A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network

Cyber-physical network (CPN) as well as cyber-physical social computing and networking (CPSCN), as the next generation of computing and networking, utilize a wide variety of sensing devices with significant sensing capabilities. However, it face huge challenge that data packet is transmitted to dest...

Full description

Bibliographic Details
Main Authors: Xiao Liu, Naixue Xiong, Ning Zhang, Anfeng Liu, Hailan Shen, Changqin Huang
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8272323/
_version_ 1818644416674398208
author Xiao Liu
Naixue Xiong
Ning Zhang
Anfeng Liu
Hailan Shen
Changqin Huang
author_facet Xiao Liu
Naixue Xiong
Ning Zhang
Anfeng Liu
Hailan Shen
Changqin Huang
author_sort Xiao Liu
collection DOAJ
description Cyber-physical network (CPN) as well as cyber-physical social computing and networking (CPSCN), as the next generation of computing and networking, utilize a wide variety of sensing devices with significant sensing capabilities. However, it face huge challenge that data packet is transmitted to destination security. Data packets can be dropped by malicious nodes in CPN/CPSCN, causing serious damage to the network. Thus, ensuring the security of data transmission is a crucial issue for wireless sensor networks which is one of the important component of CPN/CPSCN. In this paper, a trust with abstract information verified (TAIV) routing scheme is proposed to improve the data packet arrival ratio. In the TAIV scheme, backbone routing paths are created by constructing an optimal connected dominating set (CDS). CDS routing ensures communication among all nodes in the network. In addition, as the source node sends the data packet to the destination through the backbone routing path, the abstract information is also transmitted to the destination through the auxiliary routing path to allow the destination node to know whether data has been sent to it. Depending on whether the data packet is transmitted to the destination or dropped by the malicious node and whether the abstract message is transmitted to the destination successfully, the destination will reduce or increase the trust in nodes in this routing path accordingly. After a period of time, the trust information of nodes will be diffused by information exchange. If the trust information is sufficient, the malicious node, whose trust is lower than that of the normal node, will be identified and eliminated from the backbone routing path, reducing the number of malicious nodes in the backbone. Thus, the data packet arrival ratio will be improved. The theoretical analysis shows that compared with the previous scheme, the data packet arrival ratio increases by 4.251%-80.208%, and nearly all malicious nodes are identified while retaining long network lifetime.
first_indexed 2024-12-17T00:14:30Z
format Article
id doaj.art-5d85f1f246a6457692d6c6a903c1d8f9
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T00:14:30Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-5d85f1f246a6457692d6c6a903c1d8f92022-12-21T22:10:44ZengIEEEIEEE Access2169-35362018-01-0163882389810.1109/ACCESS.2018.27996818272323A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical NetworkXiao Liu0https://orcid.org/0000-0003-1933-7669Naixue Xiong1https://orcid.org/0000-0002-0394-4635Ning Zhang2Anfeng Liu3https://orcid.org/0000-0001-5190-4761Hailan Shen4Changqin Huang5School of Information Science and Engineering, Central South University, Changsha, ChinaSchool of Information Science and Engineering, Central South University, Changsha, ChinaDepartment of Computer Sciences, Texas A&M University at Corpus Christi, Corpus Christi, TX, USASchool of Information Science and Engineering, Central South University, Changsha, ChinaSchool of Information Science and Engineering, Central South University, Changsha, ChinaSchool of Information Technology in Education, South China Normal University, Guangzhou, ChinaCyber-physical network (CPN) as well as cyber-physical social computing and networking (CPSCN), as the next generation of computing and networking, utilize a wide variety of sensing devices with significant sensing capabilities. However, it face huge challenge that data packet is transmitted to destination security. Data packets can be dropped by malicious nodes in CPN/CPSCN, causing serious damage to the network. Thus, ensuring the security of data transmission is a crucial issue for wireless sensor networks which is one of the important component of CPN/CPSCN. In this paper, a trust with abstract information verified (TAIV) routing scheme is proposed to improve the data packet arrival ratio. In the TAIV scheme, backbone routing paths are created by constructing an optimal connected dominating set (CDS). CDS routing ensures communication among all nodes in the network. In addition, as the source node sends the data packet to the destination through the backbone routing path, the abstract information is also transmitted to the destination through the auxiliary routing path to allow the destination node to know whether data has been sent to it. Depending on whether the data packet is transmitted to the destination or dropped by the malicious node and whether the abstract message is transmitted to the destination successfully, the destination will reduce or increase the trust in nodes in this routing path accordingly. After a period of time, the trust information of nodes will be diffused by information exchange. If the trust information is sufficient, the malicious node, whose trust is lower than that of the normal node, will be identified and eliminated from the backbone routing path, reducing the number of malicious nodes in the backbone. Thus, the data packet arrival ratio will be improved. The theoretical analysis shows that compared with the previous scheme, the data packet arrival ratio increases by 4.251%-80.208%, and nearly all malicious nodes are identified while retaining long network lifetime.https://ieeexplore.ieee.org/document/8272323/Wireless sensor networkstrustmalicious nodesdata packet arrival rationetwork lifetime
spellingShingle Xiao Liu
Naixue Xiong
Ning Zhang
Anfeng Liu
Hailan Shen
Changqin Huang
A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network
IEEE Access
Wireless sensor networks
trust
malicious nodes
data packet arrival ratio
network lifetime
title A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network
title_full A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network
title_fullStr A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network
title_full_unstemmed A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network
title_short A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network
title_sort trust with abstract information verified routing scheme for cyber physical network
topic Wireless sensor networks
trust
malicious nodes
data packet arrival ratio
network lifetime
url https://ieeexplore.ieee.org/document/8272323/
work_keys_str_mv AT xiaoliu atrustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT naixuexiong atrustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT ningzhang atrustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT anfengliu atrustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT hailanshen atrustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT changqinhuang atrustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT xiaoliu trustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT naixuexiong trustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT ningzhang trustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT anfengliu trustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT hailanshen trustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork
AT changqinhuang trustwithabstractinformationverifiedroutingschemeforcyberphysicalnetwork