ABSTRACT
Two-tier topology makes good candidate for making clusters in wireless sensor networks. So we have considered a heterogeneous 2-tier topology to route the data securely among nodes in the sensor network. Initially, after deploying two types of nodes low-end and high-end nodes in the area of interest we divide the given area into clusters. A multilevel approach is used to partition and adjust the nodes in the clusters in a sophisticated manner that the performance of Improved Tree routing is improved. Researchers mainly focus on routing the data efficiently and effectively in the sensor network. Only a few considered integrating security in the design of a routing protocol. We have also made an effort to make Improved Tree routing secure by integrating pairwise key management scheme in it. Through simulations it is shown that given approach performs better than some of the existing protocols.
- E.R. Abdelmorhit, P. Samuel, "A tabu search algorithm for cluster building in wireless sensor networks", Transactions on Mobile Computing, Vol. 8, No. 4, pp 433--444, April 2009. Google ScholarDigital Library
- F. Liu, X. Cheng, L. Ma, and K. Xing, "SBK A Self-configuring Framework for Bootstrapping keys in Sensor Networks," IEEE Transactions on Mobile Computing, vol. 7, no. 7, July 2008. Google ScholarDigital Library
- I. Chalermek, G. Ramesh, E. Deborah, "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks", ACM Mobicom'00, pp 56--67, August 2000. Google ScholarDigital Library
- K. Gagneja, X. Du., K. Nygard, "Enhanced Routing in HSNs," COMPUTATIONWORLD'09, pp 569--574, 15--20 Nov. 2009.Google Scholar
- L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), 2002. Google ScholarDigital Library
- N. Alejandro, R. Hugh, "Large-scale distribution planning-part ii: macro-optimization with Voronoi's diagram and tabu search", Transactions on Power Systems, Vol. 24, No. 2, pp 752--758, May 2009.Google ScholarCross Ref
- NS-3 notes (http://www.nsnam.org/doxygen-release/index.html).Google Scholar
- R. H. Wendi, C. Anantha, and B. Hari, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks", HICSS'00, Maui, Hawaii, 2000. Google ScholarDigital Library
- S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, pp 500--528, Nov. 2006. Google ScholarDigital Library
Index Terms
- Energy efficient approach with integrated key management scheme for wireless sensor networks: c.2.2 [network protocols]
Recommendations
Efficient anonymity schemes for clustered wireless sensor networks
In this paper, we propose two simple and efficient schemes for establishing anonymity in Clustered Wireless Sensor Networks (CWSNs). The first scheme Simple Anonymity Scheme (SAS), uses a range of pseudonyms as identifiers for a node to ensure ...
Energy-aware routing algorithm for wireless sensor networks
Display Omitted A new energy aware routing algorithm has been proposed for cluster based wireless sensor networks.It achieves O(1) message complexity per sensor node and O(n) time complexity for a WSN having n sensor nodes.It efficiently forms the ...
An energy efficient clustering method for wireless sensor networks
EHAC'07: Proceedings of the 6th WSEAS International Conference on Electronics, Hardware, Wireless and Optical CommunicationsWireless sensor networks have many sensor nodes with a limited energy in a limited area. One of key issues in wireless sensor networks is to prolong the network lifetime. In this paper, we propose a scheme to construct an energy-efficient cluster ...
Comments