Skip to main content

Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 467))

Abstract

Wireless Sensor Network (WSN) has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The communication of sensitive data and working in hostile environmental condition needs security. The energy constraints, limited computational ability and low storage capacity of the sensor nodes have made the implementation of security more challenging. The proposed scheme adopts a level based secure hierarchical approach to maintain the energy efficiency. It incorporates light-weight security mechanisms like, nested hash based message authentication codes (HMAC), Elliptic-Curve Diffie-Hellman (ECDH) key exchange scheme and Blowfish symmetric cipher. Simulation results show that the scheme performs better than existing secure routing protocols FBSR and ATSR.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1, 293–315 (2003), doi:10.1016/S1570-8705(03)00008-8

    Article  Google Scholar 

  2. Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, A.S.: Embedded end-to-end wireless security with ECDH key exchange. Published in: IEEE 46th Midwest Symposium on Circuits and Systems, vol. 2, pp. 786–789 (2003)

    Google Scholar 

  3. Thakur, J., Kumar, N.: DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering 1(2) (December 2011)

    Google Scholar 

  4. Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.F.: On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Heinzelman, W.B., et al.: An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications 1(4), 660–670 (2002)

    Article  Google Scholar 

  6. Azarderakhsh, R., Reyhani-Masoleh, A., Abid, Z.-E.: A Key Management Scheme for Cluster Based Wireless Sensor Networks. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (2008)

    Google Scholar 

  7. Mishra, A.R., Singh, M.: Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network. International Journal of Engineering Research & Technology (IJERT) 1(3) (May 2012)

    Google Scholar 

  8. Boneh, D.: The Decision Diffie-Hellman Problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48–63. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Wang, H., Wu, Z., Tan, X.: A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network. In: Arabnia, H.R., Aissi, S. (eds.) Security and Management, pp. 129–133. CSREA Press (2006)

    Google Scholar 

  10. Cao, Z., Hu, J., Chen, Z., Xu, M., Zhou, X.: FBSR: Feedback based Secure Routing Protocol for Wireless Sensor Networks. J. Pervasive Comput. & Comm. 1(1)

    Google Scholar 

  11. Zahariadis, T., Leligou, H.C., Voliotis, S., Maniatis, S., Trakadas, P., Karkazis, P.: Energy-aware Secure Routing for Large Wireless Sensor Networks. WSEAS Transactions on Communications 8(9) (September 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roy, S., Das, A.K. (2014). Secure Hierarchical Routing Protocol (SHRP) for Wireless Sensor Network. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds) Security in Computing and Communications. SSCC 2014. Communications in Computer and Information Science, vol 467. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44966-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44966-0_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44965-3

  • Online ISBN: 978-3-662-44966-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics