Limits...
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.


The proposed protocol.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f007: The proposed protocol.

Mentions: Based on the previous security requirements, a protocol that considers security in the cluster formation, routing mechanism and data aggregation process is proposed. This protocol is summarized by Figure 7. Like the LEACH protocol, the proposed protocol works in rounds and has two phases, the setup phase and steady-state phase.


A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

Rahayu TM, Lee SG, Lee HJ - Sensors (Basel) (2015)

The proposed protocol.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4541824&req=5

sensors-15-15127-f007: The proposed protocol.
Mentions: Based on the previous security requirements, a protocol that considers security in the cluster formation, routing mechanism and data aggregation process is proposed. This protocol is summarized by Figure 7. Like the LEACH protocol, the proposed protocol works in rounds and has two phases, the setup phase and steady-state phase.

Bottom Line: With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol.Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal.We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

View Article: PubMed Central - PubMed

Affiliation: Department of Ubiquitous IT, Dongseo University, Busan 617-716, South Korea. gia.sutriadi@gmail.com.

ABSTRACT
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

No MeSH data available.