[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

A secure hierarchical model for sensor network

Published: 01 March 2004 Publication History

Abstract

In a distributed sensor network, large number of sensors deployed which communicate among themselves to self-organize a wireless ad hoc network. We propose an energy-efficient level-based hierarchical system. We compromise between the energy consumption and shortest path route by utilizing number of neighbors (NBR) of a sensor and its level in the hierarchical clustering. In addition, we design a Secure Routing Protocol for Sensor Networks (SRPSN) to safeguard the data packet passing on the sensor networks under different types of attacks. We build the secure route from the source node to sink node. The sink node is guaranteed to receive correct information using our SRPSN. We also propose a group key management scheme, which contains group communication policies, group membership requirements and an algorithm for generating a distributed group key for secure communication.

References

[1]
C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pages 56--67, Boston, MA, Aug. 2000. ACM Press.
[2]
L. Subramanian and R. H. Katz, An Architecture for Building Self-Configurable Systems, IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC'00), Boston, 2000.
[3]
D. Estrin, R. Govindan, J. Heidemann, and S. Kumar. Next Century Challenges: Scalable Coordination in Sensor Networks, In Proceedings of the Fifth Annual International Conference on MobiCOM, August 1999, Seattle, Washington.
[4]
M. Tubaishat and S. Madria. Sensor Networks: An Overview, IEEE Potentials, Vol. 22, No. 2, April/May 2003.
[5]
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints And Approaches For Distributed Sensor Network Security. NAI Labs Technical Report #00-010, September 2000.
[6]
R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security Protocols for Sensor Networks, Wireless Networks Journal (WINE), September 2002.
[7]
J. Kulik, W. R. Heinzelman, and H. Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, Proc. 5th ACM/IEEE MobiCom Conference (MobiCom '99), Seattle, WA, August, 1999.
[8]
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. IEEE Ninth International Conference on Network Protocols (ICNP'01), 2001.
[9]
P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad Hoc Networks. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27--31, 2002.
[10]
W. Diffie and M. E. Hellman. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE, 67(3):397--427, March 1979.
[11]
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE Transactions on Wireless Communications, Vol. 1, No. 4, October 2002, pp. 660--670.
[12]
Y. Hu, D. B. Johnson, and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. 4th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA'02, New York, 2002.
[13]
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-Hashing for Message Authentication, Internet RFC 2104, February 1997.

Cited By

View all
  • (2023)Impact of the Coronavirus Pandemic on the Retail Industry and Its IoT Applications' Security VulnerabilitiesDigital Supply Chain, Disruptive Environments, and the Impact on Retailers10.4018/978-1-6684-7298-9.ch018(321-343)Online publication date: 9-Jun-2023
  • (2023)Recommendation of secure group communication schemes using multi-objective optimizationInternational Journal of Information Security10.1007/s10207-023-00692-022:5(1291-1332)Online publication date: 25-May-2023
  • (2022)Network Load Effects on Wireless Sensor Network Node ActivityNetwork Load Effects on Wireless Sensor Network Node ActivityEskişehir Türk Dünyası Uygulama ve Araştırma Merkezi Bilişim Dergisi10.53608/estudambilisim.10214093:1(6-10)Online publication date: 31-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGMOD Record
ACM SIGMOD Record  Volume 33, Issue 1
March 2004
135 pages
ISSN:0163-5808
DOI:10.1145/974121
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2004
Published in SIGMOD Volume 33, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Impact of the Coronavirus Pandemic on the Retail Industry and Its IoT Applications' Security VulnerabilitiesDigital Supply Chain, Disruptive Environments, and the Impact on Retailers10.4018/978-1-6684-7298-9.ch018(321-343)Online publication date: 9-Jun-2023
  • (2023)Recommendation of secure group communication schemes using multi-objective optimizationInternational Journal of Information Security10.1007/s10207-023-00692-022:5(1291-1332)Online publication date: 25-May-2023
  • (2022)Network Load Effects on Wireless Sensor Network Node ActivityNetwork Load Effects on Wireless Sensor Network Node ActivityEskişehir Türk Dünyası Uygulama ve Araştırma Merkezi Bilişim Dergisi10.53608/estudambilisim.10214093:1(6-10)Online publication date: 31-Jan-2022
  • (2022)Literature Survey for Cybersecurity for Internet of Things (IoT)2022 International Telecommunications Conference (ITC-Egypt)10.1109/ITC-Egypt55520.2022.9855671(1-5)Online publication date: 26-Jul-2022
  • (2022)A Survey on Secure Group Communication Schemes With Focus on IoT CommunicationIEEE Access10.1109/ACCESS.2022.320645110(99944-99962)Online publication date: 2022
  • (2021)A Pattern for a Secure Actuator NodeProceedings of the 26th European Conference on Pattern Languages of Programs10.1145/3489449.3490007(1-6)Online publication date: 7-Jul-2021
  • (2021)DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT NetworksProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484789(1306-1319)Online publication date: 12-Nov-2021
  • (2021)Secure and Reliable WSN for Internet of Things: Challenges and Enabling TechnologiesIEEE Access10.1109/ACCESS.2021.31313679(161103-161128)Online publication date: 2021
  • (2020)A pattern for a secure sensor nodeProceedings of the 27th Conference on Pattern Languages of Programs10.5555/3511065.3511081(1-10)Online publication date: 12-Oct-2020
  • (2020)Secure Image Processing and Transmission Schema in Cluster-Based Wireless Sensor NetworkSensor Technology10.4018/978-1-7998-2454-1.ch033(698-715)Online publication date: 2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media