Limits...
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.


LEACH protocol.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f001: LEACH protocol.

Mentions: There are major routing protocols for WSN such as clustering-based routing protocols, TinyOS beaconing, directed diffusion, geographic routing, minimum cost forwarding, rumor routing and energy conserving topology maintenance [4]. Clustering-based routing is famous for its energy-efficient features. One of protocols in this family is LEACH. LEACH rotates randomly the role of CHs in order to evenly distribute the energy load among the sensors in the network. It incorporates a data aggregation scheme into its routing protocol to reduce the amount of information that CHs should transmit to the BS. LEACH considers a network model where a fixed BS is located far from sensors and all sensors in the network are homogeneous and energy-constrained. LEACH assumes that every node can reach the BS by transmitting with sufficiently high-power. Figure 1 summarizes LEACH protocol in steps.


A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

LEACH protocol.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f001: LEACH protocol.
Mentions: There are major routing protocols for WSN such as clustering-based routing protocols, TinyOS beaconing, directed diffusion, geographic routing, minimum cost forwarding, rumor routing and energy conserving topology maintenance [4]. Clustering-based routing is famous for its energy-efficient features. One of protocols in this family is LEACH. LEACH rotates randomly the role of CHs in order to evenly distribute the energy load among the sensors in the network. It incorporates a data aggregation scheme into its routing protocol to reduce the amount of information that CHs should transmit to the BS. LEACH considers a network model where a fixed BS is located far from sensors and all sensors in the network are homogeneous and energy-constrained. LEACH assumes that every node can reach the BS by transmitting with sufficiently high-power. Figure 1 summarizes LEACH protocol in steps.

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.