Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance

Wireless sensor networks (WSNs) integrate sensor technology, communication technology and information processing technology; it is a synthetic discipline. WSNs have been applied into almost all walks of life. However, in many special fields, network security is a basic and important factor which we must concern for. This paper introduces the key management scheme after analyzing the security threats of LEACH protocol. At the same time, we adopt several related mechanisms to protect the communication among the sensor nodes and the confidentiality of the data transmission. Also, we use the mixed multipath mechanism among the clusters to improve the security of the network and strengthen the intrusion tolerance.

[1]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[2]  Liu Zhi-jie Research of cluster-based multi-hop routing protocol , 2007 .

[3]  Li Fang Assistant Cluster Head Clustering Algorithm Based on LEACH Protocol , 2011 .

[4]  Tomoyuki Ohta,et al.  Improvement of assurance including security for wireless sensor networks using dispersed data transmission , 2012, J. Comput. Syst. Sci..

[5]  Othman Ibrahim,et al.  Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.

[6]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[7]  Edward J. Coyle,et al.  The Effects of Motion on Distributed Detection in Mobile Ad Hoc Sensor Networks , 2010, 2010 13th International Conference on Information Fusion.

[8]  Chen Gui-Hai,et al.  EADEEG:An Energy-Aware Data Gathering Protocol for Wireless Sensor Networks , 2007 .

[9]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[10]  Moufida Maimour,et al.  Node disjoint multi-path routing for ZigBee cluster-tree wireless sensor networks , 2011, 2011 International Conference on Multimedia Computing and Systems.

[11]  Zheng Li,et al.  Multipath routing modeling in ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[12]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[13]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[14]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[15]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[16]  M.B. Srinivas,et al.  Energy-aware routing in sensor networks using dual membership clusters and data highways , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[17]  Yong Xu,et al.  A Hybrid Key Management Scheme Based on Clustered Wireless Sensor Networks , 2012 .

[18]  Jingsha He,et al.  A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario , 2012, Int. J. Distributed Sens. Networks.

[19]  Maghsoud Abbaspour,et al.  IFRP: An Intrusion/Fault tolerant Routing Protocol for increasing resiliency and reliability in wireless sensor networks , 2011, ICOST 2011.