in EHWSNs, the power management was usually modeled as energy neutral operation [23,24], which maximizes the utilization of the energy absorbed from the ambient environment and achieves the balance between the energy consumption of the system and the absorbed energy. The features that determine the design and schemes of their secure routing are obviously different from the conventional schemes, which also bring great challenges. For this reason, how to achieve efficient and safe routing in EHWSNs is rarely researched. After a deep analysis on EHWSNs, a trust-based secure routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in energy-harvesting wireless sensor networks (EHWSN). The main contributions of this paper are as follows:
    • (1)
      A data and notification disjoint routing approach is proposed for improving the security of networks. In this approach, the source node sends data and notification to the sink through disjoint paths separately; in such a mechanism, the data and notification can be verified independently to ensure their security.
    • (2)
      A traceback approach is integrated into the TBSR scheme, which can trace malicious nodes more effectively than ordinary wireless sensor networks. In the TBSR scheme, the data and notification adopt a probability-based marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. In a traceback scheme, the higher the probability of marking is, the safer the system will be, but more energy will be consumed and the network lifetime will be affected. In the TBSR scheme, the probability of marking is determined based on the level of battery remaining. When the level of battery remaining is high, the probability of marking is higher, which can improve the network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. In this paper, we discuss the two cases “the battery on low level” and “the battery on high level” separately, which can enhance the overall network security. If we not, the probability of marking and logging will not be changed. However, in order to maintain the level of battery remaining above 0 or a lower limit at any time, the network will adopt the probability of marking and logging in accordance with the case of “the battery on low level,” so the probability of marking is lower. The sink will receive less notification and find malicious nodes slower, so the network security will be lower.
    • (3)
      Compared with past schemes, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the routing success rate by approximately 16.30%.

The rest of this paper is organized as follows: in Section 2, related works are reviewed. The system model is described in Section 3. In Section 4, a novel TBSR scheme is presented. Performance analyses and experimental results of TBSR are provided in Section 5. We conclude in Section 6.

2. Related Work

Much research has been conducted on the secure routing schemes of wireless sensor networks. This section is divided into the following 3 parts to introduce the works related to this paper: (1) schemes and approaches related to secure routing [30,31,32,33,34,35,45,46]; (2) routing schemes related to traceback [47,48,49]; (3) energy consumption features of Energy-Harvesting Wireless Sensor Networks (EHWSNs) and management-related schemes [20,21,22,23,24,25,26].

  • (1)
    Strategies and approaches related to secure routing. Secure routing means adopting proper strategies or approaches to successfully transmit the data produced by source nodes to the sink or an ability to resist a security attack [30,31,32,33,34,35]. Its purpose is to ensure the successful transmission of data to the sink with a high probability even in the event of an attack. This paper classifies secure routing mechanisms into the following types:
    • (a)
      The first type of secure routing scheme cannot detect whether an attacker exists in the network or whether the transmission is attacked. These schemes largely adopt the strategy of multiple redundant routings, i.e., one data packet is transmitted to the sink through 2 or more routing paths. In this case, even when an attack behavior exists in the network, the probability of the multiple routing paths being attacked simultaneously is much lower than that of only one routing path being attacked. Thus, the probability of successfully sending the data to the sink can be improved effectively. The advantages of these schemes are that they have wide applicability and can be used in all types of applications, have fewer network requirements and present favorable effects in resisting various attack behaviors. However, the disadvantages are that each data packet is sent through multiple redundant routing paths; thus, energy consumption will be high, which affects network lifetime. Moreover, no detection mechanism is adopted to determine whether the routing is attacked, so the strategy is inflexible and cannot bypass the routing path even after it has been attacked. For relevant research, please see the multi-path routing approach proposed by Karlof et al. [50] and the SEDR scheme proposed by Reference [31].
    • (b)
      The second type of routing schemes introduces the following improvements based on the first type: multiple routing paths will consume additional energy and therefore significantly affect network lifetime. Thus, sequential routing schemes try one routing path first and, if the routing fails, transmit the data through another, different routing path, which improves the probability of the data successfully reaching the sink. For example, the multi-dataflow topology (MDT) scheme proposed by Hung-Min Sun et al. [51] is representative of this type of scheme. In the MDT scheme, the network is divided into two disjoint topology structures, and a node can send the data to the sink through any topology structure. Therefore, if the source node fails to send the data through one topology structure, it can resend the data through the other topology structure unless the attacker simultaneously attacks 2 topology structures, which will cause routing failure. Obviously, there is a much lower probability of the attackers simultaneously attacking two topology structures, so the MDT scheme can effectively improve routing security. Compared with past schemes, such routing schemes have the advantage of low cost, i.e., they do not require sending data simultaneously through m routing paths, which saves energy and lifts efficiency. The schemes’ disadvantages include that they cannot identify and locate malicious nodes or adapt themselves to improve the success rate of routing and are weak in resisting intelligent attackers. Their cost and energy consumption are also significant. For example, the MDT scheme requires constructing multiple topology networks simultaneously, which increases the requirements for the network and the costs of construction.
    • (c)
      The purpose of the third type of routing scheme is adopting a proper mechanism to detect whether the routing is successful and identifying and locating the position of malicious nodes, thereby increasing the success rate of routing as time passes. For example, a checkpoint-based multi-hop acknowledgement (CHEMAS) scheme is proposed by Xiao, B et al. [33] for identifying suspect nodes. In the CHEMAS scheme, some nodes on the routing path from the source node to the sink are selected as check nodes. When each check node receives the data, it will return the ACK information in the data-source direction. If the data packets are attacked, the check node will fail to receive the pre-defined number of ACKs and recognize that malicious nodes exist on the routing path. Finally, the position of malicious nodes can be largely determined by the different number of ACKs received by different check nodes. Obviously, the scheme has suppressive effects on malicious nodes and can guide data transmission to avoid the position of malicious nodes during the next routing. The administrators can even remove the malicious nodes physically through powerful strategies. However, the CHEMAS scheme also has disadvantages. In the CHEMAS scheme, the ACK information is returned along the original routing path of data instead of via an independent path, so it will also be attached by the attacker. Another commonly used scheme is a trust-based strategy. ActiveTrust [30] is a good secure routing scheme proposed for wireless sensor networks and is based on active trust. In the ActiveTrust scheme, the remaining energy in the remote sink is fully utilized to initiate a detective routing. A detective routing is not a real data routing, but it is the same as the real routing. Therefore, malicious nodes will attack the detective routing as it does a data routing; thus, the suspected hostile nodes will be exposed. The trust for suspected and normal nodes will be lowered and lifted respectively. As this process proceeds, the trust for malicious nodes will become lower and that for normal nodes will become higher to allow the routing to effectively improve the success rate of routing by selecting nodes with high trust. The scheme performs well in defending intelligent malicious nodes and resisting various attacks and has high energy efficiency and recognized significance.
  • (2)
    Relevant research on Traceback. The Traceback approach is also an effective approach to improve network security [27,47,48,49]. The important difference between Traceback and the conventional approaches is that it saves the path information of nodes during the routing process so that it can reconstruct the path of the attacker when the network is attacked to identify the malicious nodes, then notify the system and remove these malicious nodes physically, ensuring network security. Multiple traceback approaches have been proposed, and most are based on the following 2 traceback schemes: (a) Marking-based traceback scheme (also known as marking scheme) [47], and (b) Logging-based traceback scheme (also known as logging scheme) [48].
    • (a)
      Marking-based traceback scheme. Actually, marking is the main strategy of traceback [47]. It adopts a method in which all nodes on the routing path attach their node ID and other information to the data packet during the routing process (the information attached to the data packet is called notification). When the network is attacked, the path from the source node to the sink can be reconstructed by extracting the notification. Combining the data from multiple source nodes can determine the scope of malicious nodes with a very high probability and achieve the purpose of tracing the malicious nodes.

The advantage of a marking-based traceback scheme is that it has lower network requirements and can be used for both wired and wireless networks. However, its most apparent disadvantage is that the energy consumption of the wireless sensor network is affected significantly; therefore, the network lifetime is shortened because in the marking scheme, a basic marking unit will be added to the transmitted marking once the routing data passes through a node. As the routing continues, the length of the data packet becomes long, and an increasing amount of data will be transmitted by sensor nodes. The nodes in the area near the sink carry much more data than those far from the sink. After the marking scheme is adopted, the local notes will load the data multiple times compared with the data loaded by nodes in areas far from the sink. In this case, the unbalance of network energy consumption is aggravated and the lifetime is significantly shortened. To reduce the damage caused by the notification to network energy, some researchers propose a probability-based marking scheme, which changes the scheme of marking every node in the conventional schemes and adopts a scheme of marking each node based on probability. The probability-based marking scheme has an advantage of effectively reducing the number of marking nodes and the energy consumption of the system to transmit the notification [47]. Conversely, the scheme has a lower ability to trace malicious nodes. In this scheme, the marking is not added for every node, so some nodes will be omitted during the reconstruction of a routing path from the source node to the sink; therefore, the routing data for such omitted nodes must be contained in other collected data to construct the complete path. However, collecting more data requires a long time, i.e., prolongs the convergence time, which is one of the important indexes of scheme performance. Reference [52] proposed an improved scheme against such a case. The main idea of their scheme is adopting different marking probabilities based on the security status of the network. When the network is secure, a smaller probability of marking is adopted; when the number of network attacks is increasing, the probability of marking is also increased correspondingly. The network is usually secure, so a smaller probability of marking is usually adopted and the greater probability of marking is only adopted for short periods. Therefore, the overall effect is that network security can be effectively guaranteed, the number of marking nodes is not large, and network lifetime is long.

  • (b)

    Logging-based traceback scheme. The logging-based scheme is another malicious node tracing technology [48]. The above introduction shows that the marking-based traceback approach adds many loads to the network, which affects the network lifetime. This logging scheme adopts the following approach to reduce the effect of notification on the network lifetime. Its essential idea is that each node in the network has a fixed storage capacity. Therefore, the storage capacity of nodes in the network can be fully utilized to store the notification on these nodes instead of sending it to the sink. When the network is attacked, these nodes will be requested to send the notification to the sink for traceback. Then, the traceback path can be reconstructed. Therefore, the specific approach to adopt the logging scheme is that the node adds the notification to the passing data packet with a certain probability, and when the quantity of notification in the data packet reaches a certain value, such as k, all notification will be recorded on nodes through the logging process. The notification that has been recorded on nodes will not be forwarded during the routing of subsequent data packets to the sink. The adopted scheme can effectively reduce the amount of data to be transmitted by the network and save network energy. CPMLT (combined packet marking and logging scheme for traceback) [53] is a representative of this type of scheme.

Although logging scheme can reduce the energy consumption of a network, the reduction is achieved at the cost of node storage space. Therefore, this type of scheme requires a certain storage capacity. In addition, the unbalanced utilization of storage capacity remains in the wireless sensor network, i.e., the storage space of nodes far from the sink area is not fully utilized, but that of nodes near the sink area is insufficient. This shortfall exists because the nodes constantly store the notification during the routing to the sink; thus, more notification should be recorded by logging near the sink area, and less should be recorded far from the sink area.

