Skip to main content

A Feedback-Based Secure Path Approach for Wireless Sensor Networks Data Collection

  • Conference paper
Advanced Communication and Networking (ACN 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 77))

Included in the following conference series:

Abstract

The unattended nature of WSNs makes them very vulnerable to malicious attacks. In this paper, we propose a novel approach of secure data collection for WSN. We explore secret sharing and multipath routing to achieve secure data collection in a WSN with compromised nodes. We propose to use a novel tracing-feedback mechanism, which makes full use of the routing functionality of WSN, to improve the quality of data collection. The algorithms of the approach are easy to be implemented and performed in WSN. We also evaluate the approach with a simulation experiment and analyze the simulation results in detail. We illustrate that the approach is efficient to support secure data collection in wireless sensor network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Low, K.S., Win, W.N., Er, M.J.: Wireless Sensor Networks for Industrial Environments. Mater. Sci. Forum 119, 83–87 (1992)

    Google Scholar 

  2. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)

    Article  Google Scholar 

  3. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. the 6th Annual International Conference on Mobile Computing and Networking (2000)

    Google Scholar 

  4. Tsirigos, A., Haas, Z.J.: Multipath routing in the presence of frequent topological changes. IEEE Communication Magazine 39(11), 132–138 (2001)

    Article  Google Scholar 

  5. Shu, T., Liu, S., KrunzSecure, M.: Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. In: Proc. IEEE INFOCOM Conference, pp. 2846–2850 (2009)

    Google Scholar 

  6. Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks 38, 393–422 (2002)

    Article  Google Scholar 

  7. Ioannis, K., Dimitriou, T., Freiling, F.C.: Towards Intrusion Detection in Wireless Sensor Networks. In: Proc. the 13th European Wireless Conference (2007)

    Google Scholar 

  8. Onat, I., Miri, A.: An Intrusion Detection System for Wireless Sensor Networks. In: Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (2005)

    Google Scholar 

  9. Shamir, A.: How to Share a Secret. Communication of the ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  10. Lou, W., Liu, W., Fang, Y.: Spread: enhancing data confidentiality in mobile ad hoc networks. In: Proc. IEEE INFOCOM Conference, vol. 4, pp. 2404–2413 (2004)

    Google Scholar 

  11. Lou, W., Kwon, Y.: H-spread: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology 55(4), 1320–1330 (2006)

    Article  Google Scholar 

  12. Lee, P.C., Misra, V., Rubenstein, D.: Distributed algorithms for secure multipath rout-ing in attack-resistant networks. IEEE/ACM Transactions on Networking 15(6), 1490–1501 (2007)

    Article  Google Scholar 

  13. Nasser, N., Chen, Y.: SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer Communications 30(11-12), 2401–2412 (2007)

    Article  Google Scholar 

  14. Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communication 29(2), 216–230 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mao, Y. (2010). A Feedback-Based Secure Path Approach for Wireless Sensor Networks Data Collection. In: Chang, CC., Vasilakos, T., Das, P., Kim, Th., Kang, BH., Khurram Khan, M. (eds) Advanced Communication and Networking. ACN 2010. Communications in Computer and Information Science, vol 77. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13405-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13405-0_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13404-3

  • Online ISBN: 978-3-642-13405-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics