Variance Aware Secure Routing for Heterogeneous Wireless Sensor Networks

Secure Communication is important parameter in unattended and hostile environment. Wireless Sensor Networks (WSNs) are deployed and operate in vulnerabilities and are candidate networks which should be commissioned for security provisioning in end to end communications. Because of their specialized applications many solutions in terms of cryptographic, Intrusion Detection and Key Management have been proposed. Most solutions lack and seem of ignoring the fact that route is as strong as weakest link in the route with respect to other links in the route. Variance of number of keys and high average number of keys on routes is an issue that we tried to resolve in our proposal using non-uniform key pre-distribution in Heterogeneous Wireless Sensor Networks (HWSNs). Analytical and Simulation based study supports our concern and reports an improvement in Average number of keys in almost 60 percent routes and decreasing variance in almost 50 percent routes in random and probabilistic neighbourhood.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[4]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[5]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[6]  Sriram Chellappan,et al.  Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.

[7]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[8]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2007, IEEE Trans. Mob. Comput..

[11]  Ram Gopal Raj,et al.  A Model for Determining The Degree of Contradictions in Information , 2011 .

[12]  Koen Langendoen,et al.  An adaptive energy-efficient MAC protocol for wireless sensor networks , 2003, SenSys '03.

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[15]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[16]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[17]  Jing Liu,et al.  Secure Routing for Mobile Ad Hoc Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[18]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[19]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.