Redeemable Reputation Based Secure Routing Protocol for Wireless Sensor Networks by Younghun Chae a Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science University of Rhode Island

نویسندگان

  • YOUNGHUN CHAE
  • Lisa DiPippo
  • Gerard M. Baudet
  • Yan Lindsay Sun
  • Nasser H. Zawia
چکیده

Wireless Sensor Networks (WSNs) can be used for various applications, such as military, environmental, health, home, and other commercial applications. Since thousands of sensor nodes are densely deployed, and they are based on mobile ad-hoc networks, a secure routing scheme become a critical and challenging issue to WSNs. Recent advances in WSNs have led to many new protocols designed for securing against external attacks and internal attacks. The defense against external attacks can be achieved by employing strong cryptography, but it requires a huge amount of hardware resource, such as memory for storing neighboring nodes’ keys or battery power for calculating the complex encryption and decryption processes. Moreover, cryptography is not enough to defend against internal attacks when the key information is exposed. Thus, secure routing protocols against internal attacks need to be employed simultaneously. When these two secure schemes are employed by WSNs, the length of the transaction path affects to the network lifetime and the transaction time of a network because every transaction requires the calculation energy and time for cryptography. Therefore, secure routing protocols should try to shorten the transaction path. On one hand, some proposals protocols have blocked the badly evaluated nodes without a second chance, although the bad behaviors can be temporary. On the other hand, even if the protocol provides a second opportunity to a node, they were easily disturbed by On-off attacks. Since there is an opportunity that a transaction can achieve the shortest path to destination through the badly reputed node, the secure routing protocol should give more number of opportunities to the node. This paper presents three contributions. First, we propose a new concept of trust value and management scheme that can efficiently defend against On-off attacks. Second, we show the benefits of our protocol with experiment results. Last, we present flexible design of our trust management scheme with analytical results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and during routing and discovering of new routes, the lowest remained energy of nodes and route tra...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

A Priority-based Routing Algorithm for Underwater Wireless Sensor Networks (UWSNs)

Advances in low-power electronics design and wireless communication have enabled the development of low cost, low power micro-sensor nodes. These sensor nodes are capable of sensing, processing and forwarding which have many applications such as underwater networks. In underwater wireless sensor networks (UWSNs) applications, sensors which are placed in underwater environments and predicted ena...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012