A multipath secure routing protocol based on malicious node detection

It is a significant challenge to design a secure routing protocol for wireless sensor networks (WSN), because a WSN has dynamic topology, limited energy, confined computing ability and small memory size. This study explores the algorithm of ensuring safety in routing layer for a WSN. In this paper, a multipath secure routing protocol for flat network--MDMP is proposed. Symmetric encryption and asymmetric encryption are exploited to encrypt and authenticate data in the network. Furthermore, malicious nodes will be detected out and isolates. Experiments show that MDMP provides effective immunity to a variety of attacks in WSN and better network performance.

[1]  Wendi B. Heinzelman,et al.  Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.

[2]  Huang Lee,et al.  QoS-based geographic routing for event-driven image sensor networks , 2005, 2nd International Conference on Broadband Networks, 2005..

[3]  Jonathan R. Agre,et al.  An Integrated Architecture for Cooperative Sensing Networks , 2000, Computer.

[4]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[5]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[6]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[7]  Yuan-xi Jiang,et al.  A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[8]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .

[9]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[10]  C. Hishinuma,et al.  An Agent Scheduling Optimization for Call Centers , 2007 .