NIS02-2: A Secure Routing Protocol for Heterogeneous Sensor Networks

Sensor networks are envisioned to have important applications in military and homeland security. For sensor networks deployed in such hostile environments, security is critical to ensure privacy, integrity, authenticity, and availability of communications. Routing is a fundamental operation in sensor networks. Past researches on sensor network routing focused on efficiency and effectiveness of data dissemination. Few of them considered security during the design phase of the routing protocols. Furthermore, previous researches on sensor networks mainly considered homogeneous sensor networks, i.e., all sensor nodes are the same. Research has shown that homogeneous ad hoc networks have poor performance. We adopt a heterogeneous sensor network (HSN) model for better performance and security. In this paper, we present an efficient secure routing protocol for HSN which takes advantage of the powerful high-end sensors. The security analysis demonstrates that the secure routing protocol can defend typical routing attacks. The simulation shows that the secure routing protocol has better performance than a popular routing protocol - directed diffusion.

[1]  Suresh Singh,et al.  Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[3]  Catherine Rosenberg,et al.  A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.

[4]  Deborah Estrin,et al.  A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.

[5]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[6]  Xiaoyan Hong,et al.  An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[7]  Xiaoyan Hong,et al.  Landmark routing in ad hoc networks with mobile backbones , 2003, J. Parallel Distributed Comput..

[8]  Xiaojiang Du,et al.  Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..

[9]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[10]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[11]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[12]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[13]  Baltasar Beferull-Lozano,et al.  Lossy network correlated data gathering with high-resolution coding , 2005, IEEE Transactions on Information Theory.

[14]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[15]  Xiaojiang Du,et al.  NIS01-1: An Efficient Key Management Scheme for Heterogeneous Sensor Networks , 2006, IEEE Globecom 2006.

[16]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..