A Multipath Secure Routing Protocol Based on Malicious Node Detection

被引:0
|
作者
Yao Lan [1 ]
Luo Lei [1 ]
Gao Fuxiang [1 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Minist Educ, Key Lab Med Image Comp, Shenyang 110004, Peoples R China
关键词
secure routing; symmetric encryption; asymmetric encryption; wireless sensor network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is a significant challenge to design a secure routing protocol for wireless sensor networks (WSN), because a WSN has dynamic topology, limited energy, confined computing ability and small memory size. This study explores the algorithm of ensuring safety in routing layer for a WSN. In this paper, a multipath secure routing protocol for flat network-MDMP is proposed. Symmetric encryption and asymmetric encryption are exploited to encrypt and authenticate data in the network. Furthermore, malicious nodes will be detected out and isolates. Experiments show that MDMP provides effective immunity to a variety of attacks in WSN and better network performance.
引用
收藏
页码:4323 / 4328
页数:6
相关论文
共 9 条
  • [1] An integrated architecture for cooperative sensing networks
    Agre, J
    Clare, L
    [J]. COMPUTER, 2000, 33 (05) : 106 - 108
  • [2] INSENS: Intrusion-tolerant routing for wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (02) : 216 - 230
  • [3] Estrin D., 1999, P 5 ANN ACMIEEE INT, DOI DOI 10.1145/313451.313556
  • [4] Heiniger R. W., 2000, Proceedings of the 5th International Conference on Precision Agriculture, Bloomington, Minnesota, USA, 16-19 July, 2000, P1
  • [5] A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor networks
    Jiang, Yuan-xi
    Zhao, Bao-hua
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 49 - 55
  • [6] Negotiation-based protocols for disseminating information in wireless sensor networks
    Kulik, J
    Heinzelman, W
    Balakrishnan, H
    [J]. WIRELESS NETWORKS, 2002, 8 (2-3) : 169 - 185
  • [7] Oliveira LB, 2006, NCA 2006: FIFTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, P145
  • [8] SAVIDGE L, 2005, P 2 INT C BROADB NET, P991
  • [9] Tanachaiwiwat S, 2004, IEEE IPCCC, P463