Skip to main content
Erschienen in: Wireless Personal Communications 1/2016

01.07.2016

Pruning Route Modifiers in Wireless Sensor Networks

verfasst von: M. Usha, C. N. Vanitha

Erschienen in: Wireless Personal Communications | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Achieving efficient security solutions for wireless sensor networks (WSN) is a daring challenge due to vulnerable nature of wireless medium. Routing is a major threat to security. An adversary can inject bogus routing to en-route nodes causing false decision and drain the sensors energy in the network system. To identify and prune the adversaries, pruning route modifiers (PRM) algorithm based on the collaborative authentication system has been proposed. The algorithm considers the random deployment of sensor nodes. Based on the collaborative authentication scheme, the PRM algorithm can save energy by pruning the malicious nodes at early stage. The simulation results and theoretical analysis reveals that PRM algorithm is effective in terms of efficient and secure routing. This algorithm reduces the consumption of energy by pruning and establishes the shortest path that leads to efficient network and enables security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lu, R., Lin, X., Zhang, C., Zhu, H., Ho, P., & Shen, X. (2008). AICN: An efficient algorithm to identify compromised nodes in wireless sensor network. In Proceedings of the IEEE international conference communication (ICC’08), May 2008. Lu, R., Lin, X., Zhang, C., Zhu, H., Ho, P., & Shen, X. (2008). AICN: An efficient algorithm to identify compromised nodes in wireless sensor network. In Proceedings of the IEEE international conference communication (ICC’08), May 2008.
2.
Zurück zum Zitat Zhou, L., & Ravishankar, C. (2005). A fault localized scheme for false report filtering in sensor networks. In Proceedings of the international conference pervasive services (ICPS’05), pp. 59–68, July 2005. Zhou, L., & Ravishankar, C. (2005). A fault localized scheme for false report filtering in sensor networks. In Proceedings of the international conference pervasive services (ICPS’05), pp. 59–68, July 2005.
3.
Zurück zum Zitat Giruka, V. C., Singhal, M., Royalty, J., & Varanasi, S. (2008). Security in wireless sensor networks. Wireless Communications and Mobile Computing, 8(1), 1–24.CrossRef Giruka, V. C., Singhal, M., Royalty, J., & Varanasi, S. (2008). Security in wireless sensor networks. Wireless Communications and Mobile Computing, 8(1), 1–24.CrossRef
4.
Zurück zum Zitat Choi, H. M., Nam, S. M., & Cho, T. H. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5, 33–40.CrossRef Choi, H. M., Nam, S. M., & Cho, T. H. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5, 33–40.CrossRef
5.
Zurück zum Zitat Lu, R. (2012). BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.CrossRef Lu, R. (2012). BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(1), 32–43.CrossRef
6.
Zurück zum Zitat Pu, J., Tang, X., Wang, F., & Xiong, Z. (2012). A multicast routing protocol with pruning and energy balancing for wireless sensor networks. In Proceedings of IJDSN. 2012, ACM. Pu, J., Tang, X., Wang, F., & Xiong, Z. (2012). A multicast routing protocol with pruning and energy balancing for wireless sensor networks. In Proceedings of IJDSN. 2012, ACM.
7.
Zurück zum Zitat Roy, S., Conti, M., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. Information Forensics and Security, IEEE Transactions on, 9(4), 681–694.CrossRef Roy, S., Conti, M., & Jajodia, S. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. Information Forensics and Security, IEEE Transactions on, 9(4), 681–694.CrossRef
8.
Zurück zum Zitat Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of the IEEE symposium security and privacy, 2004. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of the IEEE symposium security and privacy, 2004.
9.
Zurück zum Zitat Penttinen, A. (2006). Minimum cost multicast trees in adhoc networks. In Proceedings of IEEE international conference on communications (ICC’06), vol. 8, pp. 3676–3681, July 2006. Penttinen, A. (2006). Minimum cost multicast trees in adhoc networks. In Proceedings of IEEE international conference on communications (ICC’06), vol. 8, pp. 3676–3681, July 2006.
10.
Zurück zum Zitat Niwat, T., Yoshito, T., &Kaoru, S. (2005). An efficient multicast routing protocol for wireless sensor networks. IEIC Technical Report 690, Institute of Electronics Information and communication Engineers, Tokyo, Japan, 2005. Niwat, T., Yoshito, T., &Kaoru, S. (2005). An efficient multicast routing protocol for wireless sensor networks. IEIC Technical Report 690, Institute of Electronics Information and communication Engineers, Tokyo, Japan, 2005.
11.
Zurück zum Zitat Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security wireless sensor networks. In Proceedings of the sixth ACM international symposium mobile Ad Hoc networking and computing (MobiHoc’05), pp. 34–45. Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security wireless sensor networks. In Proceedings of the sixth ACM international symposium mobile Ad Hoc networking and computing (MobiHoc’05), pp. 34–45.
12.
