Abstract
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sink-rooted tree in the network which is used for secure data transmissions from the source sensors to the base station. We mainly focus on ensuring authenticity and confidentiality of the sensor reports by adopting one-way hash chain and pre-loaded shared secret keys. To achieve data freshness, there is an optional key refreshment mechanism in our protocol. Along with the detailed description of our protocol, we present an analysis and performance evaluation of our proposal.
This work was supported by the MIC and ITRC. Dr. C.S. Hong is the corresponding author.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Net-works: A Survey. Computer Networks 38, 393–422 (2002)
Dai, S., Jing, X., Li, L.: Research and analysis on routing protocols for wireless sensor networks. In: Proc. of Int. Conf. on Comm. Circuits and Systems, vol. 1, pp. 407–411 (2005)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, 293–315 (September 2003)
Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proc. of the 8th IEEE ICACT 2006, Korea, vol. II, pp. 1043–1048 (2006)
Çam, H., Özdemir, S., Muthuavinashiappan, D., Nair, P.: Energy Efficient Security Protocol for Wireless Sensor Networks. Proc. of IEEE VTC 5, 2981–2984 (2003)
Çam, H., Özdemir, S., Nair, P., Muthuavinashiappan, D., Sanli, H.O.: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4), 446–455 (2006)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE Jrnl. on Selected Areas in Communications 23(4), 839–850 (2005)
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proceedings of S&P, pp. 259–271 (2004)
Lee, H.Y., Cho, T.H.: Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds.) ICDCIT 2006. LNCS, vol. 4317, pp. 116–127. Springer, Heidelberg (2006)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In: Proc. of HICSS, pp. 3005–3014 (2000)
Azzedine, B., Xiuzhen, C., Joseph, L.: Energy-aware data-centric routing in microsensor networks. In: Proceedings of the 8th MSWiM 03, San Diego, pp. 42–49 (2003)
Hyunh, T.T., Hong, C.S.: An Energy*Delay Efficient Multi-Hop Routing Scheme for Wireless Sensor Networks. IEICE Trans. on Info. & Sys. E89-D(5), 1654–1661 (2006)
Yin, C., Huang, S., Su, P., Gao, C.: Secure routing for large-scale wireless sensor networks. In: Proceedings of IEEE ICCT 2003, 9-11 April 2003, vol. 2, pp. 1282–1286. IEEE Computer Society Press, Los Alamitos (2003)
Xbow Sensor Networks, Available at: http://www.xbow.com/
Hass, Z.J.: Design methodologies for adaptive and multimedia networks. IEEE Communications Magazine 39(11), 106–107 (2001)
Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions in Wireless Communications 1(4), 660–670 (2002)
Lamport, L.: Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International (October 1979)
The Network Simulator - ns-2, http://www.isi.edu/nsnam/ns/
Coppersmith, D., Jakobsson, M.: Almost Optimal Hash Sequence Traversal. In: 6th International Financial Cryptography 2002, Bermuda (March2002)
Jakobsson, M.: Fractal hash sequence representation and traversal. In: 2002 IEEE International Symposium on Information Theory, Switzerland. IEEE Computer Society Press, Los Alamitos (2002)
Sella, Y.: On the computation-storage trade-offs of hash chain traversal. In: The 7th International Financial Cryptography Conference, Guadeloupe (January 2003)
Mamun-Or-Rashid, Md., Alam, M.M., Hong, C.S.: Energy Efficient Routing for Highly Dense Sensor Networks Based on Residual Energy and Distance. In: Proc. of IEEE ICNEWS, Dhaka, Bangladesh, pp. 52–56 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pathan, AS.K., Hong, C.S. (2007). A Secure Energy-Efficient Routing Protocol for WSN. In: Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F. (eds) Parallel and Distributed Processing and Applications. ISPA 2007. Lecture Notes in Computer Science, vol 4742. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74742-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-540-74742-0_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74741-3
Online ISBN: 978-3-540-74742-0
eBook Packages: Computer ScienceComputer Science (R0)