|
|
Energy Efficiency Study of Secret Communication Method on Clustering Secure Routing in WSNs |
Long Zhao-hua① Gong Jun① Wang Bo① Qin Xiao-huan① Liu Da-ming①② |
①(Institute of Computer Architecture, Chongqing University of Post and Telecommunications, Chongqing 400065, China)
②(College of Mobile Telecommunications, Chongqing University of Post and Telecommunications, Chongqing 400065, China) |
|
|
Abstract The method of secure communications is the critical techniques for Wireless Sensor Networks (WSNs) to guarantee the routing information security in the process of transmission. But most of wireless sensor network routing protocol have problems involving security. From the perspective of balanced energy consumption, a balanced energy consumption of Secret Communication Protocol(SCP) is proposed and the SCP secret communication method is also introduced. In addition, the security scheme of the agreement is analysed in this paper. Finally, simulation is conducted on the performance of the protocol. The results show that this protocol has high performance in terms of energy and security.
|
Received: 19 October 2014
Published: 08 June 2015
|
|
Corresponding Authors:
Long Zhao-hua
E-mail: longzh@cqupt.edu.cn
|
|
|
|
[1] |
Kohanbash D, Kantor G, and Martin T, et al.. Wireless sensor network design for monitoring and irrigation control: user-centric hardware and software development[J]. HortTechnology, 2013, 23(6): 725-734.
|
[2] |
Park Y T, Sthapit P, and Pyun J Y. Energy efficient data fragmentation for ubiquitous computing[J]. The Computer Journal, 2014, 57(2): 263-272.
|
[3] |
Padmavathi G and Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks[J]. International Journal of Computer Science and Information Security, 2009, 4(1/2): 1-9.
|
[4] |
Wang X and Li Y. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks[J]. Chinese Journal of Electronics, 2009, 18(1): 8-12.
|
[5] |
司海飞, 杨忠, 王珺. 无线传感器网络研究现状与应用[J]. 机电工程, 2011, 28(1): 16-20.
|
|
Si H, Yang Z, and Wang J. Review on research status and application of wireless sensor networks[J] Journal of Mechanical & Electrical Engineering, 2011, 28(1): 16-20.
|
[6] |
钱志鸿, 王义君. 面向物联网的无线传感器网络综述[J]. 电子与信息学报, 2013, 35(1): 215-227.
|
|
Qian Z and Wang Y. Internet of things-oriented wireless sensor networks review[J] Journal of Electronics & Information Technology, 2013, 35(1): 215-227.
|
[7] |
Wang X, Yang L, and Chen K. Sleach: secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks[J]. Wuhan University Journal of Natural Sciences, 2006, 10(1): 127-131.
|
[8] |
Chen X, Yang Z, and Cheng H. Unequal clustering mechanism of leach protocol for wireless sensor networks[C]. 2009 WRI World Congress on Computer Science and Information Engineering, IEEE, Los Angeles, CA, USA, 2009, 1: 258-262.
|
[9] |
Perrig A, Szewczyk R, and Tygar J D, et al.. Spins: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534.
|
[10] |
Ye M, Li C, Chen G, et al.. EECS: an energy efficient clustering scheme in wireless sensor networks[C]. 24th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 2005: 535-540.
|
[11] |
黄振海, 赖晓龙, 铁满霞, 等. 三元对等鉴别及访问控制方法国际提案进展[J]. 信息技术与标准化, 2009(6): 21-23.
|
|
Huang Z, Lai X, and Tie M, et al.. The progress of Tri- element Peer Authentication (TePA) and access control method[J]. Information Technology & Standardization, 2009(6): 21-23.
|
[12] |
Das M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communi- cations, 2009, 8(3): 1086-1090.
|
[13] |
Huang Z, Lai X, and Li D. Information security technology Entity authentication involving a trusted third party and access architecture specification[OL]. http://www. csres.com /detail/225096.html
|
[14] |
Gu Y, Ji Y, Chen H, et al.. TAPEMAN: towards an optimal data gathering mechanism in wireless sensor networks[J]. Chinese Journal of Electronics, 2013, 19(4): 594-598.
|
[15] |
Kumar P, Choudhury A J, Sain M, et al.. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.
|
[16] |
Xi'an University of Posts & Telecommunications, China IWNCOMM Co., Ltd, and Beijing University of Posts and Telecommunications. Wired local area network medium access control security specification[OL]. http://www. bjstandard.com/standard/283215.html.
|
|
|
|