Two Tier Secure Routing Protocol for Heterogeneous Sensor Networks

North Dakota State Univ., Fargo
IEEE Transactions on Wireless Communications (Impact Factor: 2.5). 10/2007; 6(9):3395 - 3401. DOI: 10.1109/TWC.2007.06095
Source: DBLP


Research on sensor network routing focused on efficiency and effectiveness of data dissemination. Few of them considered security issues during the design time of a routing protocol. Furthermore, previous research on sensor networks mainly considered homogeneous sensor networks where all sensor nodes have the same capabilities. It has been shown that homogeneous ad hoc networks have poor fundamental performance limits and scalability. To achieve better performance, we adopt a heterogeneous sensor network (HSN) model. In this paper, we present a secure and efficient routing protocol for HSNs - two tier secure routing (TTSR). TTSR takes advantage of powerful high-end sensors in an HSN. Our security analysis demonstrates that TTSR can defend typical attacks on sensor routing. Our performance evaluation shows that TTSR has higher delivery ratio, lower end-to-end delay and energy consumption than a popular sensor network routing protocol.

1 Follower
26 Reads
  • Source
    • "Node replication activities are easily controlled at the BS, as the entire key establishment takes place at the BS. Xiaojiang Du, Sghaier Guizani et al. [11] proposed a Two-Tier Secure Routing protocol (TTSR) for heterogeneous sensor networks (HSN). It offers security attributes such as authentication, confidentiality, and integrity. "
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless Sensor Networks (WSNs) have been a subject of extensive research and have undergone explosive growth in the last few years. WSNs utilize collaborative measures such as data gathering, aggregation, processing, and management of sensing activities for enhanced performance. In order to communicate with the sink node, node having low power may have to traverse multi-hops. This requires neighbors' nodes to be used as relays. However, if the relay nodes are compromised or malicious, they may leak confidential information to unauthorized nodes in the WSN. Moreover, in many WSN applications, the deployment of sensor nodes is carried out in an ad-hoc fashion without careful examination. In such networks it is desirable to ensure the source to sink privacy and maximize the lifetime of the network, by finding secure energy-efficient route discovery and forwarding mechanisms. Careful management is also necessary, as processing required for secure routing is distributed over multiple nodes. An important consideration in this regard is energy-aware secure routing, which is significant in ensuring smooth operation of WSNs. As, these networks deal in sensitive data and are vulnerable to attack, it is important to make them secure against various types of threats. However, resource constraints could make the design, deployment and management of large WSNs a challenging proposition. The purpose of this paper is to highlight routing based security threats, provide a detailed assessment of existing solutions and present a Trust-based Energy Efficient Secure Routing Protocol (TEESR). The paper also highlights future research directions in of secure routing in multi-hop WSNs.
    Digital Information Management (ICDIM), 2013 Eighth International Conference on; 01/2013
  • Source
    • "Routing protocols are typically designed for symmetric communication networks. Even in heterogeneous sensor networks where sensors have different transmission ranges, researchers assume that the links between nodes are symmetric [7], [10], [27], [28]. The asymmetric links make most of the existing protocols fail or operate with high overhead and low through- put. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose performance guaranteed routing protocols in asymmetric sensor networks (ASNs) where two end nodes may not use the same path to communicate with each other. ASNs can be caused by hardware devices or environment. Different from most of the existing routing protocols in symmetric sensor networks, because of asymmetry, achieving desired routing performance in ASNs poses significant research challenges. To address these challenges, we first propose a general framework protocol called reverse path (RP) to deal with asymmetric links and then present two efficient routing algorithms LayHet and EgyHet built on RP to satisfy performance requirements. LayHet is a performance guaranteed layer-based routing protocol that embeds the shortest path information and saves energy by minimizing the number of broadcasts and the probability of forwarding. EgyHet is its energy-upgraded version that considers nodes' remaining energy. Simulation results comparing the proposed and existing protocols show that LayHet and EgyHet can reach the desired delivery rate earlier than the existing one and outperform it in terms of average hops, average packet replication overhead, and average control message overhead. In addition, as sensor energy reduces, the performance of LayHet and EgyHet eventually degrades more slowly than that of the existing one.
    IEEE Transactions on Emerging Topics in Computing 01/2013; 1(1):111-120. DOI:10.1109/TETC.2013.2273888
  • Source
    • "This assumption is reasonable; hence, the number of CHs in a heterogeneous WSN is relatively small (e.g. approximately 20– 30 CHs for 1000 sensors), and the cost of such tamper-resistant hardware is small (Du et al., 2007). Users are equipped with portable computing devices, such as laptops, with no power constraints compared to sensor nodes. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a secure and scalable user authentication scheme for heterogeneous wireless sensor networks to prevent intrusions. Our scheme employs both public and secret key cryptography schemes, such that it takes advantages from both. Our analysis and simulation results show that our scheme is not only more secure and scalable than existing secret key cryptography–based schemes, but also requires less processing power and provides higher energy efficiency than existing public key cryptography–based schemes.
    International Journal of Security and Networks 01/2012; 7(2). DOI:10.1504/IJSN.2012.050027
Show more


26 Reads
Available from