skip to main content
10.1145/2491260.2491263acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Energy efficient approach with integrated key management scheme for wireless sensor networks: c.2.2 [network protocols]

Published:29 July 2013Publication History

ABSTRACT

Two-tier topology makes good candidate for making clusters in wireless sensor networks. So we have considered a heterogeneous 2-tier topology to route the data securely among nodes in the sensor network. Initially, after deploying two types of nodes low-end and high-end nodes in the area of interest we divide the given area into clusters. A multilevel approach is used to partition and adjust the nodes in the clusters in a sophisticated manner that the performance of Improved Tree routing is improved. Researchers mainly focus on routing the data efficiently and effectively in the sensor network. Only a few considered integrating security in the design of a routing protocol. We have also made an effort to make Improved Tree routing secure by integrating pairwise key management scheme in it. Through simulations it is shown that given approach performs better than some of the existing protocols.

References

  1. E.R. Abdelmorhit, P. Samuel, "A tabu search algorithm for cluster building in wireless sensor networks", Transactions on Mobile Computing, Vol. 8, No. 4, pp 433--444, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Liu, X. Cheng, L. Ma, and K. Xing, "SBK A Self-configuring Framework for Bootstrapping keys in Sensor Networks," IEEE Transactions on Mobile Computing, vol. 7, no. 7, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. I. Chalermek, G. Ramesh, E. Deborah, "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks", ACM Mobicom'00, pp 56--67, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. K. Gagneja, X. Du., K. Nygard, "Enhanced Routing in HSNs," COMPUTATIONWORLD'09, pp 569--574, 15--20 Nov. 2009.Google ScholarGoogle Scholar
  5. L. Eschenauer and V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Alejandro, R. Hugh, "Large-scale distribution planning-part ii: macro-optimization with Voronoi's diagram and tabu search", Transactions on Power Systems, Vol. 24, No. 2, pp 752--758, May 2009.Google ScholarGoogle ScholarCross RefCross Ref
  7. NS-3 notes (http://www.nsnam.org/doxygen-release/index.html).Google ScholarGoogle Scholar
  8. R. H. Wendi, C. Anantha, and B. Hari, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks", HICSS'00, Maui, Hawaii, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Transactions on Sensor Networks, vol. 2, pp 500--528, Nov. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Energy efficient approach with integrated key management scheme for wireless sensor networks: c.2.2 [network protocols]

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ANC '13: Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications
        July 2013
        34 pages
        ISBN:9781450322089
        DOI:10.1145/2491260

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 July 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ANC '13 Paper Acceptance Rate5of5submissions,100%Overall Acceptance Rate7of8submissions,88%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader