Trusted transport mode based cluster-merkle-tree for wireless sensor networks

Wireless sensors networks (WSNs) are susceptible because of its characters. The traditional security mechanisms can not be use to protect the WSNs. In the paper, a trusted transport mode based on cluster-merkle-tree for WSNs (TTMCMT) is proposed, which can provide a method of trusted transport with WSNs of great restriction. The object of scheme is to realize secure authentication and secure message transmission and resist forgery attack, replay attack tamper attack and intrusion attack. We describe the trusted scheme and present performance analyses, which clearly show the scheme is trusted, secure and effective in wireless sensor networks with minimal cost.

[1]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[2]  Wang Ruchuan,et al.  Research of Layer-Cluster Key Management Scheme on Wireless Sensor Networks , 2006 .

[3]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[4]  Anupam Joshi,et al.  Secure sensor networks for perimeter protection , 2003, Comput. Networks.

[5]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[6]  Scott Shenker,et al.  Routing Algorithms for DHTs: Some Open Questions , 2002, IPTPS.

[7]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[8]  Firdous Kausar,et al.  Key Management and Secure Routing in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[9]  Yang Bo Gauss reputation framework for sensor networks , 2008 .

[10]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[12]  Shen Yang,et al.  An Energy Efficient Clustering Protocol for Surveillance Sensor Networks , 2008 .

[13]  Huirong Fu,et al.  Analysis of key management in wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[14]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[15]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[16]  Baohua Zhao,et al.  Trust-Based LEACH Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[17]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[18]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[19]  Quan Zhou,et al.  Secure Routing Protocol Cluster-Gene-Based for Wireless Sensor Networks , 2009, 2009 First International Conference on Information Science and Engineering.

[20]  Jiliang Zhou,et al.  An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network , 2008, 2008 International Conference on Information and Automation.