Energy-Efficient Secure Routing Protocol for Wireless Sensor Networks


Article Preview

In view of the problems of limited energy of the nodes and threat to routing security in wireless sensor networks, Energy-efficient Secure Routing Protocol (ESRP), an energy-efficient secure routing protocol for wireless sensor networks, is proposed. According to the structured topology of hexagonal mesh, hops at different directions are calculated on the optimal route for transmitting data packets in ESRP. With the help of characters of hops, the nodes can rapidly find a route among multiple optimal routes by the policy of the twice probability routing selection. Data breach is prevented by data encryption and data security is realized by one-way hash key chain and symmetric key authentication. Analysis and simulation results show that ESRP has better performance on security and saving energy.



Edited by:

Dehuai Zeng






X. S. Wang et al., "Energy-Efficient Secure Routing Protocol for Wireless Sensor Networks", Advanced Materials Research, Vol. 159, pp. 17-22, 2011

Online since:

December 2010




[1] Chen X, Makki K, Yen K, Pissinou N, Sensor network security: A survey, IEEE Communications Surveys and Tutorials, 2009, 11(2): 52-73.

DOI: 10.1109/surv.2009.090205

[2] Karp B, Kung HT, GPSR: Greedy Perimeter Stateless Routing for wireless networks. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, ACM, New York, NY, USA, Boston, MA, USA, 2000, pp.243-254.

DOI: 10.1145/345910.345953

[3] Li W, Chen M, Li M, Information Security Routing Protocol in the WSN. 2009 IAS '09 Fifth International Conference on Information Assurance and Security, 2009, pp.651-656.

DOI: 10.1109/ias.2009.260

[4] Perrig A, Szewczyk R, Wen V, Culler DE, Tygar JD, SPINS: Security protocols for sensor networks, Wireless Networks, 2002, 8(5): 521-534.

DOI: 10.1023/a:1016598314198

[5] Deng J, Han R, Mishra S, INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, 2006, 29(2): 216-230.

DOI: 10.1016/j.comcom.2005.05.018

[6] Xiao B, Yu B, Gao C, CHEMAS: Identify suspect nodes in selective forwarding attacks, Journal of Parallel and Distributed Computing, 2007, 67(11): 1218-1230.

DOI: 10.1016/j.jpdc.2007.04.014

[7] Santi P, Topology control in wireless ad hoc and sensor networks, ACM Computing Surveys, 2005, 37(2): 164-194.

DOI: 10.1145/1089733.1089736

[8] Wang X-s, Zhan Y-z, Wang L-m, STCP: Secure Topology Control Protocol for Wireless Sensor Networks Based on Hexagonal Mesh. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 2008 WiCOM '08, IEEE Computer Society, 2008, pp.1-4.

DOI: 10.1109/wicom.2008.872

[9] Wang X, Berger T, Self-organizing redundancy-cellular architecture for wireless sensor networks. IEEE Wireless Communications and Networking Conference, WCNC, Institute of Electrical and Electronics Engineers Inc., New Orleans, LA, United States, 2005, p.1945-(1951).

DOI: 10.1109/wcnc.2005.1424817

[10] Karlof C, Wagner D, Secure routing in wireless sensor networks: Attacks and countermeasures, Ad Hoc Networks, 2003, 1(2-3): 293-315.

DOI: 10.1016/s1570-8705(03)00008-8

[11] Heinzelman WB, Chandrakasan AP, Balakrishnan H, An application-specific protocol architecture for wireless microsensor networks, IEEE Transactions on Wireless Communications, 2002, 1(4): 660-670.

DOI: 10.1109/twc.2002.804190

In order to see related information, you need to Login.