Enhancements of Authenticated Differentiated Pre-distribution Key Methodology Based on GPSR
Wireless sensor network consists of plentiful energy and computing power-constrained tiny sensor nodes. On the basis of the protection of security, the main goal of our study is to maintain the network life time at a maximum with the appropriate routing protocol. In this article, we will propose a new routing algorithm on the basis of the original routing algorithm. Considering the security of the wireless sensor network, the residual energy of nodes as well as issues such as physical distance, we try to extend the maximum lifetime of a wireless sensor network with all the combination of these factors for routing. This energy-balance routing algorithm takes into account the number of pre-distributed shared keys between the sending node and receiving node, the residual energy of the receiving node and the physical distance between two nodes in order to protect the security at the same time, to maintain the network life time at a maximum.
KeywordsWSN Energy saving Life time RKP
This research is supported by National Natural Science Foundation of China under Grant 61071076, the National High-tech Research and Development Plans (863 Program) under Grant 2011AA010104-2, the Beijing Municipal Natural Science Foundation under Grant 4132057.
- 1.Du W et al (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings 10th ACM conference computer and communication security, Oct 2003, pp 42–51Google Scholar
- 2.Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings 9th ACM conference computer and communication security. Security, Nov. 2002, pp 41–47Google Scholar
- 3.Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. Department of Electrical and Computer Engineering, Paper 20Google Scholar
- 4.Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu and Tom La Porta (2006) Establishing pair-wise keys in heterogeneous sensor networks. In: INFOCOM 2006. Proceedings 25th IEEE international conference on computer communicationsGoogle Scholar
- 5.Poornima AS, Amberker BB (2008) Tree-based key management scheme for heterogeneous sensor networks. In: Networks, 2008. ICON 2008. 16th IEEE international conference on 2008Google Scholar
- 6.Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. In: The 11th IEEE international conference on network protocols, IEEE, 2003Google Scholar
- 7.Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the IEEE security and privacy symposium 2003, May 2003Google Scholar
- 8.Wu CX, Liu Y (2012) WSN on-demand multipath routing protocol based on energy-aware. In: Comput Eng 38(9)Google Scholar
- 9.Gu W, Dutta N, Chellappan S, Bai X (2011) Providing end-to-end secure communications in wireless sensor networks. IEEE Trans Netw Serv Manag 8(3):205–218Google Scholar
- 10.Camilo T, Carreto C, Silva J, Boavida F (2006) An energy-efficient ant base routing algorithm for wireless sensor networks. In: ANTS 2006—Fifth international workshop on ant colony optimization and swarm intelligence, 4150, pp 49–59Google Scholar
- 11.Okdem S, Karaboga D (2006) Routing in wireless sensor networks using ant colony optimization. In: First NASA/ESA conference on adaptive hardware and systems—AHS, pp 401–404Google Scholar
- 12.Xue J, Qi X, Wang C (2011) An energy-balance routing algorithm based on node classification for wireless sensor networks. J Comput Inf Syst 7:2277–2284Google Scholar