Abstract
The unattended nature of WSNs makes them very vulnerable to malicious attacks. In this paper, we propose a novel approach of secure data collection for WSN. We explore secret sharing and multipath routing to achieve secure data collection in a WSN with compromised nodes. We propose to use a novel tracing-feedback mechanism, which makes full use of the routing functionality of WSN, to improve the quality of data collection. The algorithms of the approach are easy to be implemented and performed in WSN. We also evaluate the approach with a simulation experiment and analyze the simulation results in detail. We illustrate that the approach is efficient to support secure data collection in wireless sensor network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Low, K.S., Win, W.N., Er, M.J.: Wireless Sensor Networks for Industrial Environments. Mater. Sci. Forum 119, 83–87 (1992)
Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. the 6th Annual International Conference on Mobile Computing and Networking (2000)
Tsirigos, A., Haas, Z.J.: Multipath routing in the presence of frequent topological changes. IEEE Communication Magazine 39(11), 132–138 (2001)
Shu, T., Liu, S., KrunzSecure, M.: Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. In: Proc. IEEE INFOCOM Conference, pp. 2846–2850 (2009)
Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38, 393–422 (2002)
Ioannis, K., Dimitriou, T., Freiling, F.C.: Towards Intrusion Detection in Wireless Sensor Networks. In: Proc. the 13th European Wireless Conference (2007)
Onat, I., Miri, A.: An Intrusion Detection System for Wireless Sensor Networks. In: Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2005)
Shamir, A.: How to Share a Secret. Communication of the ACM 22(11), 612–613 (1979)
Lou, W., Liu, W., Fang, Y.: Spread: enhancing data confidentiality in mobile ad hoc networks. In: Proc. IEEE INFOCOM Conference, vol. 4, pp. 2404–2413 (2004)
Lou, W., Kwon, Y.: H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology 55(4), 1320–1330 (2006)
Lee, P.C., Misra, V., Rubenstein, D.: Distributed algorithms for secure multipath rout-ing in attack-resistant networks. IEEE/ACM Transactions on Networking 15(6), 1490–1501 (2007)
Nasser, N., Chen, Y.: SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer Communications 30(11-12), 2401–2412 (2007)
Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communication 29(2), 216–230 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mao, Y. (2010). A Feedback-Based Secure Path Approach for Wireless Sensor Networks Data Collection. In: Chang, CC., Vasilakos, T., Das, P., Kim, Th., Kang, BH., Khurram Khan, M. (eds) Advanced Communication and Networking. ACN 2010. Communications in Computer and Information Science, vol 77. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13405-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-13405-0_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13404-3
Online ISBN: 978-3-642-13405-0
eBook Packages: Computer ScienceComputer Science (R0)