Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.05.2015

Secure Coverage Tree Construction Scheme for Wireless Sensor Networks

verfasst von: Irfana Memon, Pardeep Kumar, Nisar A. Memon, Bhawani S. Chowdhry

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In wireless sensor networks, nodes usually construct tree structure in any monitored area to enable data aggregation and to transmit aggregated data by multi-hopping through neighbors to a remote sink (BS) which results in significant energy savings. Further- more, a captured sensor node might generate a fictitious data and misguide the Sink (BS). Hence, secure communication between nodes have generally vital importance. Secret shared keys are needed to be established among sensor nodes for secure communication among them. In the present work a new algorithm is introduced to construct such a tree of sensor nodes in wireless sensor networks. This algorithm implements a sleep/wake scheduling technique to keep redundant nodes inactive while maintaining initial sensing coverage with active nodes. Redundant nodes can replace the failure nodes to keep network tasks that enhances the network lifetime by efficient utilization. Hence the objective of this research work is to jointly design the scheme for sensor scheduling, tree construction with active nodes, and secret pair-wise keys establishment with their parent and children such that the network lifetime can be maximized. Thereafter, sensor nodes communicate with each other securely using secret pair-wise keys.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Carman, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor networks security, Technical Report No. 00-010, NAT Labs, Network associates Inc., Glenwood, MD, USA. Carman, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor networks security, Technical Report No. 00-010, NAT Labs, Network associates Inc., Glenwood, MD, USA.
2.
Zurück zum Zitat Singh, S. K., Singh, M.P., & Singh, D.K. (2010). Applications, classifications, and selections of energy-efficient routing protocols for wireless sensor networks, International Journal of Advanced Engineering Sciences and Technologies (IJAEST), 1(2), ISSN: 2230–7818. Singh, S. K., Singh, M.P., & Singh, D.K. (2010). Applications, classifications, and selections of energy-efficient routing protocols for wireless sensor networks, International Journal of Advanced Engineering Sciences and Technologies (IJAEST), 1(2), ISSN: 2230–7818.
3.
Zurück zum Zitat Ye, F., Zhong, G., Lu, S., & Zhhang, L. (2003). Peas: A robust energy conserving protocol for long-lived sensor networks, In The 23nd international conference on distributed computing systems (ICDCS), 2003. Ye, F., Zhong, G., Lu, S., & Zhhang, L. (2003). Peas: A robust energy conserving protocol for long-lived sensor networks, In The 23nd international conference on distributed computing systems (ICDCS), 2003.
4.
Zurück zum Zitat Hsin, C.-F., & Liu, M. (2004). Network coverage using low duty-cycled sensors: Random and coordinated sleep algorithms”, IPSN’04, on Information Processing in Sensor Networks. California, USA: Berkeley.CrossRef Hsin, C.-F., & Liu, M. (2004). Network coverage using low duty-cycled sensors: Random and coordinated sleep algorithms”, IPSN’04, on Information Processing in Sensor Networks. California, USA: Berkeley.CrossRef
5.
Zurück zum Zitat Tian, D., & Georganas, N. D. (2002). A coverage-preserving node scheduling scheme for large wireless sensor networks. In First ACM International workshop on Wireless Sensor Networks and Applications, pp 32–41 Tian, D., & Georganas, N. D. (2002). A coverage-preserving node scheduling scheme for large wireless sensor networks. In First ACM International workshop on Wireless Sensor Networks and Applications, pp 32–41
6.
Zurück zum Zitat Hill, J., Szewczyk, R., Woo, A., Hollar, S., & Pister, D.C.K. (2000). System architecture directions for networked sensors, In Proceedings of the 9th international conference on architectural support for programming languages and operating systems. Hill, J., Szewczyk, R., Woo, A., Hollar, S., & Pister, D.C.K. (2000). System architecture directions for networked sensors, In Proceedings of the 9th international conference on architectural support for programming languages and operating systems.
7.
Zurück zum Zitat Kiran M., Kamal K., & Nitin G. (2011). Wireless sensor network: A review on data aggregation, International Journal of Scientific and Engineering Research 2(4), ISSN 2229–5518. Kiran M., Kamal K., & Nitin G. (2011). Wireless sensor network: A review on data aggregation, International Journal of Scientific and Engineering Research 2(4), ISSN 2229–5518.
8.
Zurück zum Zitat Madden, S., Szewczyk, R., Franklin, M., & Culler, D. (2002). Supporting aggregate queries over ad-hoc sensor networks, In Workshop on mobile computing and systems applications (WMCSA), (pp. 49–58) Callicoon, NY, June. Madden, S., Szewczyk, R., Franklin, M., & Culler, D. (2002). Supporting aggregate queries over ad-hoc sensor networks, In Workshop on mobile computing and systems applications (WMCSA), (pp. 49–58) Callicoon, NY, June.
9.
Zurück zum Zitat Wagner, D. (2004). Resilient aggregation in sensor networks, In SASN ’04: Proceedings of the 2nd ACM workshop on Security of adhoc and sensor networks (pp. 78–87) ACM Press, New York, USA. Wagner, D. (2004). Resilient aggregation in sensor networks, In SASN ’04: Proceedings of the 2nd ACM workshop on Security of adhoc and sensor networks (pp. 78–87) ACM Press, New York, USA.
10.
Zurück zum Zitat Intanagonwiwat, C., Estrin, D., Govindan, R., & Heidemann, J. (2002). Impact of network density on data aggregation in wireless sensor networks, In proceedings of the 22nd international conference on distributed computing systems. Intanagonwiwat, C., Estrin, D., Govindan, R., & Heidemann, J. (2002). Impact of network density on data aggregation in wireless sensor networks, In proceedings of the 22nd international conference on distributed computing systems.
11.
Zurück zum Zitat Madden, S., Franklin, M.J., & Hellerstein, J.M. (2002). TAG: A tiny AGgregation service for ad-hoc sensor networks, OSDI. Madden, S., Franklin, M.J., & Hellerstein, J.M. (2002). TAG: A tiny AGgregation service for ad-hoc sensor networks, OSDI.
12.
Zurück zum Zitat Wu, K., Dreef, D., Sun, B., & Xiao, Y. (2007). Secure data aggregation without persistent cryptographic operation in wireless sensor networks. Ad Hoc Networks, 5(1), 100–111.CrossRef Wu, K., Dreef, D., Sun, B., & Xiao, Y. (2007). Secure data aggregation without persistent cryptographic operation in wireless sensor networks. Ad Hoc Networks, 5(1), 100–111.CrossRef
13.
Zurück zum Zitat Cheng, Y., & Agrawal, D. P. (2007). An improved key distribution mechanism for large scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.CrossRef Cheng, Y., & Agrawal, D. P. (2007). An improved key distribution mechanism for large scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.CrossRef
15.
Zurück zum Zitat Karri, R., & Mishra, P. (2002). Minimizing the secure wireless energy, Journal of Mobile Network and Applications (MONET). Karri, R., & Mishra, P. (2002). Minimizing the secure wireless energy, Journal of Mobile Network and Applications (MONET).
16.
Zurück zum Zitat Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy- efficient communication protocol for wireless micro-sensor networks, proceedings of the 33rd Hawaii international conference on system sciences. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy- efficient communication protocol for wireless micro-sensor networks, proceedings of the 33rd Hawaii international conference on system sciences.
Metadaten
Titel
Secure Coverage Tree Construction Scheme for Wireless Sensor Networks
verfasst von
Irfana Memon
Pardeep Kumar
Nisar A. Memon
Bhawani S. Chowdhry
Publikationsdatum
01.05.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-2246-5

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt