A Secure Data Transmission Scheme in Wireless Sensor Networks
نویسندگان
چکیده
Wireless sensor networks (WSNs) play a very important role in the Internet of Things. But, how to save the energy of the wireless sensor nodes and prolong the lifetime of such networks is an emergent task for the wide adoption of the networks. Considering the characteristics of wireless sensor nodes where energy consumption for transmitting data is much more than that for computation, this paper presents method for precalculating a secure and efficient path before data transmission begins. The basic idea of the proposed method is that the path length based Floyd algorithm and trust degree between neighboring nodes are used as the reference for the selection of the routes. Data is then transmitted along the secure and efficient path in the WSNs. Copyright © 2013 IFSA.
منابع مشابه
A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملOptimization of Energy Consumption in Image Transmission in Wireless Sensor Networks (WSNs) using a Hybrid Method
In wireless sensor networks (WSNs), sensor nodes have limited resources with regard to computation, storage, communication bandwidth, and the most important of all, energy supply. In addition, in many applications of sensor networks, we need to send images to a sink node. Therefore, we have to use methods for sending images in which the number and volume of packets are optim...
متن کامل