A NOVEL SECURE AND MULTIPATH ROUTING ALGORITHM IN WIRELESS SENSOR NETWORKS

Bayrem Triki, Slim Rekhis, Noureddine Boudriga

2010

Abstract

Multipath routing inWireless Sensors Networks (WSNs) is used in order to tolerate node failures and improve the reliability of data routing. To make a multipath routing algorithm adaptive to the sensitivity of the used application, communicating nodes in the network should be able to specify to which extent the established paths are disjoint. In this paper, we propose a novel routing algorithm for Wireless Sensor Networks (WSN) entitled Secure Multipath Routing Algorithm (SeMuRa). We extend the concept of k-connectivity to k-xconnectivity where x is the value of threshold representing the maximal number of nodes shared between any two paths in the set of the k established paths. The proposed algorithm: a) is based on on-demand routing; b) uses labels in the datagrams exchanged during the route discovery to carry the threshold x; and c) is secure thanks to the use of threshold signature. A simulation is conducted to prove the efficiency of the algorithm and estimate the additional overhead.d.

References

  1. Dulman, S., Wu, J., and Havinga, P. (April 2003). An energy efficient multipath routing algorithm for wireless sensor networks. IEEE International Symposium on Autonomous Decentralized Systems (ISADS 2003), Pisa, Italy.
  2. H.M., A. and A.E., K. (June 2009). On the minimum kconnectivity repair in wireless sensor networks. in the proceedings of the IEEE International Conference on Communications (ICC)., pages Page(s):1 - 5.
  3. Johnson, D. B. and Maltz., D. (1996.). Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors, Mobile Computing, Mobile Computing, volume 353.
  4. Karl, H. and Willig, A. (2007). Protocols and Architectures for Wireless Sensor Networks. Wiley, 1st Edition.
  5. Krupadanam, S. and Fu, H. (July 2008). Beacon-less location detection in wireless sensor networks for non-flat terrains. International Journal of Software Engineering and Its Applications, Vol. 2, No. 3,.
  6. Law, Y., Yen, L., Pietro, R., and Palaniswami, M. (2007). Secure k-connectivity properties of wireless sensor networks. IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
  7. Lee, J., Lee, Y., and Syrotiuk, V. R. (May 2007). The performance of a watchdog protocol for wireless network security. International Journal of Wireless and Mobile Computing.
  8. Sliti, M., Hamdi, M., and Boudriga, N. (2008). An elliptic threshold signature framework for k-security in wireless sensor networks. Electronics, Circuits and Systems, ICECS 2008. 15th IEEE International Conference on.
  9. Triki, B., Rekhis, S., and Boudriga, N. (2009). Digital investigation of wormhole attacks in wireless sensor networks. nca, pp.179-186, Eighth IEEE International Symposium on Network Computing and Applications,.
  10. Yang, P. and Huang, B. (2008). Multi-path routing protocol for mobile ad hoc network. International Conference on Computer Science and Software Engineering.
Download


Paper Citation


in Harvard Style

Triki B., Rekhis S. and Boudriga N. (2010). A NOVEL SECURE AND MULTIPATH ROUTING ALGORITHM IN WIRELESS SENSOR NETWORKS . In Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems - Volume 1: DCNET, (ICETE 2010) ISBN 978-989-8425-25-6, pages 25-34. DOI: 10.5220/0002983100250034


in Bibtex Style

@conference{dcnet10,
author={Bayrem Triki and Slim Rekhis and Noureddine Boudriga},
title={A NOVEL SECURE AND MULTIPATH ROUTING ALGORITHM IN WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems - Volume 1: DCNET, (ICETE 2010)},
year={2010},
pages={25-34},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002983100250034},
isbn={978-989-8425-25-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems - Volume 1: DCNET, (ICETE 2010)
TI - A NOVEL SECURE AND MULTIPATH ROUTING ALGORITHM IN WIRELESS SENSOR NETWORKS
SN - 978-989-8425-25-6
AU - Triki B.
AU - Rekhis S.
AU - Boudriga N.
PY - 2010
SP - 25
EP - 34
DO - 10.5220/0002983100250034