In the traceback approach, the key to reconstructing the traceback path is to obtain more notification better. Therefore, both marking and logging schemes are trying to obtain as much notification as possible. Reference [54] analyzed and obtained the general traceback approach in which a serious unbalance exists in the network between the consumption of energy and storage consumption. Specifically, the unbalance is that more energy and storage space are consumed in nodes near the sink area, but nodes far from the sink area have much remaining battery level and storage space. In view of this case, Reference [54] proposed a logging and migrating (LM) traceback scheme because the non-hotspot areas in the sensor network have over 90% remaining battery level and storage space, but the remaining storage space and battery level are insufficient near the sink area. In the LM traceback scheme, the marking data packets log all their notification on the nodes before approaching the hotspot area, and the non-hotspot nodes have remaining battery level and storage space, so logging the notification in the non-hotspot areas in advance will greatly reduce the pressure of battery level and storage space in the hotspot area. Moreover, the nodes near the hotspot areas store much notification, so when the storage space is insufficient, the notification logged in these areas will be migrated to remoter nodes with remaining space, which significantly improves the amount of notification stored by the system compared with the conventional schemes. Thus, the scheme performs well in lengthening network lifetime and storing notification.

  • (3)

    Energy Consumption Features of Energy-Harvesting Wireless Sensor Networks (EHWSNs) and relevant Management Schemes

Energy has always been the key research issue for wireless sensor networks because of their limited battery capacity and lifetime of the ordinary wireless sensor network. EHWSN is an effective solution proposed to address the limited battery capacity of the sensor network. In EHWSNs, in addition to the components for ordinary sensor nodes, hardware equipment able to absorb energy from the ambient environment is added to the sensor. The most important sensor network energy absorbed from the ambient environment is solar power in wireless sensor networks in which sensor nodes are provisioned with a solar panel and battery combination [21]. The solar panel is usually photovoltaic (PV), and the battery is rechargeable. The panel can absorb energy from the ambient environment; thus, the energy management scheme of EHWSNs is significantly different from the traditional WSNs. In WSNs, the main goal is to reduce the energy consumption, whereas in EPWSNs, the main purpose is to efficiently utilize available energy instead of reducing energy consumption [21]. This purpose exists because in EHWSNs such as solar-powered WSNs, when the solar radiation is strong, the nodes can absorb a large amount of energy but cannot store all of the energy due to the limited battery storage capacity of nodes. In this case, the nodes need not save energy and should make as full use of the energy as is possible. They use the energy for various operations, such as receiving and transmitting energy and system maintenance, and store sufficient energy for use at night without solar energy. Therefore, much research [23,24] notes that the new guiding principle in EHWSNs is energy-neutral operation, which consists of two simultaneous goals: (i) optimizing the network performance but (ii) ensuring that energy supply and energy demand are balanced [21,23,25].

Much research has been conducted on the energy management of EHWSNs. This research includes multiple aspects. First, in terms of hardware, for solar-powered wireless sensor networks, the size of the solar panel is an important issue. When the solar panel is too large, sufficient energy can be supplied, but more manufacturing costs will be required. When the solar panel is too small, insufficient energy is supplied to nodes. Therefore, Reference [21] propose an energy management algorithm based on shortest-path routing to minimize the network deployment cost (primarily the size of the solar panel) for a given energy source assignment.

When EHWSNs adopt the given hardware configuration, more research explored how to make full use of energy without an outage when optimizing network performance. Network performance indexes primarily include for example delay and channel throughput. The optimizations of these performance indexes are all closely related to energy. Thus, many studies have been conducted on this topic.

Duty cycle is an energy-saving mechanism adopted by and widely applied in most sensor networks. In this mechanism, the node sleeps and awakes periodically; when the node is in sleep status, its energy consumption is only 1/1000 that in awake status. Therefore, nodes will remain in sleep status as much as possible to save energy. However, a long sleep time aggravates network performance. The main effect lies in aggravating network delay and the network’s ability to monitor the environment. The sensor node cannot send or transmit data in sleep status or monitor the ambient environment. It cannot send or transmit data, so the routing from source to sink requires a long delay. It cannot monitor the ambient environment, so important events and objectives might be missed during the monitoring. Obviously, the duty cycle also has an important effect on channel throughput. When the duty cycle is long, nodes can send and receive data for a longer time and process a greater amount of data, which will improve the channel throughput of the network. Therefore, some researchers proposed effective studies to optimize the performance of EHWSNs. The main ideas of this research are as follows: (a) propose an effective energy prediction model and scheme to make full use of the available energy; (b) dynamically change the duty cycle of nodes, i.e., maximize the duty cycle when battery level on high level to optimize network performance and select the optimal duty cycle when the battery on low level.

First, modeling the energy absorbed by nodes is the basis for the success of these schemes. The general principle is that if the energy that the nodes can absorb in a coming period can be predicted, the energy use can be planned in advance and the energy utilization can be maximized to optimize network performance. For example, there is more solar energy radiation in the sunny daytime. If it is predicted that more energy will be absorbed in the future, the remaining battery level can be thoroughly consumed in advance because sufficient energy compensation will be provided subsequently. If it is predicted that less energy can be absorbed in the coming period, some energy should be stored for the future (night) to meet the energy consumption requirements before the next replenishment opportunity. Peng et al. [23] used a finite state Markov model and general stochastic model to model the energy-harvesting process in Reference [24].

Second, the maximum energy consumption of the current node can be calculated based on the prediction for energy. With a calculated result, the duty cycle (or sleep and wake) can be dynamically adjusted according to the available energy to optimize network performance [25]. When the energy is sufficient, the duty cycle of nodes will be maximized so that the delay and channel throughput of the network can be effectively optimized [26].

The above discussions show that opportunities remain for further research on the secure routing of EHWSNs. First, the secure routing is greatly different for WSN networks and EHWSNs. The secure routing for WSNs has limited functions and weak resistance against attacks due to the limited battery capacity. Moreover, secure routing schemes do not consider the full utilization of energy in EHWSNs. Therefore, effective secure routing for EHWSNs is obviously more important. Second, past secure routing schemes usually contain only one secure scheme. To the best of our knowledge, there is no scheme combining the secure routing scheme and the traceback scheme. Past traceback schemes were primarily proposed for WSNs, but this paper proposes a new secure routing in combination with the traceback scheme to further improve network security and other aspects of network performance. Finally, the traceback scheme is very suitable for EHWSNs, which can make full use of the storage space and the absorbed energy to improve the effectiveness of the traceback scheme. Based on the above analysis, this paper proposes a new secure routing scheme that is highly effective for EHWSNs.

3. System Model and Problem Statement

3.1. System Model

A network model

The network model in this paper is a typical planar periodic data collection wireless sensor network similar to [27,55,56,57]. Its system model is as follows:

  • (1)

    There are n homogeneous sensor nodes which are randomly deployed in a two-dimensional planar network with a radius of R, a sink is at the center and the node density is ρ. The node communication radius is r [2,56].

  • (2)

    The size of a data packet and notification are set to m bytes and b bytes respectively. The success rate of each hop is set to p, the initial battery level and the maximum battery level of each sensor node was set to Einitial and Emax respectively.

B Energy-harvesting node model

In EHWSNs, sensor nodes are usually divided into five parts: a processor module, a sensor module, a wireless communication module, a solar collector, and a battery, the power controller as shown in Figure 1. Its processor module, sensor module and wireless communication module are the same as the modules in an ordinary sensor network [2,5]. Its solar collector, battery module and power controller are different from those in traditional sensor nodes. The solar collector module is an energy-harvesting node model; its function is converting solar energy to electrical energy through the photovoltaic or chemical effect. The battery is the power supply module of the system. It stores the electrical energy collected by solar collector and has a limited capacity. When the battery is not fully charged, the solar collector can charge it. When the battery level is full, the solar collector cannot charge it even when it collects more electrical energy. The power controller is the control system for electrical energy. It adjusts the transmission frequency of the wireless communication module based on the level of battery remaining, sun exposure time, intensity of sunlight, and day and night relationship to change the energy consumption of the wireless sensor and maximize the utilization of limited electrical energy.

Figure 1.

Figure 1

Solar node structure diagram.

3.2. Data Aggregation Model

This paper adopts a typical data aggregation model similar to that described in the literature [58]. In such a data aggregation model, when the network collects data, some nodes are selected as aggregators and other nodes are simple nodes. Each simple node determines which aggregator it belongs to with the clustering algorithm in Reference [58] and then sends its own data packet to the aggregator directly. If the simple node Si belongs to aggregator Sj, the simple node is called a member node of the aggregator. The aggregator Sj aggregates data packets sent by all member nodes into one data packet.

When aggregator Sj receives the data packet sent by a member node Si, it will aggregate the data packet Di sent by Si and the existing data packet Sj of aggregator Sj (Sj might be the original data packet Dj of aggregator Sj or an intermediate result Sj during the data aggregation of member nodes by aggregator Sj, collectively expressed with Sj). X(Si, Sj) is used to indicate the final result of the data aggregation of two nodes Si, Sj. The calculation formula is as follows:

X(Si, Sj)=max(Di, Sj)+(1ci, j)min(Di, Sj) (1)

where ci,j is the correlation coefficient between nodes Si and Sj. A larger ci,j indicates a higher correlation between the data of nodes and a smaller length of data packet formed after the data aggregation.

3.3. Security Model

This paper assumes that the attacker tends to be very intelligent. The security attack against the network is largely blocking and dropping data packets in the network, thus damaging the functions of the network. For example, the sink cannot react to the monitored events in the network if it fails to receive the monitored data packets, so the harmful event will cause serious loss to the network. Blocking the routing of some important data packets will cause an incorrect decision of the sink because it fails to receive sufficient notification. For example, the attacker adopts a proper operational mode to capture a small part of data, steals and modifies the program in the part, which helps the attacker control the nodes that have obtained legal status and allows it to lodge various attacks. The Attacker is able to drop data packets with a certain probability (if the drop probability is 1, then it is a black hole attacker; otherwise, it is likely to be a selective forwarding attacker or a Denial of Service (DOS) attacker) and cause maximum harm to the network without exposing its own identity. On the one hand, attackers can also forge real nodes to launch various attacks, such as false data injection attacks. On the other hand, attackers can also collude to launch attacks, making the problem more complicated. However, if most nodes in a network are malicious nodes, network safety cannot be guaranteed [58]. Therefore, in this paper, we assume that the proportion of malicious nodes is small, for example, less than ς.

3.4. Energy Consumption Model

In this paper, we adopt the simplified X-MAC energy consumption model. X-MAC belongs to asynchronous competition MAC protocols. In these protocols, all nodes maintain their own duty cycle, and the transmitter and receiver are asynchronous. Thus, the receiving node might be in sleep status when the sending node sends the data out, and the LPL (Low-Power Listening) leader sequence technology will be adopted to wake up the receiving node. Therefore, in the X-MAC energy consumption model, the energy consumption power of each sensor node primarily includes the following two parts: (1) power of data packet sent or received by the node represented by ϖR and ϖT; and (2) power required for the lower power motoring operation represented by ϖLPLx.

The main parameters of the WSN model adopted by this paper are similar to those of the X-MAC model, and the equipment limits are sourced from the internal data fragments of the prototype of the Thales sensor node [42]. Table 1 lists the values of all parameters.

Table 1.

Network parameters.

Symbol Description Value
tcom Duration of communication 100 ms
Tp Duration of masthead 0.26 ms
Tal Duration of confirmation window 0.26 ms
Td Duration of data packet 0.93 ms
𝒫t Transmission power consumption 0.0511 w
𝒫r Receiving power consumption 0.0588 w
𝒫s Sleeping power consumption 2.4 × 10−7 w
ϖLPLx Power required to execute LPL operation (duration of tcom) Related to calculation
ϖR Power of nodes for receiving data packet Related to calculation
ϖT Power of nodes for transmitting data packet Related to calculation
Dcom Duty cycle 0.5

3.5. Problem Statement

The main goal of this paper is to design a secure routing scheme using a traceback approach for EHWSNs that makes full use of available energy to ensure data integrity and improve data security. The approach can be characterized as follows:

(1) Data integrity. Assurance to the recipient of the data came from the expected sender and has not been altered in transit, although the data is sent to the sink after data aggregation and multi-hop routing.

