Heterogeneous Clustering for Secure, Energy-efficient and Fault tolerant Permutation Routing in Wireless Sensor Networks

In wireless sensor networks (WSNs), security and economy of energy are two important and necessary aspects to consider. Particularly, security helps to ensure that such a network is not subject to attacks that involve reading, modification or destruction of information. This paper presents a protocol for permutation routing, which is secure, fault tolerant and energy-efficient. The proposed protocol is based on two main principles. First, the use of a heterogeneous hierarchical clustered structure to assign the most important roles to the sensors having the most energy, in order to ensure the protection and routing of data items. Second, the use of multiple processes based on this structure to ensure, regardless of network and sensors status, no data is lost and that a data item from a point A to a point B always arrives safety. This is the first protocol that provides such a QoS per permutation routing.

[1]  Peng Ning,et al.  Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[2]  Stephan Olariu,et al.  Training a Wireless Sensor Network , 2005, Mob. Networks Appl..

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Puneet Azad Energy Efficient Clustering Algorithms for Wireless Sensor Networks , 2015 .

[5]  Sébastien Faye,et al.  An Ultra Hierarchical Clustering-Based Secure Aggregation Protocol for Wireless Sensor Networks , 2011 .

[6]  Amitava Datta,et al.  Fault-tolerant and energy-efficient permutation routing protocol for wireless networks , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[7]  D.P. Agrawal,et al.  APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[8]  Jean Frédéric Myoupo,et al.  Concurrent broadcasts-based permutation routing algorithms in radio networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[9]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[10]  Stephan Olariu,et al.  Broadcast-Efficient Protocols for Mobile Radio Networks , 1999, IEEE Trans. Parallel Distributed Syst..

[11]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[12]  Djibo Karimou,et al.  A Fault-Tolerant Permutation Routing Algorithm in Mobile Ad-Hoc Networks , 2005, ICN.

[13]  Ignasi Sau Valls Optimal Permutation Routing on Mesh Networks , 2007 .

[14]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[15]  J. Myoupo,et al.  Randomized Permutation Routing in Multi-hop Ad Hoc Networks with Unknown Destinations , 2006 .

[16]  P. Annadurai,et al.  Secure Geocast in Ad Hoc Network Using Multicasting Key Distribution Scheme (SGAMKDS) , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[17]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[18]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[19]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[20]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[21]  Albert Y. Zomaya,et al.  An energy-efficient permutation routing protocol for single-hop radio networks , 2002, IEEE Transactions on Parallel and Distributed Systems.

[22]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[23]  Jonathan R. Agre,et al.  An Integrated Architecture for Cooperative Sensing Networks , 2000, Computer.

[24]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[25]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[26]  Djibo Karimou,et al.  An Application of an Initialization Protocol to Permutation Routing in a Single-Hop Mobile Ad Hoc Networks , 2005, The Journal of Supercomputing.

[27]  Said Fathy El-Zoghdy,et al.  A Scalable and Distributed Security Protocol for Multicast Communications , 2011, Int. J. Netw. Secur..

[28]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[29]  Albert Y. Zomaya,et al.  Energy-Efficient Permutation Routing in Radio Networks , 2001, IEEE Trans. Parallel Distributed Syst..

[30]  Hicham Lakhlef,et al.  An Efficient Permutation Routing Protocol in Multi-Hop Wireless Sensor Networks , 2011 .

[31]  Celia Li,et al.  Secure Routing for Wireless Mesh Networks , 2011, Int. J. Netw. Secur..

[32]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[33]  Kristofer S. J. Pister,et al.  Smart Dust: Communicating with a Cubic-Millimeter Computer , 2001, Computer.

[34]  Cheng-Chi Lee,et al.  A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy , 2011, Int. J. Netw. Secur..