Secure cell relay routing protocol for sensor networks

被引:24
|
作者
Du, Xiaojiang
Xiao, Yang
Chen, Hsiao-Hwa
Wu, Qishi
机构
[1] N Dakota State Univ, Dept Comp Sci, Fargo, ND 58105 USA
[2] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[3] Natl Sun Yat Sen Univ, Inst Commun Engn, Kaohsiung, Taiwan
[4] Oak Ridge Natl Lab, Div Math & Comp Sci, Oak Ridge, TN 37831 USA
来源
WIRELESS COMMUNICATIONS & MOBILE COMPUTING | 2006年 / 6卷 / 03期
关键词
secure routing; sensor networks;
D O I
10.1002/wcm.402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Past researches on sensor network routing have been focused on efficiency and effectiveness of data dissemination. Few of them consider security issues during the design time of routing protocols. Security is very important for many sensor network applications. Studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. In this paper, we propose an efficient key management scheme and a novel secure routing protocol-Secure cell relay (SCR) for sensor networks. We also present an effective key setup scheme for sensor nodes deployed in the later stage. We analyze the security of SCR under various attacks and show that SCR is very effective in defending against several sophisticated attacks, including selective forwarding, sinkhole, wormhole, Sybil, hello flooding, and clone attacks. SCR is an energy-efficient routing protocol with acceptable security overhead. Our simulations demonstrate that with all the security primitives, SCR still has lower energy consumption and higher delivery ratio than a popular routing protocol-directed diffusion. Copyright (c) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:375 / 391
页数:17
相关论文
共 50 条
  • [31] Information-Aware Secure Routing in Wireless Sensor Networks
    Shi, Qiong
    Qin, Li
    Ding, Yinghua
    Xie, Boli
    Zheng, Jiajie
    Song, Lipeng
    SENSORS, 2020, 20 (01)
  • [32] Secure and load balanced routing model for wireless sensor networks
    Thahniyath, Gousia
    Jayaprasad, M.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (07) : 4209 - 4218
  • [33] Customizing a geographical routing protocol for wireless sensor networks
    Chen, J
    Guan, Y
    Pooch, U
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 586 - 591
  • [34] Lifetime prediction routing protocol for wireless sensor networks
    Seo, Minho
    Choi, Wonik
    Kim, Yoo-Sung
    Park, Jaehyun
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (12) : 3680 - 3681
  • [35] A constrained multipath routing protocol for wireless sensor networks
    Loh, Peter K. K.
    Tan, Y. K.
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 661 - 670
  • [36] Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks
    Sun, Ziwen
    Wei, Min
    Zhang, Zhiwei
    Qu, Gang
    APPLIED SOFT COMPUTING, 2019, 77 : 366 - 375
  • [37] Ariadne: A secure on-demand routing protocol for ad hoc networks
    Hu, YC
    Perrig, A
    Johnson, DB
    WIRELESS NETWORKS, 2005, 11 (1-2) : 21 - 38
  • [38] Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    Yih-Chun Hu
    Adrian Perrig
    David B. Johnson
    Wireless Networks, 2005, 11 : 21 - 38
  • [39] Secure Directional Routing to Prevent Relay Attack
    Zefreh, Mohammad Sheikh
    Khadivi, Pejman
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2526 - 2531
  • [40] Secure Efficient Geocast Protocol for Sensor Networks with Malicious Nodes
    Shim, Young-Chul
    EHAC'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS, 2009, : 179 - 184