(2) Maximizing the probability of successively routing the data packets to the sink. The probability of successively routing data to the sink can be defined as the ratio between the number of data packets received by the sink and the total number of data packets sent by the network. The maximum data routing success rate can be computed as follows:

Max(D)=Max(rt) (2)

where t represents the total number of data packets sent in the network, and r represents the number of data packets successively received by the sink.

Moreover, notice messages reaching the sink also have a positive effect on network safety. They record the nodes that the routing path of data packets passes and then restore the routing path. If the sink receives the notice message but fails to receive the linked data packet or receive the altered data packet, it will find the malicious nodes attacked by tracing the source path of data packet through the notification with a high probability. Therefore, the TBSR scheme will also improve the success rate for notice messages to reach the sink:

Max(N)=Max(ArAt) (3)

where At represents the total number of notification sent in the network, and Ar represents the number of notice messages received by the sink.

(3) Maximizing energy utilization

Energy utilization is the ratio of the energy consumed by the network to the available energy of the network within an hour, as shown in Equation (4):

Max(Cu)=Max[(i=1n𝓌i)/(i=1navai)] (4)

where i is the i-th node in the network, n is the total number of nodes in the network, 𝓌i represents the energy consumption of ni within an hour, and avai represents the available energy of ni within an hour, which is calculated according to Algorithm 1. The maximization of network energy utilization will improve the effective use of network energy so that the ratio of energy consumed to the available energy in the network is largest.

(4) Network lifetime

In EHWSNs, the node will not die if the remaining battery level is maintained above 0 or a lower limit at any time.

(5) Minimizing demand for storage capacity of nodes

The storage capacity of a sensor node is limited, so the demand for storage capacity of nodes will not exceed the upper limit of the storage capacity of the sensor node. We assume that when the required storage capacity of node i in the strategy is 𝓂i, the maximum storage capacity required by the node is the smallest for the scheme, i.e., as follows:

min()=minmax0<in(𝓂i) (5)

(6) Minimizing convergence time Γ

Convergence time is the time taken by the information synchronization process after the router identifies the change of the topology structure of the network. Actually, when the victim is attacked, the attack path is reconstructed by consulting the information of upstream nodes and broadcasting malicious information.

min(Γ) (6)

In summary, the research objectives are as follows:

{Max(D)=Max(rt)Max(N)=Max(ArAt)Max(Cu)=Max[(i=1n𝓌i)/(i=1navai)]min()=minmax0<in(𝓂i)min(Γ) (7)

4. TBSR Scheme Design

4.1. Research Motivation

The security problems of wireless sensor networks have been discussed for a long time and widely emphasized and researched in industrial and academic circles. The trust-based secure routing using traceback approach (TBSR) scheme in this paper is proposed to address the following problems concerning the secure routing of a network in the past research:

  • (1)

    The past multi-path routing schemes consume much energy and cannot ensure data integrity. The research objective of secure data collection is to ensure the monitoring data of sensor nodes can be routed to the sink safely. The attacker can appear at any position in the network, and the data packet can be attacked when it passes the area in which the attacker is located and then dropped. The principle of avoiding such attack is bypassing the area in which the attacker is located. However, the location of attacker cannot be determined in advance and bypassed. Therefore, most research adopts a multi-path or disjoint routing approach. The main feature of this approach is that multiple data packets are simultaneously sent to the destination through different routing paths, so although some routing paths are attacked, some data packets can reach the sink safely. The research [31] proposed the multi-path routing approach to defend against a selective forwarding attack. The multi-path routing approach sends multiple data packets through different routing paths. Thus, when the data packet on one path is attacked and dropped, the data packet can nonetheless reach the sink through other paths. Obviously, the multi-path scheme ensures data security to some extent. Nevertheless, the scheme has the disadvantage of sending one data packet multiple times, which increases energy consumption by a multiplier and seriously affects the network lifetime. Another important disadvantage of the scheme is that it cannot ensure data integrity. If the data packet is altered, it cannot be identified by the sink.

  • (2)

    The existing scheme to ensure the data integrity cannot avoid dropping of the data packet. Reference [59] proposed an ID-based aggregate signature scheme that can add a signature during data aggregation. The proposed scheme is able to ensure that the data packet with the signature can be authenticated, thereby ensuring data integrity. However, the scheme of adopting a digital signature cannot prevent the data packet from being dropped by the attacker.

  • (3)

    Although we proposed an Aggregate Signature-based Trust Routing scheme (ASTR) [58] that combines the digital signature and security data routing, the function of locating malicious nodes remains a requirement, so the scheme remains a positive secure defense approach. In ASTR scheme [58], the node sends data and N abstract packets (known as (,N) routing approach) to ensure both data routing security and data integrity. Despite high-energy consumption when the node sends data and N abstract packets, this research continues to lack the function to determine the position of malicious nodes.

Above all, how to design an active scheme to locate the malicious nodes and ensure data routing security and data integrity is a challenging issue. In this paper, we propose a scheme that integrates the traceback approach, adopts the ID-based aggregate signature method and routes data packets and notification through multiple paths. It both reduces the energy consumption and ensures the security and integrity of data. The TBSR scheme has the following features: (a) adopt the ID-based aggregate signature scheme to ensure the information can be authenticated; (b) multiple data packets and notification are generated simultaneously during the routing. The notification is used to determine whether the data packet has reached the destination safely and has the advantage of small size and low energy consumption; (c) the most important point is that it integrates the traceback scheme. The principle of the Traceback scheme to ensure security is to attach the ID number of nodes that data passes to the data packet when it is routed to the sink with a certain probability. This ID number information is called notification. Obviously, the more notification the sink receives, the more routing information of data packets will be contained in the notification when the network is attacked, so the amount of notification reflects the ability of the network to locate the malicious nodes. Therefore, in the traceback scheme, the probability of marking should be as high as possible. However, a higher probability of marking will increase the amount of notification and energy consumption of the network, which can affect the network lifetime. Its difference from the past traceback scheme is that EHWSNs can absorb solar energy, and the TBSR scheme cleverly designs the probability of marking and logging of nodes, which enable the scheme to make full use of the absorbed energy to improve network security. The scheme adopted by the TBSR is that when sensor nodes absorb sufficient energy, a high probability of marking and a low probability of logging are used. In this case, the sink can obtain more notification and improve network security. When nodes absorb less energy, for example at night, a low probability of marking and a high probability of logging can be used to store the notification on the nodes in the network instead of sending them to the sink immediately. In this case, when the network cannot absorb sufficient energy, a lesser amount of data can be transmitted in the network, which saves energy. When the battery on high level, the notification recorded on the nodes in the network by logging scheme will be sent to the sink. Overall, the scheme obviously improves system security and the availability of energy; (d) finally, the TBSR scheme uses the malicious node location function of the traceback to reduce the trust of malicious node and guides the data to bypass the nodes with low trust during the routing, which further improves the security of the system.

4.2. Trust-Based Secure Routing Scheme Design

This section discusses the detailed design of the TBSR scheme. The TBSR scheme is shown in Figure 2. It is primarily composed of the following important parts: (1) data aggregate signature, (2) a data and notification disjoint routing approach, and (3) a traceback approach.

Figure 2.

Figure 2

Framework of the TBSR scheme.

(1) aggregate signature stage

In this stage, ID-based aggregate signature technology [58] is adopted in the ASTR scheme ID-based aggregate signature can ensure the source nodes can send the data packets to the aggregator and the aggregator performs the aggregate signature and sends them to the sink after multiple hops, which can provide assurance to the recipient of the message came from the expected sender and has not been altered in transit [58]. Hence, in ASTR scheme, the data packets are not directly sent to the sink but sent after data aggregation, which effectively reduces the data amount loaded by nodes (see Figure 2). The process of data aggregation is shown in Figure 2. When the node s0, s1, s2, s3, s4 intends to send the data packets to the sink, they will select one node among them, such as node s0 as the aggregator while other nodes become the member nodes of aggregator node s0 and send data packets to the aggregator node s0. After receiving the data packets sent by all member nodes, the aggregator node s0 adopts the aggregate signature scheme in Reference [58] to aggregate them into one data packet and sends the packet to the sink (if > 1, the data packet will be sent to the sink in a method similar to multi-path routing). Reference [58] has shown that the data aggregation method can be authenticated for each data of node. The selection of aggregator is similar to that of cluster head, which can be found in Reference [58].

(2) A data and notification disjoint routing approach

This section primarily discusses how to effectively route the data packet and notice message to the sink, i.e., a data and notification disjoint routing approach. data packets are sent each time using the multi-path routing scheme, and notification is generated for each data packet during the routing process through marking. Both data packet and notification are routed to the sink.

The procedure for this approach is as follows: first, an aggregator produces copies of the data packet during one operation and sends all copies to the sink through different paths. As shown in Figure 2, aggregator s0 first generates a random number 𝒹i in {1,𝒹}, and 𝒹i represents the length of the i-th data packet routed horizontally before being routed to the sink with the shortest routing approach. In this paper, horizontal routing refers to each time the node selects a node on the left (right) that is the same hops as itself from the sink as the next relay node for routing. Thus, aggregator s0 selects its neighbor node s4 on the left as the relay node and sends the data packet to s4. s4 selects its neighbor node s5 following the same direction. The process proceeds until the data packet is routed to node s7, and the horizontal routing stops when its routing distance reaches 𝒹i. Starting from node s7, the node will select the neighbor node closest to the sink until the data packet is routed to the sink. The routing process of other 1 data packets is the similar to the above. However, the difference is that the other 1 data packets will select the node that has not been selected by the preceding nodes or a highly trustable node as the relay node. The routing process of notification is very similar to the routing process of a data packet because the former is generated during the routing process of the data packet. The value of for routing of data packets is usually small, for example =2.

(3) Traceback approach

The traceback approach primarily consists of two processes: marking and logging. In the TBSR scheme, the detailed description of the marking and logging process is as follows:

  • (a)

    Marking: For all data packets, before they reach the sink, the nodes generating the data packets and on the routing paths will be marked with a certain probability, and all nodes in the network are marked with the same probability at that time.

  • (b)

    Logging: Before reaching the sink, all data packets will be logged starting from the next hop destination of the source node with a certain probability, and all nodes in the network are logged in the same probability at a given time. The probability of marking and logging at each moment is determined by the current available power. The specific value should be calculated based on Algorithm 1:

Algorithm 1. the algorithm of obtaining available energy and obtaining the probability of marking and logging
INPUT: the observed solar radiation power
// di(i0) is the i th day, ti,j(0j23) is the j th hour of the i th day,
// Fi,j is the observed solar radiation power at ti,j; Einitial is the initial energy of the node battery,
// Emax is the max electricity in battery.
OUTPUT: the available energy
// Ui,j is the available energy at ti,j; ri,j is the remaining battery level.
(1) get available energy stage
1: Find a day with the minimum total observed solar radiation power in the whole day using the formula sumi=023Fi,jdt. In addition, define this day as d0.
2: If (i=0)
    t0,n is the time to start the sunshine.
    Get e using the formula e=Einitialn+1.
    Get t0,𝕙 is the highest observed solar radiation time of the day.
    If (0jn)
      U0,0=U0,1==U0,n=e;
      r0,j=r0,j1+F0,je;}
    If (n+2j𝕙)
      U0,j=F0,j;
      r0,j=r0,n;
    If (𝕙+1j23)
      U0,13==U0,23=e;
      r0,j=r0,j1+F0,je;
    If (ri,jEmax)
      ri,j=Emax;
   End if
End if
3: If (i1)
    Switch (j)
   Case1:
     If (0jn)
          Ui,0=Ui,1==Ui,n=e;
          ri,j=ri,j1+Fi,je;
     Break;
      Case2:
     If (j=n+1)
          Ui,n+1=U0,n+1;
     Break;
    Case3:
     If (n+2j<𝕙)
          Ui,j=Fi,j1;
          ri,j=ri,j1+Fi,jUi,j;
          If (ri,jEmax)
          ri,j=Emax;
      Break;
    Case4:
     If (𝕙j𝕙+2)
          Ui,j=0.6Fi,j1;
          ri,j=ri,j1+Fi,jUi,j;
          If (ri,jEmax)
           ri,j=Emax;
     Break;
    Default:
     If (𝕙+2<j23)
           Ui,0=Ui,1==Ui,n=e;
           ri,j=ri,j1+Fi,je;
           If (ri,jEmax)
            ri,j=Emax;
     Break;
End if
(2) get the probability of marking stage
4: For each ti,j in the set {ti,0,ti,1,,ti,23} Do
    Get the probability of marking αi,j using Equation (41);
End for
(3) get the probability of logging stage
5: For each ti,j in the set {ti,0,ti,1,,ti,23} Do
    Get the probability of logging βi,j using Equation (50);
End for

The detailed description of the TBSR scheme is provided in Algorithm 2.

Algorithm 2. the algorithm of a trust-based secure routing (TBSR) scheme
INPUT: receive a packet
// ti,j(0j23) is the j th hour of the i th day; Ui,j is the available energy at ti,j,
// αi,j is the probability of marking at ti,j, βi,j is the probability of logging at ti,j, and h is the hop from the sink.
OUTPUT: Forward a new packet to next hop node
(1) aggregate signature stage
1: For each node Do
    running aggregator determining algorithm which is similar to cluster-head selection algorithm in Reference [59];
End for
 // now, nodes either belong to aggregators or belong to member nodes
2: For each member node Do
   send its data and node ID, data time to its aggregator
End for
3: For each aggregator node s0 Do
    s0 aggregate its member nodes’ data into a data packet D0
  using ID-based aggregate signature technology as Reference [58];
    s0 aggregate its member nodes’ abstract into an abstract A0
  using ID-based aggregate signature technology as Reference [58];
End for
(2) Adopt the variable probability marking and logging (αi,j,βi,j) stage
4: For each receive packet P in node nh and nh is not sink Do
    Mark all received packets P with αi,j.
   // αi,j using Equation (41).
End for
5: For each receive packet P1 generated by last node nh+1 Do
    Log the amount of notification in packet P1 with βi,j.
   // βi,j using Equation (50);
End for
6: Forward New packets P to next hop node.

4.3. Optimized Selection of Parameters

In the TBSR scheme, the two most important parameters are probability of marking and probability of logging. The values of these two parameters are critical to the whole strategy. As the above shows, the solar radiation differs at different times, so the amount of energy that can be consumed by the nodes is different. The probabilities of marking and logging are calculated based on the available energy, so we should first calculate the amount of data received and sent by nodes, then calculate the energy consumption of data sending and receiving and finally makes the energy consumption less than available energy, obtaining satisfactory probabilities of marking and logging.

Theorem 1.

For a planar network, assume the length of a data packet is m bits, the length of notification is b bits and the probability of marking is α . When the remaining battery level is low, the node sending the data packet will be logged with the probability of β after one hop, and the amount of data received and sent by the node that is l from the sink is represented with 𝕣x and 𝕤x respectively. Their calculation formulas are as follows:

{𝕣x=(l+r)l×(m+bα)p+k=2z(l+kr)l×[mpk+(1β)bαi=1kpi]|z=Rlr𝕤x=(m+bα)+k=1z(l+kr)l×[mpk+(1β)bαi=0kpi]|z=Rlr (8)

Proof. 

As shown in Figure 3, the node that is l from the sink is in the ϑl,k area with an angle of θk. The emission radius of the node is r, so ϑl,k will surely receive the data generated in ϑl+r,k area that is r from itself. In the same manner, ϑl+r,k will receive and forward the data generated in the ϑl+2r,k area. If the ϑl,k area is very small, all nodes in the area can be considered loading the same amount of data. The amount of data received by the node nx that is l from the sink is represented by x.

Figure 3.

Figure 3

Illustration of the information loaded by a node.

The inclusion angle between the ϑl,k area and the sink is as small as dθk (arc), the width is assumed dx, and the ϑl,k area is fan-shaped. However, the width is small, so in differential calculus, it can be considered a rectangle for area calculation; the length is equal to the arc length, i.e., the width of dθkl is dx. Therefore, the area of ϑl+r,k is Sϑl+r,k=(l+r)dθkdx. The total number of nodes in the  ϑl+r,k area is as follows:

Nϑl+r,k=Sϑl+r,kρ=ρ(l+r)dθkdx (9)

The length of marking position is b bits, so when a data packet is sent from the ϑl+r,k area to the ϑl,k area, the length of the data packet is as follows:

vϑl+r,k=p(m+bα) (10)

The Nϑl+r,k nodes in the ϑl+r,k will surely generate Nϑl+r,k data packets. Therefore, all data packets in the ϑl+r,k area will be transmitted to the ϑl,k area. The amount of data at this moment is as follows:

γϑl+r,k=ρ(l+r)𝑑θkdx×(m+bα)p (11)

The area and number of nodes in the ϑl+2r,k area are as follows:

Sϑl+2r,k=(l+2r)dθkdx, Nϑl+2r,k=Sϑl+2r,kρ=ρ(l+2r)dθkdx (12)

When a data packet is transmitted from the ϑl+2r,k area to the ϑl,k area, the length of data packet should be as follows:

vϑl+2r,k=βmp2+(1β)×[(m+bα)p2+bαp] (13)

Similarly, when all data packets are sent from the ϑl+2r,k area to the ϑl,k area, the amount of data should be as follows:

γϑl+2r,k=ρ(l+2r)dθkdx×{βmp2+(1β)×[(m+bα)p2+bαp]} (14)

At this time, the required storage space of each node in the ϑl+r,k area is as follows:

l+r=bαp or 0 (15)

The area and number of nodes of the ϑl+3r,k area are as follows:

Sϑl+3r,k=(l+3r)dθkdx,Nϑl+3r,k=Sϑl+3r,kρ=ρ(l+3r)dθkdx (16)

When a data packet is transmitted from the ϑl+3r,k area to the ϑl,k area, the total length of the data packet should be the following:

vϑl+3r,k=βmp3+(1β)×[(m+bα)p3+bαp2+bαp] (17)

Similarly, when all data packets are transmitted from the ϑl+3r,k area to the ϑl,k area, the amount of data should be as follows:

γϑl+3r,k=ρ(l+3r)dθkdx×{βmp3+(1β)×[(m+bα)p3+bαp2+bαp]} (18)

At this time, the storage space of each node in the ϑl+2r,k area is as follows:

l+2r=bαp or 0 (19)

Similarly, when all data packets are transmitted from the ϑl+zr,k to the ϑl,k, the amount of data should be the following:

γϑl+zr,k=ρ(l+zr)dθkdx×{βmpz+(1β)×[(m+bα)pz++bαp2+bαp]} (20)

At this time, the storage space of each node in the ϑl+(z1)r,k area equal the following:

l+(z1)r=bαp or 0 (21)

Similarly, the amount of data received by the ϑl,k area can be calculated as follows:

𝕣ϑl,k=γϑl+r,k+γϑl+2r,k++γϑl+zr,k=ρ(l+r)dθkdx×(m+bα)p+ρ(l+2r)dθkdx×{βmp2+(1β)×[(m+bα)p2+bαp]}++ρ(l+zr)dθkdx×{βmpz+(1β)×[(m+bα)pz++bαp2+bαp]}=ρdθkdx{(l+r)×(m+bα)p+k=2z(l+kr)×[mpk+(1β)bαi=1kpi]} (22)

Thus, the amount of data received by each node in the ϑl,k area can be calculated as follows:

𝕣x=𝕣ϑl,kρldθkdx      =(l+r)l×(m+bα)p      +k=2z(l+kr)l×[mpk+(1β)bαi=1kpi]|z=Rlr (23)

The next step is calculating the amount of data sent by nodes. The length of data packet sent from the ϑl,k area is as follows:

ωϑl,k=m+bα (24)

The Nϑl,k nodes in the ϑl,k will surely generate Nϑl,k data packets, so the amount of data sent from the ϑl,k area is as follows:

Lϑl,k=ρldθkdx(m+bα) (25)

When a data packet is transmitted from the ϑl+r,k area to the ϑl,k and sent out by the ϑl,k area, the length of data packet should be as follows:

ωϑl+r,k=βmp+(1β)×[(m+bα)p+bα] (26)

The total number of nodes in the abovementioned ϑl+r,k area, i.e., total number of generated data packets is Nϑl+r,k=ρ(l+r)dθkdx. Therefore, when all data packets are transmitted from the ϑl+r,k area to the ϑl,k area, the amount of data should be the following:

Lϑl+r,k=ρ(l+r)dθkdx×{βmp+(1β)·[(m+bα)p+bα]} (27)

Similarly, when a data packet is sent from the ϑl+2r,k area to the ϑl,k area, the length of data packet at this moment should be the following:

ωϑl+2r,k=βmp2+(1β)×[(m+bα)p2+bαp+bα] (28)

The number of data packets produced by the ϑl+2r,k area is Nϑl+2r,k=ρ(l+2r)dθkdx. Therefore, when all data packets are sent from the ϑl+2r,k area to the ϑl,k, the amount of data sent out from the area should be the following:

Lϑl+2r,k=ρ(l+2r)dθkdx×{βmp2+(1β)×[(m+bα)p2+bαp+bα]} (29)

Similarly, when a data packet is sent from the ϑl+zr,k area to the ϑl,k area, the length of the data packet should be as follows:

ωϑl+zr,k=βmpz+(1β)×[(m+bα)pz++bαp2+bαp+bα] (30)

The number of data packets generated in the ϑl+zr,k area is Nϑl+zr,k=ρ(l+zr)dθkdx. Therefore, when all data packets are transmitted from the ϑl+zr,k area to the ϑl,k, the amount of data sent out from the area should be the following:

Lϑl+zr,k=ρ(l+zr)dθkdx      ×{βmpz+(1β)×[(m+bα)pz++bαp2+bαp+bα]} (31)

Calculated in the same manner, the amount of data sent out from the ϑl,k area is as follows:

𝕤ϑl,k=Lϑl,k+Lϑl+r,k+Lϑl+2r,k++Lϑl+zr,k=ρldθkdx(m+bα)+ρ(l+r)dθkdx×{βmp+(1β)×[(m+bα)p+bα]}+ρ(l+2r)dθkdx×{βmp2+(1β)×[(m+bα)p2+bαp+bα]}++ρ(l+zr)dθkdx×{βmpz+(1β)×[(m+bα)pz++bαp2+bαp+bα]}=ρdθkdx{l(m+bα)+k=1z(l+kr)×[mpk+(1β)bαi=0kpi]} (32)

Thus, the amount of data sent by each node in the ϑl,k is as follows:

𝕤x=𝕤ϑl,kρldθkdx=(m+bα)+Σk=1z(l+kr)l×[mpk+(1β)bαΣi=0kpi]|z=Rlr (33)

Theorem 2.

