Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks

North Dakota State Univ., Fargo
IEEE Transactions on Wireless Communications (Impact Factor: 2.76). 10/2007; DOI: 10.1109/TWC.2007.06095
Source: DBLP

ABSTRACT Research on sensor network routing focused on efficiency and effectiveness of data dissemination. Few of them considered security issues during the design time of a routing protocol. Furthermore, previous research on sensor networks mainly considered homogeneous sensor networks where all sensor nodes have the same capabilities. It has been shown that homogeneous ad hoc networks have poor fundamental performance limits and scalability. To achieve better performance, we adopt a heterogeneous sensor network (HSN) model. In this paper, we present a secure and efficient routing protocol for HSNs - two tier secure routing (TTSR). TTSR takes advantage of powerful high-end sensors in an HSN. Our security analysis demonstrates that TTSR can defend typical attacks on sensor routing. Our performance evaluation shows that TTSR has higher delivery ratio, lower end-to-end delay and energy consumption than a popular sensor network routing protocol.

1 Follower
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose performance guaranteed routing protocols in asymmetric sensor networks (ASNs) where two end nodes may not use the same path to communicate with each other. ASNs can be caused by hardware devices or environment. Different from most of the existing routing protocols in symmetric sensor networks, because of asymmetry, achieving desired routing performance in ASNs poses significant research challenges. To address these challenges, we first propose a general framework protocol called reverse path (RP) to deal with asymmetric links and then present two efficient routing algorithms LayHet and EgyHet built on RP to satisfy performance requirements. LayHet is a performance guaranteed layer-based routing protocol that embeds the shortest path information and saves energy by minimizing the number of broadcasts and the probability of forwarding. EgyHet is its energy-upgraded version that considers nodes' remaining energy. Simulation results comparing the proposed and existing protocols show that LayHet and EgyHet can reach the desired delivery rate earlier than the existing one and outperform it in terms of average hops, average packet replication overhead, and average control message overhead. In addition, as sensor energy reduces, the performance of LayHet and EgyHet eventually degrades more slowly than that of the existing one.
    01/2013; 1(1):111-120. DOI:10.1109/TETC.2013.2273888
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a secure and scalable user authentication scheme for heterogeneous wireless sensor networks to prevent intrusions. Our scheme employs both public and secret key cryptography schemes, such that it takes advantages from both. Our analysis and simulation results show that our scheme is not only more secure and scalable than existing secret key cryptography–based schemes, but also requires less processing power and provides higher energy efficiency than existing public key cryptography–based schemes.
    International Journal of Security and Networks 01/2012; 7(2). DOI:10.1504/IJSN.2012.050027
  • Source
    02/2011; DOI:10.7763/IJCEE.2011.V3.289


Available from