Trust-Aware Distributed and Adaptive Energy Efficient Secure Routing in Sensor Networks

被引:0
作者
Bhasin, Vandana [1 ]
Kumar, Sushil [2 ]
Saxena, P. C. [2 ]
Katti, C. P. [2 ]
机构
[1] Lal Bahadur Shastri Inst Management, Delhi, India
[2] Jawahar Lal Nehru Univ, Delhi, India
关键词
Clustering; link layer; privacy homomorphism; routing; network Layer; security; sensor Networks; trust; CLUSTERING SCHEME; SERVICE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of security on a wireless sensor network is a challenge since its resources are extremely constrained. The constituents and events in a wireless sensor network need to cope with the vagaries of adjacent malicious nodes to maintain self-sufficiency. Hence, we have worked on developing a trust management system based on a high trust value to counter the insider attacks. The algorithm works on a clustered network where the packets in the network are forwarded only to a trusted neighbor. Energy being an important constraint in any wireless sensor network, is conserved using energy efficient routing and homomorphic aggregation on clusters. The encrypted data packets are aggregated using privacy homomorphism and their corresponding authentication codes are also aggregated. The decryption being performed only at base station preserves the end-to-end confidentiality of the data. The algorithm works to ensure security at both data link layer and the network layer. The resultant algorithm improves the throughput of the network even in the presence of an adversary and has the capability to scale.
引用
收藏
页码:73 / 115
页数:43
相关论文
共 34 条
  • [1] [Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
  • [2] Atakli I.M., 2008, Proceedings of the 2008 Spring Simulation Multiconference, 2008, P836
  • [3] Bajaber F., 2010, INT C COMP INF TECHN
  • [4] Boubiche DE, 2011, INT J SENS NETW, V10, P25, DOI 10.1504/IJSNET.2011.040901
  • [5] Cionca V., 2008, 2008 2 INT C SENS TE, P30
  • [6] Fu Chunyao., 2013, INT J COMPUTER SCI, V10, P354
  • [7] Reputation-based framework for high integrity sensor networks
    Ganeriwal, Saurabh
    Balzano, Laura K.
    Srivastava, Mani B.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)
  • [8] Using adaptive clustering scheme with load balancing to enhance energy efficiency and reliability in delay tolerant with QoS in large-scale mobile wireless sensor networks
    Gherbi, Chirihane
    Aliouat, Zibouda
    Benmohammed, Mohamed
    [J]. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2016, 12 (03) : 352 - 374
  • [9] TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
    Girao, Joao
    Westhoff, Dirk
    Mykletun, Einar
    Araki, Toshinori
    [J]. AD HOC NETWORKS, 2007, 5 (07) : 1073 - 1089
  • [10] Management and applications of trust in Wireless Sensor Networks: A survey
    Han, Guangjie
    Jiang, Jinfang
    Shu, Lei
    Niu, Jianwei
    Chao, Han-Chieh
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 602 - 617