This paper adopts the simplified X-MAC energy protocol. Thus, the energy consumption of a node ϖtotx has two parts: (1) power of data packet sent or received by the node represented by ϖR and ϖT; and (2) power required for the lower power motoring operation represented by ϖLPLx. Assuming ϖtotx represents total energy consumption of communication and Low-Power Listening of the node that is x m from the sink in one communication period tcom, ϖLPLx represents the energy required for LPL operation, ϖRx represents the power consumed when one node receives one data packet, ϖTx represents the power consumption of sending one data packet, and δrx and δtx represent the amount of data received and sent by one node. After this paper simplifies the energy consumption of the perception stage, ϖtotx can be calculated by the following formula:

ϖtotx=ϖLPLx+ϖRxδrx+ϖTxδtx (34)

where

{ϖTx=𝓅tTd+(1Dcom)tcom2(Tp+Tal)(𝓅tTp+𝓅rTal)ϖRx=𝓅rTd+(𝓅rTp+𝓅tTal)ϖLPLx=𝓅rDcom+𝓅t(1Dcom)πtxπrxπtx={𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}δtxtcomπrx=[(Tal+Td)𝓅s+𝓅rTp]δrxtcom (35)

Proof. 

According to the X-MAC energy consumption model, the average energy consumption of sending one data packet ϖTx includes two parts—the energy consumption of sending the data part of the data packet and the energy consumption of a periodic preface transmission to notify the receiving node that a data packet will reach. Therefore, the average energy consumption of sending one data packet ϖTx can be calculated by the following formula:

ϖTx=𝓅tTd+(1Dcom)tcom2(Tp+Tal)(𝓅tTp+𝓅rTal) (36)

According to the X-MAC energy consumption model, the average energy consumption of receiving one data packet ϖRx can be calculated by the following formula:

ϖRx=𝓅rTd+(𝓅rTp+𝓅tTal) (37)

The corresponding power of LPL operation can be calculated as follows:

ϖLPLx=𝓅rDcom+𝓅t(1Dcom)πtxπrx (38)

The reason for deducting πtx and πrx from ϖLPLx is that when the node is in active status, some time is spent on sending and receiving data and has been calculated by Equations (36) and (37), so the energy consumption during this period should be deducted in the calculation of the energy consumption of LPL operation. Obviously, the nodes closer to the sink load mode data, so they spend more time on sending and receiving data and less time on LPL operation, i.e., the deducted part πtx and πrx are larger and ϖLPLx is smaller. In contrast, the nodes far from the sink node load less data, so they spend a long time on LPL operation, i.e., πtx and πrx are smaller and ϖLPLx is larger.

According to the X-MAC energy consumption model, πtx can be calculated as follows:

πtx={𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}δtxtcom (39)

πrx can be calculated as follows:

πrx=[(Tal+Td)𝓅s+𝓅rTp]δrxtcom (40)

Figure 4 shows the amount of data received and sent by nodes in the network in the TBSR scheme. As the figure shows, when α=1.0, β=0, i.e., the probability of marking is 1 and the probability of logging is 0, the amount of data received and sent is greatly different from that in other cases. When h=1, the amount of received data is 1.82 times the amount when α=0.5, β=0.5 and 2.52 times the amount when α=1.0, β=0. In the latter case, all nodes on the path are marked and not stored, which achieves the best security. If the network is attacked, all source nodes sending data packets and nodes on the transmission path can be found. If the node battery level is high, this case (α=1.0, β=0) has the highest security. However, if the level of battery remaining is low, the probability of marking should be lowered and the probability of logging should be improved to ensure the smooth transmission of data and avoid the death of a node, which will save energy due to smaller amounts of received and sent data.

Figure 4.

Figure 4

Amount of data received and sent by nodes—different hops from the sink under different marking and logging probabilities.

Figure 5 shows the analysis of the node h = 1. When α=1.0, β=0, the electrical energy consumed by the node for receiving and sending data is 17.71 wh. When α=0.5, β=0.5, the electrical energy consumed by the node for receiving and sending data is approximately 9.15 wh. When α=0.1, β=1, the consumed electrical energy is only 6.29 wh. The last one saves 64.48% and 31.26% energy, respectively, compared with the first and second case. Solar radiation and the electrical energy compensated for the battery per hour varies under different climate conditions and environmental factors. In order to maintain the level of battery remaining above 0 or a lower limit at any time, the level of battery remaining determines the values of α and β we can use. As shown in Figure 5, we can adjust the probability of marking α and probability of logging β to achieve different energy consumptions, thereby adapting to different climate conditions and environmental factors.

Figure 5.

Figure 5

Energy consumption of nodes—different hops from the sink for receiving and sending data under different probability of marking and logging.

Figure 6 shows the amount of data received and sent by the node 1 hop from the sink when the probability of marking is 0.1~1 and the probability of logging is 0, 0.5 and 1. As the figure shows, when the probability of logging is the same, the amount of data and probability of marking present a positive linear correlation, so the greater the probability of marking is, the more data the node will load. In addition, a greater probability of logging results in a greater slope and faster increase in data amount.

Figure 6.

Figure 6

Amount of data received and sent—a node 1 hop from the sink under different probability of marking and logging.

Figure 7 shows the energy consumption of the node under the conditions provided in Figure 6. As the figure shows, when β=1, the energy consumption changes insignificantly as α increases and maintains approximately 6.30 wh. In this case, although the energy consumption is small, the probability of logging is 1, i.e., the mark will be stored after the next hop, and all subsequent nodes on the routing path cannot be marked, so network security is very low. When β=0.5, the minimum energy consumption is approximately 7 wh and the maximum is approximately 12 wh. When β=0, the maximum energy consumption can approach 18 wh. If the energy is sufficient, this case will have the highest security. In conclusion, increasing α can improve network security, and increasing β will reduce network security, so we must determine proper values for α and β to save energy while ensuring higher security.

Figure 7.

Figure 7

Energy consumption of the node 1 hop from the sink for receiving and sending data under different probability of marking and logging.

Figure 8 shows the amount of data received and sent by the node 1 hop from the sink when the probability of logging is 0~1 and the probability of marking is 0, 0.5 and 1. As the figure shows, when the probability of marking is the same, the amount of data and probability of logging present a negative linear correlation. Thus, the greater the probability of logging is, the less data the node will load. In addition, a greater probability of logging results in a greater absolute value of slope and faster decrease of data amount. Figure 9 shows the energy consumption of the node under the conditions provided in Figure 8. As the figure shows, when α=0.1, the energy consumption changes insignificantly as β increases and maintains within 6.29~7.42 wh.

Figure 8.

Figure 8

Amount of data received and sent—a node 1 hop from the sink under different logging and probability of marking.

Figure 9.

Figure 9

Energy consumption of the node 1 hop from the sink for receiving and sending data under different logging and probability of marking.

The TBSR scheme can determine the proper probability of marking and logging based on the level of battery remaining and solar radiation, as seen in Figure 7 and Figure 9. Therefore, we should do further research to obtain the maximum α and minimum β under the same energy consumption.

Theorem 3.

For a planar network, assume that the length of data packet is m bits and the length of notification is b bits. The node sending the data packet will be logged with the probability of β after one hop, the amount of data received and sent by the node that is l from the sink is represented with 𝕣x and 𝕤x respectively, the energy consumption of each node is Wtot, and the energy supplied by the battery during the period is U. To ensure the energy consumption is less than or equal to the energy supplied, i.e., WtotU, the probability of marking shall meet the following conditions:

αUν1(ϖRxf)ν2(ϖTxg)cμ1(ϖRxf)+μ2(ϖTxg),when β is a fixed value (41)

where

{ϖRx=𝓅rTd+(𝓅rTp+𝓅tTal)ϖTx=𝓅tTd+(1Dcom)tcom2(Tp+Tal)(𝓅tTp+𝓅rTal)c=𝓅rDcom+𝓅t(1Dcom)f=[(Tal+Td)𝓅s+𝓅rTp]tcomg={𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}tcomμ1=l+rlbp+k=2zl+krl(1β)b×i=1kpiμ2=b+k=1zl+krl(1β)b×i=0kpiν1=l+rlm+k=2zl+krlmpkν2=m+k=1zl+krlmpk (42)

Proof. 

The formula is obtained based on the energy consumption: Wtot=ϖLPLx+ϖRx𝕣x+ϖTx𝕤x. To ensure that the energy consumption is less than the supplied energy, i.e., WtotU, the following formula is obtained:

𝓅rDcom+𝓅t(1Dcom){𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}𝕤xtcom[(Tal+Td)𝓅s+𝓅rTp]𝕣xtcom+ϖRx𝕣x+ϖTx𝕤xE

Let c=𝓅rDcom+𝓅t(1Dcom), f=[(Tal+Td)𝓅s+𝓅rTp]tcom, g={𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}tcom,

Then:

c+(ϖRxf)𝕣x+(ϖTxg)𝕤xU (43)

According to Theorem 1:

𝕣x=(l+r)l×(m+bα)p+k=2z(l+kr)l×[mpk+(1β)bαi=1kpi] (44)
𝕤x=(m+bα)+k=1z(l+kr)l×[mpk+(1β)bαi=0kpi] (45)

Treat β as a fixed value and transpose Equation (44):

𝕣x=[l+rlbp+k=2zl+krl(1β)b×i=1kpi]×α+l+rlm+k=2zl+krlmpk (46)

Let μ1=l+rlbp+Σk=2zl+krl(1β)b×Σi=1kpi, ν1=l+rlm+Σk=2zl+krlmpk.

Transpose Equation (45):

𝕤x=[b+k=1zl+krl(1β)b×i=0kpi]×α+m+k=1zl+krlmpk (47)

Let μ2=b+Σk=1zl+krl(1β)b×Σi=0kpi, ν2=m+Σk=1zl+krlmpk.

Substitute 𝕣x=μ1α+ν1 and 𝕤x=μ2α+ν2 in Equation (43):

c+(ϖRxf)(μ1α+ν1)+(ϖTxg)(μ2α+ν2)U (48)

Transpose:

αUν1(ϖRxf)ν2(ϖTxg)cμ1(ϖRxf)+μ2(ϖTxg) (49)

Theorem 4.

For a planar network, assume that the length of data packet is m bits and the length of notification is b bits. The node sending the data packet will be marked in the probability of α, the amount of data received and sent by the node that is l from the sink is represented with 𝕣x and 𝕤x respectively, the energy consumption of each node is Wtot, and the energy supplied by the battery during the period is U. To ensure the energy consumption is less than or equal to the energy supplied, i.e., WtotU, the probability of logging shall meet the following conditions:

β1Uν3(ϖRxf)ν4(ϖTxg)cμ3(ϖRxf)+μ4(ϖTxg),when α is a fixed value (50)

where

{ϖRx=𝓅rTd+(𝓅rTp+𝓅tTal)ϖTx=𝓅tTd+(1Dcom)tcom2(Tp+Tal)(𝓅tTp+𝓅rTal)c=𝓅rDcom+𝓅t(1Dcom)f=[(Tal+Td)𝓅s+𝓅rTp]tcomg={𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}tcomμ3=k=2zl+krlbα×i=1kpiμ4=k=1zl+krlbα×i=0kpiν3=(l+r)l(m+bα)p+k=2zl+krlmpkν4=m+bα+k=1zl+krlmpk (51)

Proof. 