Zurück zum Zitat Kim, J., Baek, J., & Shon, T. (2011). An efficient and scalable re-authentication protocol over wireless sensor network. IEEE Transactions on Consumer Electronics, 57(2), 516–522.CrossRef Kim, J., Baek, J., & Shon, T. (2011). An efficient and scalable re-authentication protocol over wireless sensor network. IEEE Transactions on Consumer Electronics, 57(2), 516–522.CrossRef
13.
Zurück zum Zitat Zhou, J. (2013). Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–17. doi:10.1155/2013/108968. Zhou, J. (2013). Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013, 1–17. doi:10.​1155/​2013/​108968.
14.
Zurück zum Zitat Nikolidakis, S. A., Kandris, D., Vergados, D. D., & Douligeris, C. (2013). Energy efficient routing in wireless sensor networks through balanced clustering. Algorithms, 6, 29–42.MathSciNetCrossRef Nikolidakis, S. A., Kandris, D., Vergados, D. D., & Douligeris, C. (2013). Energy efficient routing in wireless sensor networks through balanced clustering. Algorithms, 6, 29–42.MathSciNetCrossRef
15.
Zurück zum Zitat Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. IEEE Transactions on Communications and Networks, 15(4), 422–429. Ganesh, S., & Amutha, R. (2013). Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. IEEE Transactions on Communications and Networks, 15(4), 422–429.
16.
Zurück zum Zitat Fujin, L., Meijie, H., Hongge, R., & Wenbin, Z. (2014). A neural network algorithm for fast pruning based on remarkable analysis. In Control and Decision Conference (2014 CCDC), pp. 184–188. Fujin, L., Meijie, H., Hongge, R., & Wenbin, Z. (2014). A neural network algorithm for fast pruning based on remarkable analysis. In Control and Decision Conference (2014 CCDC), pp. 184–188.
17.
Zurück zum Zitat Sakharkar, S. M., Mangrulkar, R. S., Atique, M. (2014). A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks. In IEEE students conference on electrical, electronics and computer science, pp. 1–5, March 2014. Sakharkar, S. M., Mangrulkar, R. S., Atique, M. (2014). A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks. In IEEE students conference on electrical, electronics and computer science, pp. 1–5, March 2014.
18.
Zurück zum Zitat Khalid, Z., Durrani, S., &Guo, J. (2013). A tractable framework for exact probability of node isolation and minimum node degree distribution in finite multi-hop networks. arXiv, Nov 2013. Khalid, Z., Durrani, S., &Guo, J. (2013). A tractable framework for exact probability of node isolation and minimum node degree distribution in finite multi-hop networks. arXiv, Nov 2013.
19.
Zurück zum Zitat Vavoulas, A., Sandalidis, H. G., & Varoutas, D. (2011). Node isolation probability for serial ultraviolet UV-C multi-hop networks. Journal of Optical Communications Networking, 3(9), 750–757.CrossRef Vavoulas, A., Sandalidis, H. G., & Varoutas, D. (2011). Node isolation probability for serial ultraviolet UV-C multi-hop networks. Journal of Optical Communications Networking, 3(9), 750–757.CrossRef
20.
Zurück zum Zitat Bettstetter, C. (2002). On the minimum node degree and connectivity of a wireless multihop network. ACM 1-58113-501-7/02/0006. pp 80–91. Bettstetter, C. (2002). On the minimum node degree and connectivity of a wireless multihop network. ACM 1-58113-501-7/02/0006. pp 80–91.
21.
Zurück zum Zitat Zhang, C., Lu, R., Lin, X., Ho, P., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of the IEEE INFOCOM’08, Apr. 2008. Zhang, C., Lu, R., Lin, X., Ho, P., & Shen, X. (2008). An efficient identity-based batch verification scheme for vehicular sensor networks. In Proceedings of the IEEE INFOCOM’08, Apr. 2008.
22.
Zurück zum Zitat Zhang, W., Han, G., Feng, Y., Cheng, L., Zhang, D., Tan, X., & Fu, L. (2015). A novel method for node fault detection based on clustering in industrial wireless sensor networks. International Journal of Distributed Sensor Networks, 9. Article ID 230521. Zhang, W., Han, G., Feng, Y., Cheng, L., Zhang, D., Tan, X., & Fu, L. (2015). A novel method for node fault detection based on clustering in industrial wireless sensor networks. International Journal of Distributed Sensor Networks, 9. Article ID 230521.
23.
Zurück zum Zitat Wong, K. P. (2015). Trouble-shooting the key problems of overhead and pinball routing in nested mobile network. First Asia Pacific Conference on Advanced Research (APCAR-2015), ISBN: 978 0 994 3656 68. Wong, K. P. (2015). Trouble-shooting the key problems of overhead and pinball routing in nested mobile network. First Asia Pacific Conference on Advanced Research (APCAR-2015), ISBN: 978 0 994 3656 68.
24.
Zurück zum Zitat Jay, L. D. (2012). Probability and statistics for engineering and sciences, Eighth Edition, California Polytechnic State university, San Luis Obispo, Brooks/Cole Cengage Learning, USA. Jay, L. D. (2012). Probability and statistics for engineering and sciences, Eighth Edition, California Polytechnic State university, San Luis Obispo, Brooks/Cole Cengage Learning, USA.
Metadaten
Titel
Pruning Route Modifiers in Wireless Sensor Networks
verfasst von
M. Usha
C. N. Vanitha
Publikationsdatum
01.07.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3249-1

Weitere Artikel der Ausgabe 1/2016

Wireless Personal Communications 1/2016 Zur Ausgabe

Neuer Inhalt