Articles

Low-energy consumption tree routing security for wireless sensor networks

  • QIN Danyang ,
  • JIA Shuang ,
  • WANG Erfu ,
  • DING Shuchun ,
  • ZHEN Jiaqi ,
  • ZHAO Bing
Expand
  • School of Electronics Engineering, Heilongjiang University, Harbin 150080, China

Received date: 2015-03-18

  Revised date: 2015-05-18

  Online published: 2015-07-25

Abstract

Safe and reliable wireless sensor network (WSN) is an important branch of modern communication systems, and is an important technical support for ubiquitous communication. However, a large number of network attacks will threaten data security, which will seriously affect network reliability and greatly reduce the use value of WSN. This paper proposes a security model for lowenergy consumption tree routing protocols (LCTR), which achieves authentication and data integration using message authentication code (MAC) and digital signature (DS) techniques. Some common MACs and DSs have been taken as the reference to analyze the performance of LCTR. Simulating results show that with the model of LCTR, the safe transmitting rate of information is increased by 23% at most, and the network lifetime is increased by 5% at most.

Cite this article

QIN Danyang , JIA Shuang , WANG Erfu , DING Shuchun , ZHEN Jiaqi , ZHAO Bing . Low-energy consumption tree routing security for wireless sensor networks[J]. Science & Technology Review, 2015 , 33(13) : 76 -83 . DOI: 10.3981/j.issn.1000-7857.2015.13.013

References

[1] 张金辉, 郭晓彪, 符鑫. AES加密算法分析及其在信息安全中的应用
[J]. 通信学报, 2011, 28(5): 23-29. Zhang Jinhui, Guo Xiaobiao, Fu Xin. AES encryption algorithm and its application in information security[J]. Journal of Communications, 2011. 28(5): 23-29.
[2] Prabhakaran B. On suppoting reliable QoS in multi-hop multi-rate mobile ad hoc networks[J]. Wireless Networks, 2010, 11(3): 106-109.
[3] Maconea D, Oddib G, Pietrabissab A. MQ-Routing: Mobility, GPS and energy-ware routing protocol in MANETs for disaster relief scenarios
[J]. Ad Hoc Networks, 2012, 8(9): 2-4.
[4] Kaaniche H, Kamoun F. Mobility prediction in wireless ad hoc networks using neural networks[J]. Journal of Telecommunications, 2010, 8(1): 95-97.
[5] 吕九一, 陈楠. 无线传感器网络的应用与发展概述[J]. 科技广场, 2011, 11(3): 1-4. Lü Jiuyi, Chen Nan. Application and development overview of wireless sensor networks[J]. Technology Square, 2011, 11(3): 1-4.
[6] 陈正宇, 杨庚, 陈蕾. 无线传感器网络数据融合研究综述[J]. 计算机应 用研究, 2011, 10(5): 6-8. Chen Zhengyu, Yang Geng, Chen Lei. Summary of wireless sensor network data fusion research[J]. Application Research of Computers, 2011, 10(5): 6-8.
[7] Mekkaoui K, Rahmoun A. Analysis of hops length in wireless sensor networks[J]. Wireless Sensor Network, 2014, 6(5): 109-117.
[8] Torkestani J A. Mobility prediction in mobile wireless networks[J]. Joural of Network and Computer Applications, 2012, 8(5): 1633-1635.
[9] 蒋莹, 吴蒙. WSN基于网络编码数据传输可靠性研究[J]. 计算机技术 与发展, 2013, 37(4): 12-14. Jiang Ying, Wu Meng. Reliability research of WSN code-based data transmission network[J]. Computer Technology and Development, 2013, 37(4): 12-14.
[10] Lucas D, Joel J. A survey on cross-layer solutions for wireless sensor networks[J]. IEICE Transactions on Journal of Network and Computer Applications, 2011, 5(34): 523-534.
[11] Egemen K C, Dan B, Amit D. Modelling communication network challenges for future internet resilience, survivability, and disruption tolerance: a simulation-based approach[J]. Telecommunication Systems. 2013, 2(6): 751-768.
[12] Kaaniche H, Kamoun F. Mobility prediction in wireless ad hoc networks using neural network [J]. Journal of Telecommunications, 2010, 8(1): 95-97.
[13] Habib M, Ammari B. On the problem of k- coverage in missionoriented mobile wireless sensor networks[J]. Computer Networks, 2012, 6(1): 7-9.
Outlines

/