The formula can be obtained according to the energy consumption model: Wtot=ϖLPLx+ϖRx𝕣x+ϖTx𝕤x. To ensure that the energy consumption is less than the supplied energy, i.e., WtotU, the following formula is obtained:

𝓅rDcom+𝓅t(1Dcom){𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}𝕤xtcom[(Tal+Td)𝓅s+𝓅rTp]𝕣xtcom+ϖRx𝕣x+ϖTx𝕤xE (52)

Let c=𝓅rDcom+𝓅t(1Dcom), f=[(Tal+Td)𝓅s+𝓅rTp]tcom, g={𝓅s[(1Dcom)tcom2+Tp+Tal]+𝓅rTp}tcom,

Then:

c+(ϖRxf)𝕣x+(ϖTxg)𝕤xU (53)

According to Theorem 1:

𝕣x=(l+r)l×(m+bα)p+k=2z(l+kr)l×[mpk+(1β)bαi=1kpi] (54)
𝕤x=(m+bα)+k=1z(l+kr)l×[mpk+(1β)bαi=0kpi] (55)

Similarly, treating α as a fixed value, transpose Equation (54):

𝕣x=[k=2zl+krlbα×i=1kpi]×(1β)+(l+r)l(m+bα)p+k=2zl+krlmpk (56)

Let μ3=Σk=2zl+krlbα×Σi=1kpi, ν3=(l+r)l(m+bα)p+Σk=2zl+krlmpk.

Transpose Equation (55):

𝕤x=[k=1zl+krlbα×i=0kpi]×(1β)+m+bα+k=1zl+krlmpk (57)

Let μ4=Σk=1zl+krlbα×Σi=0kpi, ν4=m+bα+Σk=1zl+krlmpk.

Substitute 𝕣x=μ3(1β)+ν3 and 𝕤x=μ4(1β)+ν4 in Equation (53):

c+(ϖRxf)[μ3(1β)+ν3]+(ϖTxg)[μ4(1β)+ν4]U. (58)

Transpose the formula:

β1Uν3(ϖRxf)ν4(ϖTxg)cμ3(ϖRxf)+μ4(ϖTxg) (59)

Combining Theorem 2, to maximize the utilization of the level of battery remaining and solar radiation, we should improve network security as much as possible but control the energy consumption within the available energy, i.e., use a larger α and smaller β as possible. According to Theorems 4 and 5, we can make Figure 10, Figure 11, Figure 12 and Figure 13. Figure 10 and Figure 11 shows the maximum value of α under different fixed β when the available energy is 7~17 wh. Figure 12 and Figure 13 shows the minimum value of β under different fixed α when the available energy is 7~17 wh.

Figure 10.

Figure 10

Values of probability of marking the node 1 hop from the sink when the probability of logging is a fixed value (β=0.1, 0.3, 0.5, 0.7, 0.9) and the available energy is (7, 8,, 17).

Figure 11.

Figure 11

Values of probability of marking the node 1 hop from the sink when the probability of logging is a fixed value (β=0, 0.2, 0.4, 0.6, 0.8) and the available energy is (7, 8,, 17).

Figure 12.

Figure 12

Values of probability of logging the node 1 hop from the sink when the probability of marking is a fixed value (α=1.0, 0.9,0.8,0.7,0.6,0.5) and the available energy is (7, 8,, 17).

Figure 13.

Figure 13

Values of probability of logging the node 1 hop from the sink when the probability of marking is a fixed value (α=0.1, 0.2, 0.3, 0.4) and the available energy is (7, 8,, 17).

According to Figure 10, Figure 11, Figure 12 and Figure 13, when available energy = 7, there is one sequence containing multiple pairs (α, β) meeting the requirement of Theorem 2 as shown in the following table. Similarly, when available energy = 8, …, a corresponding sequence can be found. Our purpose is to find out the pair that enables the sink to receive the largest amount of notification, so this paper takes available energy = 7, 8, 9, 10, and 11 as examples, removes some pairs that are obviously not the optimal options and reserves some pairs that are possibly optimal.

In this paper, convergence time is an important index to evaluate the TBSR scheme. Convergence time refers to the time taken by the whole synchronization process of routing information after the routers find the change in the topology structure of the network. Actually, in the TBSR scheme, convergence time is largely determined by the amount of notification that the sink can collect. When victims are attacked, they will consult the information of the upstream nodes and reconstruct the attack path in the traceback request in the form of broadcasting the malicious packet information. If the sink receives more notification, the victims can collect sufficient notification to determine the malicious node in a shorter time. In contrast, the victims must wait for another attack of the malicious node. Moreover, the data packet attacked must be marked, and the notification must be transmitted to the victims. Clearly, the more notification the sink of the network receives, the better the convergence time index will be. Therefore, this paper uses the amount of notification received by the sink to reflect the convergence time. The following Theorem 5 calculates the amount of notification received by the sink.

Theorem 5.

For a planar network, assuming the radius of the whole network is R, the transmission radius of a data packet is r, the success rate of each hop is p, the length of the data packet is m bits, the length of digital marking is b bits, and the node sending the data packet is logged with the probability of β after one hop. The amount of notification received by the sink is as follows:

M(α, β)=ρπr2{bαp[1+(1β)k=1z(1+k)]+k=1zbαpk+1(1β)i=kz(1+i)} |z=Rlr (60)

Proof. 

The amount of notification received by the sink is the product of the amount of data sent by the node 1 hop from the sink and p. The amount of notification sent by the node that is l from the sink is as follows:

𝕤mark=bα+(l+r)(1β)(bαp+bα)+(l+2r)(1β)(bαp2+bαp+bα)++(l+zr)(1β)(bαpz++bαp2+bαp+bα)=bα[1+(1β)Σk=1zl+krl]+Σk=1zbαpk(1β)Σi=kzl+irl| z=Rlr (61)

l=hr+x, so the above formula can be converted to the following:

𝕤markh= bα[1+(1β)k=1z(1+kh)]+k=1zbαpk(1β)i=kz(1+ih) |z=Rlr (62)

Therefore, the amount of notification sent by each node of h = 1 is as follows:

𝕤mark1= bα[1+(1β)k=1z(1+k)]+k=1zbαpk(1β)i=kz(1+i) |z=Rlr (63)

The amount of notification received by the sink in the whole area is as follows:

M=ρπr2{bαp[1+(1β)k=1z(1+k)]+k=1zbαpk+1(1β)i=kz(1+i)} |z=Rlr (64)

The above analysis of the amount of notification received by the sink is actually an analysis of convergence time because the more notification the sink of the network receives, the shorter convergence time will be. In the TBSR scheme, the storage space of the node will also be considered in addition to convergence time. If too much notification is stored in a node, the strategy is not perfect. The following calculates the amount of notification stored in each node.

Theorem 6.

For a planar network, assuming the length of data packet is m bits and the length of digital marking is b bits, the node sending the data packet and notification will be logged with the probability of β after one hop, and the amount of notification stored in each node is as follows:

ξ=0tβbαpdt (65)

Proof. 

It can be obtained from the proof process of Theorem 1 that each node only logs the notification of the starting node of the last hop. The amount of notification sent by the starting node of last hop and received by the current node is bαp; the current node is logged with the probability of β, so the amount of notification stored in a node at a certain moment is βbαp. The accumulated amount of notification at any time in a day should be calculated through time integration, i.e., ξ=0tβbαpdt.

As shown in the theorem, in the TBSR scheme, the logged notification is distributed over the whole network, so that only a small number of notifications are stored in each node and the stored notification will be sent out the next day, so the node has a light load, which proves the good performance of the TBSR scheme.

According to Theorem 5, we can select one from all satisfactory (α, β) pairs to achieve the best network security, i.e., the (α, β) pair with the maximum convergence time. As shown in Table 2 in the last section, five (α, β) pairs meet the requirement of available energy = 7 wh. After calculating the convergence time of the five pairs, we determine that (0.6, 0.9) has the maximum convergence time and best security. Similarly, we can also find the (α, β) that achieves the best security when the available energy is another value. The following Table 3 shows the (α, β) with best security obtained through calculation.

Table 2.

Candidate pairs for the node of h=1.

Available Energy (wh) (α, β)
7 (0.2,0.7) (0.3,0.8) (0.6,0.9) (1,1)
8 (0.3,0.6) (0.4,0.7) (0.7,0.8) (1,0.9)
9 (0.3,0.3) (0.5,0.6) (0.7,0.7) (1,0.8)
10 (0.4,0.2) (0.6,0.5) (0.7,0.6) (1,0.7)
11 (0.5,0.2) (0.6,0.4) (0.7,0.5) (1,0.6)

Table 3.

(α, β) with the best security performance when R=200, r=20, ρ=0.5 and the node with h = 1 has different values of available energy.

Available Energy (wh) α β When Convergence Time is min, Sink’s Notification Storage Space
7 0.6 0.9 971,989.79 48.6
8 0.7 0.8 2,228,412.17 50.4
9 0.7 0.7 3,322,836.25 44.1
10 0.4 0.2 5,025,689.53 7.2
11 1 0.6 6,276,459.91 54.0

The above is our analysis on two indexes of the TBSR scheme—convergence time and storage space of a node. In the following part, we will analyze the performance of the TBSR scheme based on the actual situation.

5. Performance Analysis

5.1. Experimental Result

The following Table 4 shows the experiment conditions and selected parameters:

Table 4.

Experiment parameters.

Symbol Description Value
m Length of data packet 500
b Length of marking 100
p Success rate of transmission of each hop 0.9
R Network radius 200 m
r Emission radius of node 20 m
ρ Distribution density of node 0.5
Einitial the initial level of battery 55 wh
Emax the maximum level of battery 111 wh

We assume the length of the data packet after aggregation as 500 and the length of notification as 100. We select the solar energy receiver in dimensions of 10 cm × 20 cm. The initial level and maximum level of the node battery are 55 wh and 111 wh, respectively.

First, we select the first day from the data of the Solar Radiation Laboratory of Texas, USA [60], based on the TBSR scheme (The TBSR scheme requires the first day to be the day with the least solar radiation in recent years), select the remaining 11 days randomly and draw Figure 14 under the above conditions. As shown in the figure, the minimum level of the node battery remaining is 7 wh according to the energy consumption plan of the TBSR scheme, and it appears on the first day. On any later day, the remaining energy of the node battery is over 20 wh, and the battery can be fully charged every day.

Figure 14.

Figure 14

Solar radiation energy, available energy and remaining energy of battery for the 12 days.

Figure 15 and Figure 16 show the analysis conducted based on Figure 14. The nodes closer to the sink load the greatest amounts of data and consume the most energy, so we analyze the node 1 hop from the sink first. Under the experiment conditions of Figure 14 and according to the TBSR scheme, we can obtain the probability of marking and logging of the node 1 hop from the sink at different times.

Figure 15.

Figure 15

Change of probability of marking and logging of the node 1 hop from the sink in the first day.

Figure 16.

Figure 16

Change of probability of marking and logging of the node 1 hop from the sink in one week.

Figure 15 shows the change of probability of marking and logging of the node 1 hop from the sink in each hour of the first day. According to Figure 15, from 1 to 7 o’clock, (α, β)=(0.6, 0.9), from 8 to 13 o’clock, (α, β)=(1, 0) and from 14 to 24 o’clock, (α, β)=(0.6, 0.9). Therefore, (0.6, 0.9) is the best solution to ensure network security when the energy consumption is 7 wh and (1, 0) the best solution when the remaining battery level is high.

Figure 16 shows the change of probability of marking and logging of the node 1 hop from the sink in one week. The value of (α, β) is similar to that of the first day.

Based on Figure 14, Figure 15 and Figure 16 and Theorem 1, we can draw the amount of data sent by each node 1, 2 and 3 hops from the sink in the first day as shown in Figure 17. Figure 17 shows that the closer the node is to the sink; the more data is sent. According to Figure 15, in the period of 8–13 h, the probability of marking is high and the probability of logging is low. Therefore, in Figure 17, the amount of data during this period of 8–13 h is significantly greater than at other times. In order to maintain the level of battery remaining above 0 or a lower limit at any time, we must consider the change of the remaining battery level of the nodes. As shown in Figure 18, in 12 days, taking the nodes 1, 2 and 3 hops from the sink as examples, the level of battery remaining is always over 0 wh and the battery can be charged once a day. Based on the observation of Figure 18 and a further analysis, we find that the nodes farther from the sink have more remaining battery level at any time because they load fewer amounts of data and consume less energy. Therefore, if the battery of the node 1 hop from the sink can be kept in use, the same parameters can be applied to other nodes of the network to avoid the death of these nodes. According to Figure 17, we can also draw the change of the amount of notification received by the sink in the first day as shown in Figure 19. From 8 to 13 o’clock, the sink clearly receives a large amount of notification, and the network achieves favorable security.

