A Hierarchical and Role Based Secure Routing Protocol for Mobile Wireless Sensor Networks

被引:0
作者
Hiren Kumar Deva Sarma
Avijit Kar
Rajib Mall
机构
[1] Sikkim Manipal Institute of Technology,Department of Information Technology
[2] Jadavpur University,Department of Computer Science and Engineering
[3] IIT Kharagpur,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2016年 / 90卷
关键词
Wireless sensor network; Secure routing; Hierarchical routing; Role based security;
D O I
暂无
中图分类号
学科分类号
摘要
Nodes in wireless sensor networks are highly resource constrained and topology of such networks remains highly dynamic due to sudden death of sensor nodes and break of links. When mobility to such nodes is introduced, it gives rise to a highly complex network system since the topology becomes even more dynamic. Providing security in the routing layer of wireless sensor network is a highly critical issue mainly due to the stringent resource constraints and dynamic topology. In this paper, we propose a Secure Hierarchical and Role based Routing Protocol for Mobile Wireless Sensor Network (SHaRP) which is a combination of symmetric and asymmetric cryptographic approach. In the SHaRP framework, the sensor field is divided into some logical clusters and each cluster contains nodes with different roles such as ordinary sensor node (OSN), cluster head (CH) and gateway node (GN). Different keys are used by the nodes with distinct roles for message encryption and message decryption. The overall security has been entrusted on different roles in a distributed manner instead of relying on one authority and that is why this approach is safe from single point of failure problem. This also enhances the security in the network system. In this paper, we focus more on various security aspects in the routing process rather than the issues like cluster formation and role distribution. We shift most of the computing overhead to the base station as it is assumed to be a resourceful and reliable node. This obviously improves the energy efficiency of the protocol. We also report a security analysis along with implementation issues of the proposed protocol.
引用
收藏
页码:1067 / 1103
页数:36
相关论文
共 68 条
[1]  
Akyildiz IF(2002)A survey on sensor networks IEEE Communications Magazine 40 102-114
[2]  
Su W(2006)An integrated energy aware wireless transmission system for QoS provisioning in wireless sensor network Computer Communications 29 162-172
[3]  
Sankarasubramaniam Y(2007)A survey on wireless multimedia sensor networks Computer Networks 51 921-960
[4]  
Yuan Y(2009)An energy-efficient data gathering algorithm to prolong lifetime of wireless sensor networks Computer Communications 31 818-826
[5]  
Yang Z(2008)Defense against outside attacks in wireless sensor networks Computer Communications 1 293-315
[6]  
He Z(2003)Secure routing in wireless sensor networks: Attacks and countermeasures Ad Hoc Networks 4 77-83
[7]  
He J(2009)High effect secure data transmission mechanism in wireless sensor networks using ID-based key management scheme Journal of Convergence Information Technology 8 228-258
[8]  
Akyildiz IF(2005)A pairwise key predistribution scheme for wireless sensor networks ACM Transactions on Information and System Security 15 1204-1215
[9]  
Melodia T(2007)Modeling pairwise key establishment for random key predistribution in large-scale sensor networks IEEE/ACM Transactions on Networking 8 521-534
[10]  
Chowdhury KR(2002)SPINS: Security protocols for sensor networks Wireless Networks 29 216-230