Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy, low security…) to the design and management of wireless sensor networks. These challenges necessitate a great attention. In this paper, we present a new version of Directed Diffusion routing protocol which provides both security and energy efficiency together in wireless sensor networks.

[1]  Shio Kumar Singh,et al.  A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .

[2]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[3]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[6]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[7]  M. R. Tripathy,et al.  Routing Protocols in Wireless Sensor Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[8]  Min Chen,et al.  Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks , 2006, Comput. Commun..

[9]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[10]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[11]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[12]  John A. Stankovic,et al.  A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks , 2004, Handbook of Sensor Networks.

[13]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[14]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[15]  Sanjay Kumar Madria,et al.  SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.

[16]  Mohammad Sadeghi,et al.  Security Analysis of Routing Protocols in Wireless Sensor Networks , 2012 .

[17]  Kefei Chen,et al.  SDD: Secure Distributed Diffusion Protocol for Sensor Networks , 2004, ESAS.

[18]  El Kaissi,et al.  DAWWSEN a defense mechanism against wormhole attacks in wireless sensor networks - by Rouba Zakaria El Kaissi , 2005 .

[19]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[20]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[21]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[22]  Ertan Onur,et al.  WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES , 2006 .