Figure 17.

Figure 17

Amount of data sent by each node 1, 2 and 3 hops from the sink in the first day.

Figure 18.

Figure 18

Change of remaining battery level of each node 1, 2 and 3 hops from the sink in 12 days.

Figure 19.

Figure 19

Change of the amount of notification received by the sink on the first day.

5.2. Performance Comparison with the Traceback with Stationary Parameter Scheme

In the TBSR scheme, the probability of marking and logging will vary with the available energy, which results in effectively utilizing the energy and thereby improving network security and reliability. The traceback scheme in the paper adopts the fixed probability of marking and logging (traceback with stationary parameter scheme, known as the TWSP scheme). Next, we compare the performance of these two schemes in four aspects.

(1) Comparison of convergence time

The following compares the amount of marking received cumulatively by sink (actually also the comparison of convergence time):

Figure 20, Figure 21 and Figure 22 shows the comparison of convergence time between the TBSR scheme and the TWSP scheme. As shown in Figure 20, at the same moment, the sink receives more notification in the TBSR scheme than in the TWSP scheme, and as time elapses, the accumulated amount of notification received by the sink under the two schemes presents an increasing difference. Figure 21 shows the amount of notification received by the sink in the TBSR scheme further calculated based on Figure 20, which increases approximately 20% compared with the amount of notification received by the sink in the TWSP scheme. Figure 22 shows the length of accumulated notification received by the sink in the TBSR scheme after 12 days that is further calculated based on Figure 20, which is 8×109 greater than that in the TWSP scheme. When the sink in the network receives more notification, the convergence time index will be more favorable and the network will be more reliable, so the TBSR scheme has higher security.

Figure 20.

Figure 20

Comparison of the accumulated amount of notification received by the sink in the Trust-Based Secure Routing (TBSR) scheme and the Traceback with Stationary Parameter (TWSP) scheme.

Figure 21.

Figure 21

Time-based Change of accumulated amount of notification received by the sink in the TBSR scheme compared with that in the TWSP scheme.

Figure 22.

Figure 22

Shows the increase of the accumulated amount of notification received by the sink as time elapses in the TBSR scheme compared with that in the TWSP scheme.

(2) Comparison of accumulated energy consumption of nodes

Figure 23, Figure 24 and Figure 25 compare the accumulated energy consumption in the TBSR scheme and the TWSP scheme.

Figure 23.

Figure 23

Comparison of the accumulated energy consumption and available energy in the TBSR scheme and the TWSP scheme.

Figure 24.

Figure 24

Comparison of energy availability in the TBSR scheme and the TWSP scheme.

Figure 25.

Figure 25

Increase of energy availability in the TBSR scheme compared with that of the TWSP scheme.

As shown in Figure 23, at the same moment, the accumulated energy consumption in the TBSR scheme as time elapses is greater than that in the TWSP scheme because in the TBSR scheme, the probabilities of marking and logging are changeable. During the several hours in a day when the available energy is sufficient, we improve the probability of marking and reduce the probability of logging, so the node consumes more energy than it consumes at other times. However, in the TWSP scheme, the probabilities of marking and logging are fixed and selected based on the minimum available energy to avoid the death of the node. Further analysis shows that the nodes can make better use of the available energy in the TBSR scheme. As shown in Figure 24, the energy availability of the TWSP scheme is approximately 20%, but the energy availability of the TBSR scheme is as high as greater than 30%. Figure 25 shows the increase of energy availability in the TBSR scheme compared with that in the TWSP scheme. Figure 25 clearly shows that the availability is increased by approximately 11%. Therefore, the TBSR scheme has higher energy availability and better performance.

(3) Comparison of amount of notification stored in nodes

Figure 26 and Figure 27 compare the amount of notification stored in nodes in the TBSR scheme and the TWSP scheme.

Figure 26.

Figure 26

Comparison of the amount of notification stored in nodes in the TBSR scheme and the TWSP scheme.

Figure 27.

Figure 27

Storage space saved by the TBSR scheme in one day.

As shown in Figure 26, in the TBSR scheme, the amount of stored notification does not increase during a certain period because in this period, the probability of logging is 0 and no notification is stored. Figure 27 shows the storage space saved for nodes in the TBSR scheme compared with the TWSP scheme. As the figure shows, the length of notification saved by the TBSR scheme in one day is near 400. Therefore, the TBSR scheme can save more storage space and provide better performance.

(4) Comparison of success rate of routing

This section analyzes the calculation of arrival rates in the TWSP scheme and the TBSR scheme and a performance comparison of two schemes. As mentioned above, more notification will result in shorter convergence time and higher security during the traceback. In this case, the sink can find the secure transmission path more easily using the received notification. In other words, a greater probability of marking leads to higher trust, i.e., a greater success rate of the transmission of each hop.

Theorem 7.

Assume the source node sending the data packet has a distance of h hops from the sink and the number of hops of the data packet during horizontal routing is a random number in {1,𝒹}. The expected number of hops of the horizontal routing is 𝒹/2; therefore, the average number of hops for sending the data packet to the sink is h+𝒹/2. The routing process of a notice message is highly similar to that of a data packet, so the average number of hops for sending the notice message to the sink is also h+𝒹/2. Assuming the number of sent data packets is , the number of notice messages must be the same as that of data packets, i.e., . We adopt the TWSP scheme and the TBSR scheme for routing, respectively. Assuming the success rate of each hop in the TWSP scheme is p and the trust increased by the successful transmission of each hop in the TBSR scheme is , the arrival rate of a data packet is πh1 and πh2 respectively in the TWSP scheme and the TBSR scheme:

{πh1=1(1ph+𝒹/2)2πh2=1[1(p+)h+𝒹/2]2 (66)

Proof. 

In the TWSP scheme, the node has a distance of h+𝒹/2 hops from the sink, and the success rate of transmission of each hop is p. Therefore, the probability of each data packet or notification of successfully reaching the sink is ph+𝒹/2, the probability of each data packet or notification failing to reach the sink is 1ph+𝒹/2, the probability that all data packets and notification fail to reach the sink is (1ph+𝒹/2)2, and the probability that the sink receives at least one data packet or notification is 1(1ph+𝒹/2)2. Therefore, the success rate of routing is πh1=1(1ph+𝒹/2)2. In the TBSR scheme, the success rate of transmission of each hop is p+. Similarly, the success rate of routing can be determined: πh2=1[1(p+)h+𝒹/2]2.

Figure 28 and Figure 29 compare the success rate of routing in the TBSR scheme and the TWSP scheme. As the figure shows, the difference between the success rates of routing in the two schemes will be greater for nodes farther from the sink. As shown in Figure 28, when the nodes 10 hops from the sink send packets, the success rate of routing in the TBSR scheme is 15.09% higher than that in the TWSP scheme. Similarly, as shown in Figure 29, when nodes 10 hops from the sink send data packets, the success rate of routing in the TBSR scheme is 16.30% greater than that in the TWSP scheme.

Figure 28.

Figure 28

Comparison of success rate of routing of the TWSP scheme and the TBSR scheme when p=0.90, =0.03 and =2,𝒹=4.

Figure 29.

Figure 29

Comparison of success rate of routing of the TWSP scheme and the TBSR scheme when p=0.85, =0.03 and =2,𝒹=4.

According to the results of comparison of the above four aspects, the amount of notification received by the sink increases by approximately 20% in the TBSR scheme compared with that in the TWSP scheme, the energy availability increases by approximately 11%, the maximum storage capacity required by the node decreases by 33.33%, and the success rate of routing increases by approximately 16.30%. Therefore, the TBSR scheme has better performance.

6. Conclusions

In this paper, a secure routing scheme using the traceback approach for energy-harvesting sensor networks is proposed to maximize the use of available energy to improve data security and integrity. First, the aggregate signature approach is used to aggregate data and maintain data integrity. Then, a data and notification disjoint routing approach is proposed to improve the probability of the data reaching the sink safely. However, a scheme based only on these two approaches cannot determine the location of a malicious node. Therefore, in this paper, we propose a scheme integrating the traceback scheme and combining the ID-based aggregate signature approach with multi-path routing of data packets and notification, which not only reduces the energy consumption but also ensures data security and integrity. The improvements of the past traceback scheme proposed by this paper in the TBSR include the following: when available energy of nodes is sufficient, a higher probability of marking and a lower probability of logging are used. Thus, the sink can obtain more notification, which will improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. In contrast, when available energy of nodes is insufficient, a lower probability of marking and a higher probability of logging are used, which stores the notification on the nodes of the network instead of sending it to the sink immediately. Thus, when the level of battery remaining is low, less data is transmitted in the network, which saves energy. When the level of battery remaining is enough, the notification logged on the nodes of the network will be transmitted to the sink. This approach significantly improves the overall security of the system and energy availability. Finally, the TBSR scheme uses the malicious node location function based on traceback to reduce the trust of the malicious node and to guide the data to avoid the nodes with low trust to further improve the system security. The results of our strict theoretic analysis show that, compared with the ordinary traceback scheme (TWSP scheme), the TBSR scheme can increase the amount of notification received by the sink by approximately 20%, increase the energy availability by approximately 11%, reduce the maximum storage capacity of the node by 33.3% and improve the routing success rate by approximately 16.30%. It therefore has better performance.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (61772554, 61572526, 61572528), the National Basic Research Program of China (973 Program) (2014CB046305).

Author Contributions

J.T. designed the algorithms and wrote part of the manuscript. A.L. conceived of the work, designed the algorithms, and wrote part of the manuscript. J.Z., N.N. X., Z.Z. and T.W. commented on the paper.

