Limits...
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.


MS-LEACH protocol.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f004: MS-LEACH protocol.

Mentions: MS-LEACH was proposed to enhance the security of SLEACH by providing data confidentiality and node-to-CH authentication using pairwise keys shared among nodes. Figure 4 shows the protocol.


A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

MS-LEACH protocol.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f004: MS-LEACH protocol.
Mentions: MS-LEACH was proposed to enhance the security of SLEACH by providing data confidentiality and node-to-CH authentication using pairwise keys shared among nodes. Figure 4 shows the protocol.

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.