Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks

North Dakota State Univ., Fargo
IEEE Transactions on Wireless Communications (Impact Factor: 2.76). 10/2007; DOI: 10.1109/TWC.2007.06095
Source: DBLP

ABSTRACT Research on sensor network routing focused on efficiency and effectiveness of data dissemination. Few of them considered security issues during the design time of a routing protocol. Furthermore, previous research on sensor networks mainly considered homogeneous sensor networks where all sensor nodes have the same capabilities. It has been shown that homogeneous ad hoc networks have poor fundamental performance limits and scalability. To achieve better performance, we adopt a heterogeneous sensor network (HSN) model. In this paper, we present a secure and efficient routing protocol for HSNs - two tier secure routing (TTSR). TTSR takes advantage of powerful high-end sensors in an HSN. Our security analysis demonstrates that TTSR can defend typical attacks on sensor routing. Our performance evaluation shows that TTSR has higher delivery ratio, lower end-to-end delay and energy consumption than a popular sensor network routing protocol.

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: USN heterogeneous wireless sensors embedded in the environment with appropriate security and scalability with user authentication method is proposed intrusion prevention. In this study, the proposed user authentication and secret key cryptography, public key cryptography is used for both, to take advantage of the strengths of the two methods is authentication. In this paper, the proposed scheme the secret key of the existing security than password-based system performance, highly scalable, power demand is less, and the public-key cryptography based on the existing methods, a higher energy efficiency compared to the benefits that the simulation results with shown as.
    Journal of the Korea Institute of Information and Communication Engineering. 01/2014; 18(1).
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose performance guaranteed routing protocols in asymmetric sensor networks (ASNs) where two end nodes may not use the same path to communicate with each other. ASNs can be caused by hardware devices or environment. Different from most of the existing routing protocols in symmetric sensor networks, because of asymmetry, achieving desired routing performance in ASNs poses significant research challenges. To address these challenges, we first propose a general framework protocol called reverse path (RP) to deal with asymmetric links and then present two efficient routing algorithms LayHet and EgyHet built on RP to satisfy performance requirements. LayHet is a performance guaranteed layer-based routing protocol that embeds the shortest path information and saves energy by minimizing the number of broadcasts and the probability of forwarding. EgyHet is its energy-upgraded version that considers nodes' remaining energy. Simulation results comparing the proposed and existing protocols show that LayHet and EgyHet can reach the desired delivery rate earlier than the existing one and outperform it in terms of average hops, average packet replication overhead, and average control message overhead. In addition, as sensor energy reduces, the performance of LayHet and EgyHet eventually degrades more slowly than that of the existing one.
    Emerging Topics in Computing, IEEE Transactions on. 01/2013; 1(1):111-120.
  • [Show abstract] [Hide abstract]
    ABSTRACT: A secure routing protocol is essential for wireless sensor networks WSNs to ensure the exactness of sensed data transmission. Based on the architecture of heterogeneous WSNs, a secure routing protocol with anomaly detection SRPAD is hereby proposed. To resolve the optimising problems of routing overhead, this paper proposes an improved ant colony algorithm to determine the lowest cost routing from cluster nodes to base station. Based on the results, we can detect whether router attacks occur, based on the average variant condition, variance of data traffic, and energy consumption of monitoring cluster nodes. Simulation results show that the proposed protocol is effective in data transfer, having low consumed energy. In addition, the proposed protocol has a higher detection rate and fewer false positives compared with the important WSNs protocol.
    International Journal of Mobile Network Design and Innovation 02/2012; 4(3):157-163.


Available from