
Research Article
TMER: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network
- @INPROCEEDINGS{10.1007/978-3-030-17513-9_11, author={Weidong Fang and Wuxiong Zhang and Wei Chen and Yang Liu and Chaogang Tang}, title={TMER: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network}, proceedings={5G for Future Wireless Networks. Second EAI International Conference, 5GWN 2019, Changsha, China, February 23-24, 2019, Proceedings}, proceedings_a={5GWN}, year={2019}, month={4}, keywords={5G Industrial wireless sensor network Fog computing Secure routing protocol Trust management}, doi={10.1007/978-3-030-17513-9_11} }
- Weidong Fang
 Wuxiong Zhang
 Wei Chen
 Yang Liu
 Chaogang Tang
 Year: 2019
 TMER: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network
 5GWN
 Springer
 DOI: 10.1007/978-3-030-17513-9_11
Abstract
Fog-assisted Industrial Wireless Sensor Network (F-IWSN) is a novel wireless sensor network (WSN) in the industry. It not only can more efficiently reduce information transmission latency, but also can more conducively achieve real-time control and rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially from internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the analytic hierarchy process is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node. Namely, Trust Management-based Energy Efficient Routing Scheme (TMER). In addition, GDTMS is also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms, it can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.


