A Novel Cluster Based Survivable Routing Protocol for Wireless Sensor Network

Article Preview

Abstract:

Sensor nodes easily suffer from failure, attack or capture because of the limited energy, storage, communication ability, complex and severe network environment when WSN is applied to emergency or battlefield environment. Thus, the basic scout mission is influenced. In this paper, a survivability route protocol named SRPC in cluster-based WSN is put forward. The protocol uses key negotiation and identity authentication mechanism to resist the attacks of malicious nodes; when the main cluster head is destroyed, monitoring data will be transmitted to the base station by the backup cluster head chain. The simulation results show that, SRPC protocol can not only resist the attacks of the enemy malicious nodes based on energy balance, but also assure reliable delivery of the packets after the cluster head is attacked or destroyed. As a result, the survivable ability of WSN in battlefield is improved.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5577-5581

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yi Xu. The principle and method of wireless sensor network [M]. Beijng: Tsinghua University press, (2012).

Google Scholar

[2] LU Gang, ZHOU Ming-Tian, SHE Kun, et al. Life time Analys is on Routing Protocols of Wireless Sensor Networks[J]. Journal of Software, 2009,20(2):375-393.

Google Scholar

[3] J Sterbenz, R Krishnan, R Hain, etal. Survivable mobile wireless networks: issues, challenges and research directions [A]. ACM Workshop on Wireless Security [C], Atlanta, USA, Sep, 2002: 31-40.

DOI: 10.1145/570681.570685

Google Scholar

[4] Kui Ren, Kai Zeng, Wenjing Lou. On efficient key pre-distribution in large scale WSNs[C]. Military Communications Conference, 2005. MILCOM 2005. IEEE 2005:20-26.

DOI: 10.1109/milcom.2005.1605657

Google Scholar

[5] Yanchun Yang, Kefei Chen. Secure LEACH routing protocol for wireless sensor networks based on one-way hash chain[J]. Computer Engineering and Design, 2009, 30(20): 4620-4623.

Google Scholar

[6] Chengfa Li, Guihai Chen. A routing protocol for wireless sensor networks based on nonuniform clustering [J]. Computer Journal, 2007, 30 (1): 88-91.

Google Scholar

[7] Chengyue Li, Xuanjing Shen, Haipeng Chen, etc. Research on improving LEACH routing algorithm in wireless sensor network [J]. Journal of Transducer Technology, 2010, 23 (8): 1163-1167.

Google Scholar