Secure-EEDR: Dynamic Key Exchange Protocol Based on Diffie-Hellman Algorithm with NOVSF Code-Hopping Technique for Wireless Sensor Networks

Secure data transmission and data routing are critical in designing cluster based sensor network. This paper presents a secure energy efficient dynamic routing scheme (SEEDR) for wireless sensor networks. SEEDR uses a symmetric cryptography algorithm to support security. The dynamic key exchange protocol based on DH (Diffie-Hellman) algorithm is proposed, with non blocking OVSF codes. Our analytical model and the security analysis prove that SEEDR increase data communication security and consume less communication energy.

[1]  H. Cam,et al.  Energy efficient security protocol for wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[2]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[3]  Anantha Chandrakasan,et al.  Dynamic Power Management in Wireless Sensor Networks , 2001, IEEE Des. Test Comput..

[4]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[5]  Tony Chung Poster Abstract : DHB-KEYA Diffie-Hellman Key Distribution Protocol for Wireless Sensor Networks , 2007 .

[6]  Donghoon Lee,et al.  An energy efficient dynamic routing scheme for clustered sensor network using a ubiquitous robot , 2008, 2008 IEEE International Conference on Research, Innovation and Vision for the Future in Computing and Communication Technologies.

[7]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[8]  Hasan Çam Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems , 2003, Comput. Commun..

[9]  Lui Sha,et al.  Dynamic clustering for acoustic target tracking in wireless sensor networks , 2003, IEEE Transactions on Mobile Computing.

[10]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[11]  Sun Youxian,et al.  The Deployment Algorithms in Wireless Sensor Net Works: A Survey , 2009 .

[12]  Liusheng Huang,et al.  Wireless Sensor Networks for Intensive Irrigated Agriculture , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[13]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[14]  Xiangyu Wei,et al.  The sensor network based on LONWORKS technology , 1999, SICE '99. Proceedings of the 38th SICE Annual Conference. International Session Papers (IEEE Cat. No.99TH8456).

[15]  Zhenfu Cao,et al.  Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol , 2008, IEEE Communications Letters.

[16]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.