Limits...
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.


SecLEACH protocol.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f003: SecLEACH protocol.

Mentions: SecLEACH was proposed to enhance SLEACH. Figure 3 summarizes the SecLEACH protocol. It uses the random key pre-distribution scheme proposed by Eschenauer and Gligor [18]. Prior to deployment each node is given a secret key (shared only with BS) and a set of key rings drawn from a large key pool. Those key rings contain pairs of key ids and keys.


A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

SecLEACH protocol.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f003: SecLEACH protocol.
Mentions: SecLEACH was proposed to enhance SLEACH. Figure 3 summarizes the SecLEACH protocol. It uses the random key pre-distribution scheme proposed by Eschenauer and Gligor [18]. Prior to deployment each node is given a secret key (shared only with BS) and a set of key rings drawn from a large key pool. Those key rings contain pairs of key ids and keys.

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.