Secure cell relay routing protocol for sensor networks

被引:24
作者
Du, Xiaojiang
Xiao, Yang
Chen, Hsiao-Hwa
Wu, Qishi
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[3] Natl Sun Yat Sen Univ, Inst Commun Engn, Kaohsiung, Taiwan
[4] Oak Ridge Natl Lab, Div Math & Comp Sci, Oak Ridge, TN 37831 USA
关键词
secure routing; sensor networks;
D O I
10.1002/wcm.402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Past researches on sensor network routing have been focused on efficiency and effectiveness of data dissemination. Few of them consider security issues during the design time of routing protocols. Security is very important for many sensor network applications. Studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. In this paper, we propose an efficient key management scheme and a novel secure routing protocol-Secure cell relay (SCR) for sensor networks. We also present an effective key setup scheme for sensor nodes deployed in the later stage. We analyze the security of SCR under various attacks and show that SCR is very effective in defending against several sophisticated attacks, including selective forwarding, sinkhole, wormhole, Sybil, hello flooding, and clone attacks. SCR is an energy-efficient routing protocol with acceptable security overhead. Our simulations demonstrate that with all the security primitives, SCR still has lower energy consumption and higher delivery ratio than a popular routing protocol-directed diffusion. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:375 / 391
页数:17
相关论文
共 30 条
[1]  
[Anonymous], 2004, P 2 ACM C EMBEDDED N
[2]  
[Anonymous], P IEEE INT C NETW PR
[3]  
[Anonymous], P 8 ACM INT C MOB CO
[4]  
[Anonymous], P IPTPS 02 MARCH
[5]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[6]   Security and privacy in sensor networks [J].
Chan, HW ;
Perrig, A .
COMPUTER, 2003, 36 (10) :103-105
[7]  
DENG J, 2003, P 1 ACM WORKSH SEC A
[8]  
Doherty L., 2001, P IEEE INF 2001 ANCH
[9]  
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[10]  
Du W., P IEEE INFOCOM 2004