Design of Secure Clustering Routing Protocol using SNEP and µTESLA on Sensor Network Communication

Summary Contrary to general network, sensor network has many restrictions such as energy recharge. Accordingly, security mechanism used to general network cannot be applied to sensor network. Many researchers propose method of security and energy efficiency separately. To maximize energy efficiency, the methods to support data aggregation and cluster-head selection algorithm are proposed. To strengthen the security, the methods to support encryption techniques and manage a secret key that is applicable to sensor network are proposed. However, energy and security issues are trade-off. This paper is devoted to design secure routing protocol combining conventional routing protocol with security protocol. This new protocol is that encryption algorithm and key management method are applied to specific routing protocol. Finally, we appreciate proposed protocol and look about future work.

[1]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[2]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[3]  Mario Gerla,et al.  Clustering with power control , 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).

[4]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[5]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[6]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[7]  Hisao Ishibuchi,et al.  Performance evaluation of genetic algorithms for flowshop scheduling problems , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.

[8]  Timothy J. Shepard,et al.  A channel access scheme for large dense packet radio networks , 1996, SIGCOMM '96.

[9]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[10]  Timothy J. Shepard A channel access scheme for large dense packet radio networks , 1996, SIGCOMM 1996.

[11]  Pankaj Rohatgi,et al.  A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.

[12]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[13]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .