STCP : Secure Topology Control Protocol for Wireless Sensor Networks Based on Hexagonal Mesh

被引:0
作者
Wang Xin-sheng [1 ]
Zhan Yong-zhao [1 ]
Wang Liang-min [2 ]
机构
[1] Jiangsu Univ, Sch Comp Sci & Commun Engn, Zhenjiang, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Comp Sci & Engn, Zhenjiang, Jiangsu, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
基金
中国国家自然科学基金;
关键词
sensor network; topology control; security;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks(WSN) based on hexagonal mesh can be able to extend the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity. However, security for topology control is scarce in wireless sensor networks based on hexagonal mesh. In this paper, STCP, an energy-effective secure topology control protocol for wireless sensor networks is presented. In STCP, topology made of hexagonal cells is formed according to node locations, security for updating sensor network topology is provided by controlling new node securely adding to network with the help of one way hash chain and symmetric cryptographic key, and network energy consumption is reduced by the way that new nodes form temporal clusters. Analysis and simulation results show that STCP effectively guarantees the security of topology control in consuming less energy.
引用
收藏
页码:3629 / +
页数:2
相关论文
共 12 条
[1]  
[Anonymous], 2005, P 6 ACM INT S MOBILE
[2]  
BEKARA C, 2007, 3 IEEE INT C WIR MOB, P59
[3]   Analyzing interaction between distributed denial of service attacks and mitigation technologies [J].
Blackert, WJ ;
Gregg, DM ;
Castner, AK ;
Kyle, EM ;
Hom, RL ;
Jokerst, RM .
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, :26-36
[4]   An application-specific protocol architecture for wireless microsensor networks [J].
Heinzelman, WB ;
Chandrakasan, AP ;
Balakrishnan, H .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2002, 1 (04) :660-670
[5]   Secure routing in wireless sensor networks: Attacks and countermeasures [J].
Karlof, C ;
Wagner, D .
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, 2003, :113-127
[6]   Topology control in wireless ad hoc and sensor networks [J].
Santi, P .
ACM COMPUTING SURVEYS, 2005, 37 (02) :164-194
[7]  
WANG BT, 2004, CAN C EL COMP ENG, V2, P901
[8]  
WANG X, 2004, P 12 IEEE MASCOTS OC
[9]  
WANG X, 2005, P IEEE WCNC MAR
[10]   Location-aware combinatorial key management scheme for clustered sensor networks [J].
Younis, Mohamed F. ;
Ghumman, Kajaldeep ;
Eltoweissy, Mohamed .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (08) :865-882