Abstract
In this paper, we propose a novel secure routing protocol named Secure Multi-pAths Routing for wireless sensor neTworks (SMART) as well as its underlying key management scheme named Extended Two-hop Keys Establishment (ETKE). The proposed framework keeps consistent routing topology by protecting the hop count information from being forged. It also ensures a fast detection of inconsistent routing information without referring to the sink node. We analyze the security of the proposed scheme as well as its resilience probability against the forged hop count attack. We have demonstrated through simulations that SMART outperforms a comparative solution in literature, i.e., SeRINS, in terms of energy consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)
Lee, S., Choi, Y.: A secure alternate path routing in sensor networks. Computer Communications 30(1), 153–165 (2006)
Challal, Y., Ouadjaout, A., Lasla, N., Bagaa, M., Hadjidj, A.: Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. Journal of Network and Computer Applications 34(4), 1380–1397 (2011)
Ghosal, A., Halder, S.: Intrusion detection in wireless sensor networks: Issues, challenges and approaches. In: Wireless Networks and Security. Signals and Communication Technology, pp. 329–367 (2013)
Dimitriou, T.D.: Securing communication trees in sensor networks. In: Nikoletseas, S.E., Rolim, J.D.P. (eds.) ALGOSENSORS 2006. LNCS, vol. 4240, pp. 47–58. Springer, Heidelberg (2006)
Stavrou, E., Pitsillides, A.: A survey on secure multipath routing protocols in wsns. Computer Networks 54(13), 2215–2238 (2010)
Bagaa, M., Challal, Y., Ouadjaout, A., Lasla, N., Badache, N.: Efficient data aggregation with in-network integrity control for wsn. J. Parallel Distrib. Comput. 72(10), 1157–1170 (2012)
Chen, C.Y., Chao, H.C.: A survey of key distribution in wireless sensor networks. In: Security and Communication Networks (2011)
Cheng, Y., Agrawal, D.P.: An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks 5(1), 35–48 (2007)
Deng, J., Hartung, C., Han, R., Mishra, S.: A practical study of transitory master key establishment for wireless sensor networks. In: Proc First IEEE Int’l Conf Security and Privacy for Emerging Areas in Comm. Networks, SecureComm 2005 (2005)
Hai, T.H., Nam Huh, E., Jo, M.: A lightweight intrusion detection framework for wireless sensor networks. Wireless Communications and Mobile Computing 10(4), 559–572 (2010)
Titzer, B., Lee, D.K., Palsberg, J.: Avrora: scalable sensor network simulation with precise timing. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN), pp. 477–482 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Lasla, N., Derhab, A., Ouadjaout, A., Bagaa, M., Challal, Y. (2014). SMART: Secure Multi-pAths Routing for wireless sensor neTworks. In: Guo, S., Lloret, J., Manzoni, P., Ruehrup, S. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2014. Lecture Notes in Computer Science, vol 8487. Springer, Cham. https://doi.org/10.1007/978-3-319-07425-2_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-07425-2_25
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07424-5
Online ISBN: 978-3-319-07425-2
eBook Packages: Computer ScienceComputer Science (R0)