M SPECTRA : Secure Power-Efficient Clustered-Topology Routing Algorithm in Large-scale Wireless micro-Sensor Networks

Wireless Sensor Networks (WSNs) have emerged as one of the hottest fields today due to their low-cost, self-organizing behavior, sensing ability in harsh environments, and their large application scope. One of the most challenging topics in WSNs is security. It is critical to provide confidentiality and authentication in order to prevent information from being compromised. However, providing key management for confidentiality and authentication is difficult due to the ad hoc nature, intermittent connectivity, and resource limitations of the sensor network. Though traditional public key-based security protocols do exist, they need large memory, bandwidths and complex algorithms, and are thus unsuitable for WSNs. To reduce the consumption of resources (energy, memory, CPU calculation time, etc.), it is necessary to use symmetric-key-based security. Current solutions to the security issues in WSNs do not consider the correlation between “routing” and “security” effectively. The focus of this work is on the integration of routing and key management to provide an energy efficient security and routing solution. Towards this goal, this work proposes a security protocol that encompasses the following features: integration of security and routing, dynamic security, robust re-keying, lowcomplexity, and multiple levels of encryption. Compared to many others such as SPINS [9], our security scheme with enhanced reliability and scalability consumes much less energy.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[3]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  Kang G. Shin,et al.  LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.

[6]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[7]  P.H.J. Chong,et al.  A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[8]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[9]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[10]  Hongyi Wu,et al.  Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006 .

[11]  Mike Chen,et al.  Security and Deployment Issues in a Sensor Network , 2000 .

[12]  Wendi B. Heinzelman,et al.  Application-specific protocol architectures for wireless networks , 2000 .

[13]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[14]  Yu-Chee Tseng,et al.  A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem , 2004, Mob. Networks Appl..

[15]  Chieh-Yih Wan,et al.  PSFQ: a reliable transport protocol for wireless sensor networks , 2002, WSNA '02.

[16]  Hongyi Wu,et al.  Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006, IEEE Transactions on Mobile Computing.

[17]  T. La Porta,et al.  On supporting distributed collaboration in sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[18]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[19]  Andreas Willig,et al.  A short survey of wireless sensor networks , 2003 .

[20]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[21]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[22]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[23]  Rimon Barr SWANS- Scalable Wireless Ad hoc Network Simulator User Guide , 2004 .

[24]  Yee Wei Law,et al.  Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying , 2002 .

[25]  N. Sadagopan,et al.  The ACQUIRE mechanism for efficient querying in sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[26]  Yee Wei Law,et al.  Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .

[27]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[28]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[29]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[30]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[31]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.