A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection

@article{Mao2010AFS,
  title={A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection},
  author={Yuxin Mao and Guiyi Wei},
  journal={Sensors (Basel, Switzerland)},
  year={2010},
  volume={10},
  pages={9529 - 9540}
}
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use… 

Figures and Tables from this paper

Secure Data Gathering Protocol over Wireless Sensor Network

TLDR
This work provides security analysis focused on the key settlement protocol and evaluates network performance for the proposed data gathering protocol through simulation, and aims at tackling two problems: security and data gathering in WSNs.

A noval data collection approach for Wirelsee Sensor Networks

TLDR
This paper makes full use of the broadcast message when wireless sensor network initializes to construct secure multipath routing for secure data collection which will cause little overhead to the sensor nodes in the network.

A NEW ENHANCED ENERGY EFFICIENT MULTIPATH ROUTING APPROACH FOR WIRELESS SENSOR NETWORKS

TLDR
The research work consists of optimized multipath routing, residual energy based routing approach to make the wireless sensor networks more secure with minimum energy consumption and Residual Energy based Multipath Routing Approach is proposed which attains the integrity and minimum residual energy.

Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks

TLDR
This work proposes a non-interactive hierarchical key agreement protocol over the hierarchical WSNs and proposes a revision that could support security and robustness over the Hierarchical W SNs.

The Environmental Information Monitoring Network Set up Based on Service Discovery Mechanism

TLDR
This paper analyses the basic structure of the environmental sensor network, and proposes the service discovery mechanism based on the catalogue model that can reduces the systems energy consumption, and is able to achieve the purpose of increasing the reliability and security of the sensors network, reducing the data redundancy degree and extending the lifetime of the network.

Estimation of Distributed Fermat-Point Location for Wireless Sensor Networking

TLDR
Simulation results revealed that the proposed algorithm for estimating sensor positions is more accurate than existing algorithms, and improves upon conventional bounding box strategies.

Tracking and Recognition of Multiple Human Targets Moving in a Wireless Pyroelectric Infrared Sensor Network

TLDR
The application of empirical mode decomposition and the Hilbert-Huang transform to extract features of moving human targets both in the time domain and the frequency domain is proposed and the support vector machine is selected as the classifier.

Reliable Multicast Routing based on Energy for Wireless Sensor Networks

Article history: Received 23 June 2015 Accepted 25 August 2015 Available online 2 September 2015

References

SHOWING 1-10 OF 17 REFERENCES

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

TLDR
This paper develops mechanisms that generate randomized multipath routes that can with high probability circumvent black holes formed by these attacks, and formulate an optimization problem to minimize the end-to-end energy consumption under given security constraints.

SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks

H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks

TLDR
The extensive simulation results show that the hybrid multipath scheme is very efficient in improving both the security and reliability of the data collection service seamlessly.

A multipath secure routing protocol based on malicious node detection

TLDR
Experiments show that MDMP provides effective immunity to a variety of attacks in WSN and better network performance.

SPREAD: enhancing data confidentiality in mobile ad hoc networks

TLDR
This work proposes and investigates a novel scheme, security protocol for reliable data delivery (SPREAD), to enhance the data confidentiality service in a mobile ad hoc network.

INSENS: Intrusion-tolerant routing for wireless sensor networks

Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks

TLDR
A distributed secure multipath solution to route data across multiple paths so that intruders require much more resources to mount successful attacks and the applicability of the proposed algorithms in a specialized defensive network architecture called the attack-resistant network is examined.

An intrusion detection system for wireless sensor networks

  • Ilker OnatA. Miri
  • Computer Science
    WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005.
  • 2005
TLDR
A detection based security scheme for wireless sensor networks where a simple dynamic statistical model of the neighboring nodes is built in conjunction with a low-complexity detection algorithm by monitoring received packet power levels and arrival rates.

Multipath routing in the presence of frequent topological changes

TLDR
The goal is, given the failure probabilities of the paths, to find the optimal way to fragment and then distribute the blocks to the paths so that the probability of reconstructing the original information at the destination is maximized.

A survey on sensor networks

TLDR
The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.