An Energy-aware Routing Protocol Considering Link-Layer Security in Wireless Sensor Networks

被引:0
作者
Jung, Sung-Chul [1 ]
Choi, Hyoung-Kee [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
来源
11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER! | 2009年
关键词
wireless sensor networks; routing protocol; energy-efficiency; tinysec; multi-path;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An evolution of a hardware technology makes it possible to deploy lightweight and multi-functional mobile devices in a real environment. Wireless sensor networks (WSN) are representative networks using these tiny and low-power sensor devices. Two types of communications occur in sensor networks: one is between end nodes, and the other is between end node and base station (BS). Since not only the resource-restriction in conventional wireless networks but security-critical applications, security functions are very important issues in WSN. Besides, because of physically low-power facilities in a sensor device, power efficient protocols are essential to maximize a lifetime of networks. In this paper, as the power and security-aware protocol for sensor networks, we propose the Transform Energy Aware Security Routing (TEASR) protocol. The routing protocol considers mutual authentication of between nodes and an energy information of each nodes. The simulation results maximize a lifetime of networks, and achieve reasonable packet transfer delay.
引用
收藏
页码:358 / 361
页数:4
相关论文
共 9 条
[1]  
[Anonymous], AD HOC DEMA IN PRESS
[2]  
[Anonymous], P 7 ANN INT C MOB CO
[3]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[4]  
CHARLES E, 2003, RFC3561
[5]  
DAVID B, 2004, DYNAMIC SOURCE ROUTI
[6]   On the security of iterated message authentication codes [J].
Preneel, B ;
van Oorschot, PC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (01) :188-199
[7]  
Shah RC, 2002, IEEE WCNC, P350, DOI 10.1109/WCNC.2002.993520
[8]  
Tubaishat M, 2003, IEEE POTENTIALS, V22, P20, DOI 10.1109/MP.2003.1197877
[9]  
Wei Y., 2004, IEEE ACM T NETWORKIN, V12