KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS

K. Shaila, G. H. Vineet, C. R. Prashanth, V. Tejaswi, K. R. Venugopal, L. M. Patnaik

2011

Abstract

Wireless Sensor Networks (WSNs) consists of a large number of tiny autonomous devices called sensors which are vulnerable to security threats. Heterogeneous Wireless Sensor Networks consists of two types of nodes L1 and L2 that employees Unbalanced Key Distribution Scheme to ensure enhanced security. In this paper, the concept of Link Strength is utilized, which determines the path to be selected for secure routing. Our Keymatches Constrained Secure Routing(KCSR) algorithm provides the flexibility to choose secure path and then route the data accordingly. In this approach, secure and stable paths are chosen for communication. Simulation results show that the proposed algorithm yields better results emphasizing security when compared with earlier works.

References

  1. Chao, J. and Xiuli, R. (2008). A novel random key algorthim in wireless sensor networks. In Proceedings of The International Conference on Advances in Mobile Computing and Multimedia, pages 687-691.
  2. Chris Karlof, N. S. and Wagner, D. (2004). Tinysec: A link layer security architecture for wireless sensor networks. In Proceedings of ACM Conference on Simulators(SenSys), pages 162-175.
  3. Debao Xiao, M. W. and Zhou, Y. (2006). Secure-spins: Secure sensor protocol for information via negotiation for wireless sensor networks. In Proceedings of IEEE Conference on Industrial Electronics and Applications(ICIEA), pages 1-4.
  4. Eschaenauer, L. and Gligor, V. (2002). A key management scheme for distributed sensor networks. In Proceedings ACM Conference on Computer and Communication Security (CCS'02), pages 41-47.
  5. F. L. Lewis, D. J. Cook, S. K. D. and Wiley, J. (2004). Wireless sensor networks. In Smart Environment Technologies, Protocols and Applications, New York, pages 1-18.
  6. Haowen Chan, A. P. and Song, D. (2006). Random key predistribution schemes for sensor networks. In Proceedings ACM/USENIX Fourth International Conference on Mobile Systems Applications and Services (Mobi Sys'06), pages 197-215.
  7. Manel Boujelben, Omar Cheikhrouhon, M. A. and Youssef, H. (2009). Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks. In Proceedings Third International Conference on Sensor Technologies and Applications (Sensorcomm 2009), pages 442-448.
  8. Perrig, A., S, R., W, V., C, D., and Tygar, J. D. (2002). Spins: Security protocols for sensor networks. In Journal on Wireless Networks, pages 521-534.
  9. Rodrigo Roman, J. Z. and Lopez, J. (2005). On the security of wireless sensor networks. In Proceedings ACM Conference on Network Security, Springer, LNCS, 3482, pages 681-690.
  10. Traynor, P., Kumar, R., Choi, H., Cao, G., Zhu, S., and LaPorta, T. (2007). Efficient hybrid security mechanisms for heterogeneous sensor networks. In IEEE Transactions on Mobile Computing, volume 6, pages 663-677.
  11. Traynor, P., Kumar, R., Saad, H. B., Cao, G., and LaPorta, T. (2006). Liger: A hybrid key management scheme for heterogeneous sensor networks. In Proceedings ACM/USENIX Fourth International Conference on Mobile Systems Applications and Services (Mobi Sys'06), pages 15-27.
  12. Wang, Y. and Ramamurthy, B. (2008). A key management protocol for hybrid wireless sensor networks. In Proceedings of The International Conference on Communication(ICC), pages 1625-1629.
  13. Wenliang Du, Jing Deng, Y. S. H. and V, P. K. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Journal Computer and Communication Security. ACM.
  14. Yong Wang, B. R. and Xue, Y. (2008). A key management protocol for wireless sensor networks with multiple base station. In Proceedings of IEEE International Conference(ICC 2008), pages 1625-1629.
Download


Paper Citation


in Harvard Style

Shaila K., Vineet G., Prashanth C., Tejaswi V., Venugopal K. and Patnaik L. (2011). KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 978-989-8425-56-0, pages 13-22. DOI: 10.5220/0003438700130022


in Bibtex Style

@conference{iceis11,
author={K. Shaila and G. H. Vineet and C. R. Prashanth and V. Tejaswi and K. R. Venugopal and L. M. Patnaik},
title={KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2011},
pages={13-22},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003438700130022},
isbn={978-989-8425-56-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - KCSR: KEYMATCHES CONSTRAINED SECURE ROUTING IN HETEROGENEOUS WIRELESS SENSOR NETWORKS
SN - 978-989-8425-56-0
AU - Shaila K.
AU - Vineet G.
AU - Prashanth C.
AU - Tejaswi V.
AU - Venugopal K.
AU - Patnaik L.
PY - 2011
SP - 13
EP - 22
DO - 10.5220/0003438700130022