INFORMATION CHANGE THE WORLD

International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.6, No.1, Dec. 2013

Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

Full Text (PDF, 271KB), PP.50-56


Views:121   Downloads:2

Author(s)

Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM

Index Terms

Wireless Sensor Networks, Security, Energy efficiency, Directed Diffusion

Abstract

In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy, low security…) to the design and management of wireless sensor networks. These challenges necessitate a great attention. In this paper, we present a new version of Directed Diffusion routing protocol which provides both security and energy efficiency together in wireless sensor networks.

Cite This Paper

Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM,"Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.1, pp.50-56, 2014. DOI: 10.5815/ijitcs.2014.01.06

Reference

[1]S. K. Singh, M P. Singh, and D. K. Singh. Routing Protocols in Wireless Sensor Networks – A Survey [J] Computer Science & Engineering Survey (IJCSES), Nov 2010, 1(2): 63-83.

[2]W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless micro sensor networks[C]. IEEE Proc. Hawaii Int',l. Conf. System. Sciences, Jan 2000.1 -10.

[3]J.Kulik, W. R. Heinzelman, and H. Balak-rishnan. Negotiation- based protocols for disseminating information in wireless sensor networks [J]. Wireless Networks, 2002, 8(2/3):169-185.

[4]C. Intanagonwiwat, R. Govindan and D. Estrin. Directed Diffusion: a scalable and robust communication paradigm for sensor networks[C]. Boston, Massachusetts, USA. ACM. MOBICOM, 2000.56-67

[5]M. Chen, T. Kwon, and Y. Choi. Energy-efficient differentiated directed diffusion (eddd) for real-time traffic in wireless sensor networks [J]. Elsevier Computer Communications Journal, Special Issue on Dependable Wireless Sensor Networks, Jan 2006

[6]K. E. Kannnammal, and T. Purusothaman. New Interest Propagation in Directed Diffusion Protocol for Mobile Sensor Networks [J]. European Journal of Scientific Research, 2012, 68(1): 36-42

[7]V. R. Kumar, J. Thomas, and A. Abraham. Secure Directed Diffusion Routing Protocol for Sensor Networks using the LEAP Protocol [M]. NATO Security through Science Series -D: Information and Communication Security, Vol. 6, pp. 183-203, 2006

[8]X. Wang, L. Yang, and K. Chen. SDD: Secure distributed diffusion protocol for sensor networks [A]. Proceedings of the 1st European Workshop on Security in Ad Hoc and Sensor Networks, LNCS 3313, 2005. 205-214.

[9]G. Padmavathi, and D. Shanmugapriya. A survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks [J]. International Journal of Computer Science and Information Security (IJCSIS), 2009, 4(1 & 2):1-9.

[10]M. K. Jain. Wireless Sensor Networks: Security Issues and Challenges [J]. International Journal of Computer and Information Technology (IJCIT), 2011, 2(1): 62-67.

[11]S. K. Singh, M. P. Singh, and D. K. Singh. A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks [J]. International Journal of Computer trends and Technology, May to Jun, Issue 2011.

[12]M. Sadeghi, F. Khosravi, K. Atefi, and M. Barati. Security Analysis of Routing Protocols in Wireless Sensor Networks [J]. International Journal of Computer science Issues (IJCSI), Jan 2012, Vol. 9, Issue 1, N° 3: 465-472

[13]A. D. Wood, and J. A. Stankovic. A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks [M]. Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, edited by Mohammad Ilyas and Imad Mahgoub, CRC Press LLC, 2005.

[14]Newso James, Elaine Shi, Dawn Song, and Adrian Perrig. The sybil attack in sensor networks: analysis & defenses[C]. In Proceedings of the 3rd international symposium on Information processing in sensor networks, IPSN '04, New York, NY, USA, 2004. 259-268.

[15]C. Karlof, and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad Hoc Networks, 2003, 1(2-3):293-315.

[16]A.D. Wood, and J.A. Stankovic. Denial of service in sensor networks [J]. Computer, Oct 2002, 35(10):54-62.

[17]D.R. Raymond, and S.F. Midki. Denial-of-service in wireless sensor networks: Attacks and defenses [J]. Pervasive Computing, IEEE, Jan.-Mar 2008. 7(1): 74-81.

[18]A. D. Wood, L. Fang, J. A. Stankovic, and T. He. SIGF: A family of configurable secure routing protocols for wireless sensor networks [A]. In Proceedings of the 4th ACM Workshop Security of Ad hoc Sensor Networks, 2006. 35-48. 

[19]J. Deng, R. Han, and S. Mishra. INSENS: Intrusion-tolerant routing for wireless sensor networks [J]. Computer Communications, 2006, 29(2): 216-230.

[20]M. Senjay, and Y. Jian. SeRWA: A secure routing protocol against wormhole attacks [J]. Ad Hoc Networks, 2009, 7(6):1051-1063.

[21]Z. Kun. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management[C]. International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08), Oct 2008. 12-14. 

[22]R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. J. M. Havinga. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks [A]. Proceedings of International Conf. Parallel Processing Workshops, 2003.397-406.

[23]R.El Kaissi, A. Kayssi, A. Chehab, and Z. Dawy. DAWWSEN: A Defense Mechanism against Wormhole Attacks in Wireless Sensor Networks[C]. Proceedings of the Second International Conference on innovations in information Technology, UAE, Sep 2005.

[24]S. Zhu. LEAP: efficient security mechanisms for large-scale distributed sensor networks [A]. Proceedings. of the 2nd ACM International workshop on wireless sensor networks and applications, 2003. 62-72.

[25]R. Rivest. The rc5 encryption algorithm [A]. Proceedings of the 2nd Workshop on Fast Software Encryption (LNCS 1008), 1995. 86-96.

[26]J-Sim, http://www.j-sim.org/.