International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.6, No.1, Dec. 2013

Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

Full Text (PDF, 271KB), PP.50-56

Views:121   Downloads:2


Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM

Index Terms

Wireless Sensor Networks, Security, Energy efficiency, Directed Diffusion


In wireless sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a great number of applications used in these networks, pose many challenges (limited energy, low security…) to the design and management of wireless sensor networks. These challenges necessitate a great attention. In this paper, we present a new version of Directed Diffusion routing protocol which provides both security and energy efficiency together in wireless sensor networks.

Cite This Paper

Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM,"Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.1, pp.50-56, 2014. DOI: 10.5815/ijitcs.2014.01.06


[1]S. K. Singh, M P. Singh, and D. K. Singh. Routing Protocols in Wireless Sensor Networks – A Survey [J] Computer Science & Engineering Survey (IJCSES), Nov 2010, 1(2): 63-83.

[2]W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless micro sensor networks[C]. IEEE Proc. Hawaii Int',l. Conf. System. Sciences, Jan 2000.1 -10.

[3]J.Kulik, W. R. Heinzelman, and H. Balak-rishnan. Negotiation- based protocols for disseminating information in wireless sensor networks [J]. Wireless Networks, 2002, 8(2/3):169-185.

[4]C. Intanagonwiwat, R. Govindan and D. Estrin. Directed Diffusion: a scalable and robust communication paradigm for sensor networks[C]. Boston, Massachusetts, USA. ACM. MOBICOM, 2000.56-67

[5]M. Chen, T. Kwon, and Y. Choi. Energy-efficient differentiated directed diffusion (eddd) for real-time traffic in wireless sensor networks [J]. Elsevier Computer Communications Journal, Special Issue on Dependable Wireless Sensor Networks, Jan 2006

[6]K. E. Kannnammal, and T. Purusothaman. New Interest Propagation in Directed Diffusion Protocol for Mobile Sensor Networks [J]. European Journal of Scientific Research, 2012, 68(1): 36-42

[7]V. R. Kumar, J. Thomas, and A. Abraham. Secure Directed Diffusion Routing Protocol for Sensor Networks using the LEAP Protocol [M]. NATO Security through Science Series -D: Information and Communication Security, Vol. 6, pp. 183-203, 2006

[8]X. Wang, L. Yang, and K. Chen. SDD: Secure distributed diffusion protocol for sensor networks [A]. Proceedings of the 1st European Workshop on Security in Ad Hoc and Sensor Networks, LNCS 3313, 2005. 205-214.

[9]G. Padmavathi, and D. Shanmugapriya. A survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks [J]. International Journal of Computer Science and Information Security (IJCSIS), 2009, 4(1 & 2):1-9.

[10]M. K. Jain. Wireless Sensor Networks: Security Issues and Challenges [J]. International Journal of Computer and Information Technology (IJCIT), 2011, 2(1): 62-67.

[11]S. K. Singh, M. P. Singh, and D. K. Singh. A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks [J]. International Journal of Computer trends and Technology, May to Jun, Issue 2011.

[12]M. Sadeghi, F. Khosravi, K. Atefi, and M. Barati. Security Analysis of Routing Protocols in Wireless Sensor Networks [J]. International Journal of Computer science Issues (IJCSI), Jan 2012, Vol. 9, Issue 1, N° 3: 465-472

[13]A. D. Wood, and J. A. Stankovic. A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks [M]. Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, edited by Mohammad Ilyas and Imad Mahgoub, CRC Press LLC, 2005.

[14]Newso James, Elaine Shi, Dawn Song, and Adrian Perrig. The sybil attack in sensor networks: analysis & defenses[C]. In Proceedings of the 3rd international symposium on Information processing in sensor networks, IPSN '04, New York, NY, USA, 2004. 259-268.

[15]C. Karlof, and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures [J]. Ad Hoc Networks, 2003, 1(2-3):293-315.

[16]A.D. Wood, and J.A. Stankovic. Denial of service in sensor networks [J]. Computer, Oct 2002, 35(10):54-62.

[17]D.R. Raymond, and S.F. Midki. Denial-of-service in wireless sensor networks: Attacks and defenses [J]. Pervasive Computing, IEEE, Jan.-Mar 2008. 7(1): 74-81.

[18]A. D. Wood, L. Fang, J. A. Stankovic, and T. He. SIGF: A family of configurable secure routing protocols for wireless sensor networks [A]. In Proceedings of the 4th ACM Workshop Security of Ad hoc Sensor Networks, 2006. 35-48. 

[19]J. Deng, R. Han, and S. Mishra. INSENS: Intrusion-tolerant routing for wireless sensor networks [J]. Computer Communications, 2006, 29(2): 216-230.

[20]M. Senjay, and Y. Jian. SeRWA: A secure routing protocol against wormhole attacks [J]. Ad Hoc Networks, 2009, 7(6):1051-1063.

[21]Z. Kun. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management[C]. International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08), Oct 2008. 12-14. 

[22]R. D. Pietro, L. V. Mancini, Y. W. Law, S. Etalle, and P. J. M. Havinga. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks [A]. Proceedings of International Conf. Parallel Processing Workshops, 2003.397-406.

[23]R.El Kaissi, A. Kayssi, A. Chehab, and Z. Dawy. DAWWSEN: A Defense Mechanism against Wormhole Attacks in Wireless Sensor Networks[C]. Proceedings of the Second International Conference on innovations in information Technology, UAE, Sep 2005.

[24]S. Zhu. LEAP: efficient security mechanisms for large-scale distributed sensor networks [A]. Proceedings. of the 2nd ACM International workshop on wireless sensor networks and applications, 2003. 62-72.

[25]R. Rivest. The rc5 encryption algorithm [A]. Proceedings of the 2nd Workshop on Fast Software Encryption (LNCS 1008), 1995. 86-96.