Conflicts of interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

References

  • 1.Le Nguyen P., Ji Y., Liu Z., Vu H., Nguyen K.-V. Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing. Comput. Netw. 2017;129:232–250. [Google Scholar]
  • 2.Liu X., Zhao S., Liu A., Xiong N., Vasilakos A.V. Knowledge-aware Proactive Nodes Selection Approach for Energy management in Internet of Things. Future Gener. Comput. Syst. 2017 doi: 10.1016/j.future.2017.07.022. [DOI] [Google Scholar]
  • 3.Gui J., Deng J. Multi-hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality. IEEE Access. 2018 doi: 10.1109/ACCESS.2018.2796247. [DOI] [Google Scholar]
  • 4.Huang M., Liu A., Wang T., Huang C. Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things. Wirel. Commun. Mob. Comput. 2018;2018:9715428. doi: 10.1155/2018/9715428. [DOI] [Google Scholar]
  • 5.Chen X., Ma M., Liu A. Dynamic power management and adaptive packet size selection for IoT in e-Healthcare. Comput. Electr. Eng. 2017 doi: 10.1016/j.compeleceng.2017.06.010. [DOI] [Google Scholar]
  • 6.Liu Z., Tsuda T., Watanabe H., Ryuo S., Iwasawa N. Data Driven Cyber-Physical System for Landslide Detection. Mob. Netw. Appl. 2018 doi: 10.1007/s11036-018-0967-z. [DOI] [Google Scholar]
  • 7.Wu M., Wu Y., Liu X., Ma M., Liu A., Zhao M. Learning Based Synchronous Approach from Forwarding Nodes to Reduce the Delay for Industrial Internet of Things. EURASIP J. Wirel. Commun. Netw. 2018;2018:10. doi: 10.1186/s13638-017-1015-z. [DOI] [Google Scholar]
  • 8.Liu X., Xiong N., Zhang N., Liu A., Shen H., Huang C. A Trust with Abstract Information Verified Routing Scheme for Cyber-physical Network. IEEE Access. 2018;6:3882–3898. [Google Scholar]
  • 9.Tan J., Liu A., Zhao M., Shen H., Ma M. Cross Layer Design for Reducing Delay and Maximizing Lifetime in Industrial Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2018;2018 doi: 10.1186/s13638-018-1057-x. [DOI] [Google Scholar]
  • 10.Ota K., Dong M., Gui J., Liu A. QUOIN: Incentive Mechanisms for Crowd Sensing Networks. IEEE Netw. Mag. 2017 doi: 10.1109/MNET.2017.150015. [DOI] [Google Scholar]
  • 11.Zhu H., Xiao F., Sun L., Wang R., Yang P. R-TTWD: Robust Device-free Through-The-Wall Detection of Moving Human with WiFi. IEEE J. Sel. Areas Commun. 2017;35:1090–1103. [Google Scholar]
  • 12.Li J., Li Y.K., Chen X., Lee P.P.C., Lou W. A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 2015;26:1206–1216. [Google Scholar]
  • 13.Chen X., Li J., Weng J., Ma J., Lou W. Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 2016;65:3184–3195. [Google Scholar]
  • 14.Liu A., Huang M., Zhao M., Wang T. A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs. IEEE Access. 2018 doi: 10.1109/ACCESS.2018.2809556. [DOI] [Google Scholar]
  • 15.Li J., Li J., Chen X., Jia C., Lou W. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 2015;64:425–437. doi: 10.1109/TC.2013.208. [DOI] [Google Scholar]
  • 16.Ren Y., Liu A., Zhao M., Huang C., Wang T. A Quality Utilization Aware based Data Gathering for Vehicular Communication Networks. Wirel. Commun. Mob. Comput. 2018:6353714. doi: 10.1155/2018/6353714. [DOI] [Google Scholar]
  • 17.Liu Y., Ota K., Zhang K., Ma M., Xiong N., Liu A., Long J. QTSAC: A Energy efficient MAC Protocol for Delay Minimized in Wireless Sensor networks. IEEE Access. 2018 doi: 10.1109/ACCESS.2018.2809501. [DOI] [Google Scholar]
  • 18.Liu A., Chen Z., Xiong N. An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs. Inf. Sci. 2017 doi: 10.1016/j.ins.2017.09.036. [DOI] [Google Scholar]
  • 19.Liu X., Li G., Zhang S., Liu A. Big program code dissemination scheme for emergency software-define wireless sensor networks. Peer Peer Netw. Appl. 2017:1–22. doi: 10.1007/s12083-017-0565-5. [DOI] [Google Scholar]
  • 20.Manfredi S., Di Tucci E. Decentralized Control Algorithm for Fast Monitoring and Efficient Energy Consumption in Energy Harvesting Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2017;13:1513–1520. [Google Scholar]
  • 21.Badawy G.H., Sayegh A.A., Todd T.D. Energy provisioning in solar-powered wireless mesh networks. IEEE Trans. Veh. Technol. 2010;59:3859–3871. [Google Scholar]
  • 22.Valera A.C., Soh W.S., Tan H.P. Energy-neutral scheduling and forwarding in environmentally-powered wireless sensor networks. Ad Hoc Netw. 2013;11:1202–1220. [Google Scholar]
  • 23.Peng S., Low C.P. Prediction free energy neutral power management for energy harvesting wireless sensor nodes. Ad Hoc Netw. 2014;13:351–367. [Google Scholar]
  • 24.Niyato D., Hossain E., Rashid M.M., Bhargava V.K. Wireless sensor networks with energy harvesting technologies: A game-theoretic approach to optimal energy management. IEEE Trans. Wirel. Commun. 2007;14:90–96. [Google Scholar]
  • 25.Kansal A., Hsu J., Zahedi S., Srivastava M.B. Power management in energy harvesting sensor networks. ACM Trans. Embed. Comput. Syst. 2007;6 doi: 10.1145/1274858.1274870. [DOI] [Google Scholar]
  • 26.Vigorito C.M., Ganesan D., Barto A.G. Adaptive control of duty cycling in energy-harvesting wireless sensor networks; Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON’07; San Diego, CA, USA. 18–21 June 2007; pp. 21–30. [Google Scholar]
  • 27.Liu X., Dong M., Ota K., Yang L.T., Liu A. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. 2016 doi: 10.1016/j.jcss.2016.09.008. [DOI] [Google Scholar]
  • 28.Bhuiyan M.Z.A., Wu J., Wang G., Wang T., Hassan M.M. e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems. ACM Trans. Auton. Adapt. Syst. 2017;12 doi: 10.1145/2994150. [DOI] [Google Scholar]
  • 29.Zhang H., Cai Z., Liu Q., Xiao Q., Li Y., Cheang C. A Survey on Security-aware Measurement in SDN. Secur. Commun. Netw. 2018;2018:2459154. doi: 10.1155/2018/2459154. [DOI] [Google Scholar]
  • 30.Jiang W., Wang G., Bhuiyan M.Z.A., Wu J. Understanding graph-based trust evaluation in online social networks: Methodologies and challenges. ACM Comput. Surv. 2016;49 doi: 10.1145/2906151. [DOI] [Google Scholar]
  • 31.Xu J., Liu A., Xiong N., Wang T., Zuo Z. Integrated Collaborative Filtering Recommendation in Social Cyber-Physical Systems. Int. J. Distrib. Sens. Netw. 2017;13:1550147717749745. doi: 10.1177/1550147717749745. [DOI] [Google Scholar]
  • 32.Dong M., Ota K., Yang L.T., Liu A., Guo M. LSCD: A Low Storage Clone Detecting Protocol for Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2016;35:712–723. [Google Scholar]
  • 33.Xiao B., Yu B., Gao C. CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 2007;67:1218–1230. [Google Scholar]
  • 34.Sun H.M., Chen C.M., Hsiao Y.C. An efficient countermeasure to the selective forwarding attack in wireless sensor networks; Proceedings of the TENCON 2007 IEEE Region 10 Conference; Taipei, Taiwan. 30 October–2 November 2007; pp. 1–4. [Google Scholar]
  • 35.Liu A., Liu X., Li H., Long J. MDMA: A multi-data and multi-ACK verified Selective Forwarding Attack Detection Scheme in WSNs. IEICE Trans. Inf. Syst. 2016;E99-D:2010–2018. [Google Scholar]
  • 36.Liu Q., Liu A. On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electr. Eng. 2017 doi: 10.1016/j.compeleceng.2017.03.004. [DOI] [Google Scholar]
  • 37.Ma F., Liu X., Liu A., Zhao M., Huang C., Wang T. A Time and Location Correlation Incentive Scheme for Deeply Data Gathering in Crowdsourcing Networks. Wirel. Commun. Mob. Comput. 2018;2018:8052620. doi: 10.1155/2018/8052620. [DOI] [Google Scholar]
  • 38.Bhuiyan M.Z.A., Wang G., Wu J., Cao J., Liu X., Wang T. Dependable structural health monitoring using wireless sensor networks. IEEE Trans. Dependable Secur. Comput. 2017;14:363–376. [Google Scholar]
  • 39.Dai H., Chen G., Wang C., Wang S., Wu X., Wu F. Quality of Energy Provisioning for Wireless Power Transfer. IEEE Trans. Parallel Distrib. Syst. 2014;26:527–537. [Google Scholar]
  • 40.Li J., Chen X., Huang X., Tang S., Xiang Y., Hassan M.M., Alelaiwi A. Secure distributed deduplication systems with improved reliability. IEEE Trans. Comput. 2015;64:3569–3579. [Google Scholar]
  • 41.Wang J., Liu A., Yan T., Zeng Z. A resource allocation model based on double-sided combinational auctions for transparent computing. Peer Peer Netw. Appl. 2017 doi: 10.1007/s12083-017-0556-6. [DOI] [Google Scholar]
  • 42.Teng H., Liu X., Liu A., Shen H., Huang C., Wang T. Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor based Networks. Wirel. Commun. Mob. Comput. 2018;2018:2068375. doi: 10.1155/2018/2068375. [DOI] [Google Scholar]
  • 43.Peng S., Low C.P. Throughput optimal energy neutral management for energy harvesting wireless sensor networks; Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC 2012); Paris, France. 1–4 April 2012; pp. 2347–2351. [Google Scholar]
  • 44.Sun W., Cai Z., Li Y., Liu F., Fang S., Wang G. Security and Privacy in the Medical Internet of Things. Secur. Commun. Netw. 2018:5978636. doi: 10.1155/2018/5978636. [DOI] [Google Scholar]
  • 45.Ettus M. System capacity, latency, and power consumption in multihop-routed SS-CDMA wireless networks; Proceedings of the IEEE InRadio and Wireless Conference, RAWCON 98; Colorado Springs, CO, USA. 9–12 August 1998; pp. 55–58. [Google Scholar]
  • 46.Zytoune O., Aboutajdine D. A uniform balancing energy routing protocol for wireless sensor networks. Wirel. Pers. Commun. 2010;55:147–161. [Google Scholar]
  • 47.Cheng B.C., Chen H., Li Y.J., Tseng R.Y. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks. Comput. Commun. 2008;31:4352–4359. [Google Scholar]
  • 48.Xu J., Zhou X., Yang F. Traceback in wireless sensor networks with packet marking and logging. Front. Comput. Sci. China. 2011;5:308–315. [Google Scholar]
  • 49.Khan S., Loo K. Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks. Netw. Secur. 2009:9–16. [Google Scholar]
  • 50.Karlof C., Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 2003;1:293–315. [Google Scholar]
  • 51.Yang G., He S., Shi Z. Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks. IEEE Internet Things J. 2017;4:330–339. [Google Scholar]
  • 52.Huang C., Ma M., Liu X., Liu A., Zuo Z. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs. Sensors. 2017;17:1418. doi: 10.3390/s17061418. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 53.Cheng B.C., Chen H., Liao G.T. FBT: An efficient traceback scheme in hierarchical wireless sensor network. Secur. Commun. Netw. 2009;2:133–144. [Google Scholar]
  • 54.Liu Y., Liu A., He S. A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs. AEU Int. J. Electron. Commun. 2015;69:1464–1482. [Google Scholar]
  • 55.Gui J., Zhou K. Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. J. Netw. Syst. Manag. 2016;24:789–812. [Google Scholar]
  • 56.Kong Q., Lu R., Ma M., Bao H. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing. Sensors. 2017;17:1829. doi: 10.3390/s17081829. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 57.Deng R., Xiao G., Lu R., Liang H., Vasilakos A.V. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey. IEEE Trans. Ind. Inform. 2017;13:411–423. [Google Scholar]
  • 58.Tang J., Liu A., Zhao M., Wang T. An Aggregate Signature based Trust Routing for Data Gathering in Sensor Networks. Secur. Commun. Netw. 2018;2018:6328504. doi: 10.1155/2018/6328504. [DOI] [Google Scholar]
  • 59.Shen L., Ma J., Liu X., Wei F., Miao M. A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Int. Things J. 2017;4:546–554. [Google Scholar]
  • 60.Canyon Solar Raditaion Dataset TEXAS Solar Radiation Database. Retrived on 1st May 2013. [(accessed on 1 October 2017)]; Available online: http://www.me.utexas.edu/solarlab/data/canyon/index.html.

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES