A Secure and Energy-Efficient Rooting Protocol for WSN

Article Preview

Abstract:

In directed diffusion rooting protocol, interest and exploratory data are disseminated by flooding, which will bring broadcast storm resulting in substantial energy consumption of wireless sensor networks. Grid-based directed diffusion rooting protocol can improve energy efficiency where geographic grids are constructed by self-organization of nodes using location information. Flooding of interest and exploratory data is limited in grid head nodes. But grid-based directed diffusion rooting protocol considers less about security. To adapt to environments with high security requirements, traffic attack detection and secure data aggregation schemes are added to grid-based directed diffusion rooting protocol. Simulation shows that the proposed schemes can real-time predict traffic attacks and improve accuracy of data aggregation results when networks are under attacks. At the same time, the protocol consumes less energy and extends lifetime of networks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1699-1704

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Intanagonwiwat C, Govindan R, Estrin D, Heidemann J, Directed diffusion for wireless sensor networking, IEEE Transactions on Networking, vol. 11, pp.2-16, (2003).

DOI: 10.1109/tnet.2002.808417

Google Scholar

[2] Bi Jiana, Ji Zhenzhou, Cao Zhiyan, Grid-based directed diffusion for wireless sensor networks, High Technology Letters, vol. 14, pp.342-347, (2008).

Google Scholar

[3] B. T, M. H, A Self-healing Key Distribution Scheme with Novel Properties, International Journal of Network Security, vol. 7, pp.115-120, (2008).

Google Scholar

[4] Rajasegarar S, Leckie C, Palaniswami M, Bezdek J C, Distributed anomaly detection in wireless sensor netwoks, In: 10th IEEE Singapore International Conference of Communication System, Singapore, pp.1-5, (2006).

DOI: 10.1109/iccs.2006.301508

Google Scholar

[5] Hur J, Lee Y, Hong SM, Yoon H, Trust-Based Secure Aggregation in Wireless Sensor Networks, In: 3rd International Conference on Computing, Communications and Control Technologies, Austin, USA, pp.491-496, (2005).

Google Scholar

[6] R. Roman, and J. Zhou, Applying Intrusion Detection Systems to Wireless Sensor Networks, Consumer Communications and Networking Conference, vol. 16, Jan. 2006, pp.640-644.

DOI: 10.1109/ccnc.2006.1593102

Google Scholar

[7] J. Deng, R. Han. Defending against Path-based DoS Attacks in Wireless Sensor Networks, Proc. the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Dec. 2005, pp.89-96.

DOI: 10.1145/1102219.1102235

Google Scholar

[8] C. Su, K. Chang, and Y. Kuo, The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks, Proc. IEEE Wireless Communications and Networking Conference, IEEE Press, Mar. 2005, p.1927-(1932).

DOI: 10.1109/wcnc.2005.1424814

Google Scholar