Research Article
TMER: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network
@INPROCEEDINGS{10.1007/978-3-030-17513-9_11, author={Weidong Fang and Wuxiong Zhang and Wei Chen and Yang Liu and Chaogang Tang}, title={TMER: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network}, proceedings={5G for Future Wireless Networks. Second EAI International Conference, 5GWN 2019, Changsha, China, February 23-24, 2019, Proceedings}, proceedings_a={5GWN}, year={2019}, month={4}, keywords={5G Industrial wireless sensor network Fog computing Secure routing protocol Trust management}, doi={10.1007/978-3-030-17513-9_11} }
- Weidong Fang
Wuxiong Zhang
Wei Chen
Yang Liu
Chaogang Tang
Year: 2019
TMER: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network
5GWN
Springer
DOI: 10.1007/978-3-030-17513-9_11
Abstract
Fog-assisted Industrial Wireless Sensor Network (F-IWSN) is a novel wireless sensor network (WSN) in the industry. It not only can more efficiently reduce information transmission latency, but also can more conducively achieve real-time control and rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially from internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the analytic hierarchy process is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node. Namely, Trust Management-based Energy Efficient Routing Scheme (TMER). In addition, GDTMS is also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms, it can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.