A Secure Energy-Efficient Routing Protocol for WSN

  • Al-Sakib Khan Pathan
  • Choong Seon Hong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4742)

Abstract

The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sink-rooted tree in the network which is used for secure data transmissions from the source sensors to the base station. We mainly focus on ensuring authenticity and confidentiality of the sensor reports by adopting one-way hash chain and pre-loaded shared secret keys. To achieve data freshness, there is an optional key refreshment mechanism in our protocol. Along with the detailed description of our protocol, we present an analysis and performance evaluation of our proposal.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Net-works: A Survey. Computer Networks 38, 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Dai, S., Jing, X., Li, L.: Research and analysis on routing protocols for wireless sensor networks. In: Proc. of Int. Conf. on Comm. Circuits and Systems, vol. 1, pp. 407–411 (2005)Google Scholar
  3. 3.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, 293–315 (September 2003)Google Scholar
  4. 4.
    Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proc. of the 8th IEEE ICACT 2006, Korea, vol. II, pp. 1043–1048 (2006)Google Scholar
  5. 5.
    Çam, H., Özdemir, S., Muthuavinashiappan, D., Nair, P.: Energy Efficient Security Protocol for Wireless Sensor Networks. Proc. of IEEE VTC 5, 2981–2984 (2003)Google Scholar
  6. 6.
    Çam, H., Özdemir, S., Nair, P., Muthuavinashiappan, D., Sanli, H.O.: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4), 446–455 (2006)CrossRefGoogle Scholar
  7. 7.
    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE Jrnl. on Selected Areas in Communications 23(4), 839–850 (2005)CrossRefGoogle Scholar
  8. 8.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of S&P, pp. 259–271 (2004)Google Scholar
  9. 9.
    Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In: Proc. of HICSS, pp. 3005–3014 (2000)Google Scholar
  11. 11.
    Azzedine, B., Xiuzhen, C., Joseph, L.: Energy-aware data-centric routing in microsensor networks. In: Proceedings of the 8th MSWiM 03, San Diego, pp. 42–49 (2003)Google Scholar
  12. 12.
    Hyunh, T.T., Hong, C.S.: An Energy*Delay Efficient Multi-Hop Routing Scheme for Wireless Sensor Networks. IEICE Trans. on Info. & Sys. E89-D(5), 1654–1661 (2006)CrossRefGoogle Scholar
  13. 13.
    Yin, C., Huang, S., Su, P., Gao, C.: Secure routing for large-scale wireless sensor networks. In: Proceedings of IEEE ICCT 2003, 9-11 April 2003, vol. 2, pp. 1282–1286. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  14. 14.
    Xbow Sensor Networks, Available at: http://www.xbow.com/
  15. 15.
    Hass, Z.J.: Design methodologies for adaptive and multimedia networks. IEEE Communications Magazine 39(11), 106–107 (2001)CrossRefGoogle Scholar
  16. 16.
    Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions in Wireless Communications 1(4), 660–670 (2002)CrossRefGoogle Scholar
  17. 17.
    Lamport, L.: Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International (October 1979)Google Scholar
  18. 18.
    The Network Simulator - ns-2, http://www.isi.edu/nsnam/ns/
  19. 19.
    Coppersmith, D., Jakobsson, M.: Almost Optimal Hash Sequence Traversal. In: 6th International Financial Cryptography 2002, Bermuda (March2002)Google Scholar
  20. 20.
    Jakobsson, M.: Fractal hash sequence representation and traversal. In: 2002 IEEE International Symposium on Information Theory, Switzerland. IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  21. 21.
    Sella, Y.: On the computation-storage trade-offs of hash chain traversal. In: The 7th International Financial Cryptography Conference, Guadeloupe (January 2003)Google Scholar
  22. 22.
    Mamun-Or-Rashid, Md., Alam, M.M., Hong, C.S.: Energy Efficient Routing for Highly Dense Sensor Networks Based on Residual Energy and Distance. In: Proc. of IEEE ICNEWS, Dhaka, Bangladesh, pp. 52–56 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Al-Sakib Khan Pathan
    • 1
  • Choong Seon Hong
    • 1
  1. 1.Department of Computer Engineering, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi, 449-701South Korea

Personalised recommendations