Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

被引:45
|
作者
Tang, Di [1 ]
Li, Tongtong [1 ]
Ren, Jian [1 ]
Wu, Jie [2 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
美国国家科学基金会;
关键词
Routing; security; energy efficiency; energy balance; delivery ratio; deployment; simulation; SOURCE-LOCATION PRIVACY;
D O I
10.1109/TPDS.2014.2318296
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy resources. In this paper, we first propose a novel secure and efficient Cost-Aware SEcure Routing (CASER) protocol to address these two conflicting issues through two adjustable parameters: energy balance control (EBC) and probabilistic-based random walking. We then discover that the energy consumption is severely disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To solve this problem, we propose an efficient non-uniform energy deployment strategy to optimize the lifetime and message delivery ratio under the same energy resource and security requirement. We also provide a quantitative security analysis on the proposed routing protocol. Our theoretical analysis and OPNET simulation results demonstrate that the proposed CASER protocol can provide an excellent tradeoff between routing efficiency and energy balance, and can significantly extend the lifetime of the sensor networks in all scenarios. For the non-uniform energy deployment, our analysis shows that we can increase the lifetime and the total number of messages that can be delivered by more than four times under the same assumption. We also demonstrate that the proposed CASER protocol can achieve a high message delivery ratio while preventing routing traceback attacks.
引用
收藏
页码:960 / 973
页数:14
相关论文
共 50 条
  • [21] Cost-Aware Activity Scheduling for Compressive Sleeping Wireless Sensor Networks
    Chen, Wei
    Wassell, Ian J.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2016, 64 (09) : 2314 - 2323
  • [22] Signalling cost-aware routing for green networks
    Alizadeh, Hadi
    Gozupek, Didem
    IET COMMUNICATIONS, 2020, 14 (14) : 2350 - 2359
  • [23] Cost-Aware Stochastic Compressive Data Gathering for Wireless Sensor Networks
    Huang, Jiajia
    Soong, Boon-Hee
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) : 1525 - 1533
  • [24] Location aware sensor routing protocol for mobile wireless sensor networks
    Hayes, Tom
    Ali, Falah H.
    IET WIRELESS SENSOR SYSTEMS, 2016, 6 (02) : 49 - 57
  • [25] A Hierarchical Secure Reliable Routing Protocol for Wireless Sensor Networks
    Zhang, Zhiming
    Chen, Deqiao
    Jiang, Changgen
    SENSOR LETTERS, 2011, 9 (04) : 1561 - 1565
  • [26] Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks
    Du, Jiang
    Peng, Su
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 470 - 473
  • [27] A Secure Anonymous Path Routing Protocol for Wireless Sensor Networks
    Zhang, Zhiming
    Jiang, Changgen
    Deng, Jiangang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 2, 2010, : 415 - +
  • [28] A Secure and Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks
    Zhang, Yuquan
    Wei, Lei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 302 - 308
  • [29] A secure multipath routing protocol for hierarchical wireless sensor networks
    Bai, E. (baiej@dhu.edu.cn), 1600, Editorial Board of Journal of Harbin Engineering (33):
  • [30] A segment transmission secure routing protocol for wireless sensor networks
    Wen, Song
    Du, Ruiying
    Zhang, Huanguo
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1579 - 1582