Secure Cluster Based Energy Aware Routing for Wireless Sensor Networks
@inproceedings{Mallanda2004SecureCB, title={Secure Cluster Based Energy Aware Routing for Wireless Sensor Networks}, author={Cariappa Mallanda and Shivakumar Basavaraju and Archit Kulshrestha and Rajgopal Kannan and Arjan Durresi and S. Sitharama Iyengar}, booktitle={International Conference on Wireless Networks}, year={2004} }
Present research on wireless sensor networks has focused on routing and security independently. In this paper, we present a Secure, Cluster-based, Energy Aware Routing (SCEAR) scheme that provides both a hierarchal energy aware routing and a secure environment for communication. In our approach, the network is divided into clusters with a cluster-head that aggregates the information and securely sends this information to the global base station over a multi-hop network of cluster-heads…
No Paper Link Available
8 Citations
Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks
- Computer Science
- 2011
This paper proposes a secure, fast rebuilding and energy efficient cluster based routing protocol for mission-critical application that provides reliability while reducing processing time and energy dissipation through clusterbased authentication mechanism and delayed propagation of management messages.
Energy Efficient Data Dissemination Protocols under Various Transmission Range for Wireless Sensor Network
- Computer Science
- 2014
This paper tries to improve the sensor’s network life time and other performance metrics by vary sensor‘s node communication distance between 100 to 250 m and also vary the transmitted packets interarrival time.
A secure and energy efficient communication scheme for wireless sensor networks = 무선 센서네트워크에서의 안전한 에너지 효율적인 통신 방법
- Computer Science
- 2011
This paper proposes a secure, fast rebuilding and energy efficient cluster-based routing protocol for mission-critical application, compared to previous protocols like LEACH and HPEQ, which provides better reliability while reducing processing time and energy dissipation through cluster- based authentication mechanism and delayed propagation of management messages.
PERFORMANCE EVALUATION OF DIRECTED DIFFUSION DATA DISSEMINATION ROUTING PROTOCOL IN WIRELESS SENSOR NETWORKS
- Computer Science
- 2013
The aim of the manuscript is to evaluate the performance of directed diffusion data dissemination routing protocol through simulation studies and compare directed diffusion protocol with two other traditional data dissemination protocols namely: omniscient multicast and flooding in terms of remaining energy.
Sensorsimulator : simulation framework for sensor networks
- Computer Science
- 2006
SensorSimulator is a discreet event simulation framework for sensor networks built over OMNeT++ that allows the user to debug and test software for distributed sensor networks independent of hardware constraints and validate and demonstrate the usability of these capabilities through analyzing the simulation results of Directed Diffusion and GEAR.
Sensorsimulator: simulation framework for sensor networks Sensorsimulator: simulation framework for sensor networks
- Computer Science
- 2022
Wireless sensor networks have the potential to become significant subsystems of engineering applications. Before relegating important and safety-critical tasks to such subsystems, it is necessary to…
Energy Efficient Methods and Techniques for Mobile Computing
- Computer ScienceThird International Conference on Semantics, Knowledge and Grid (SKG 2007)
- 2007
This paper presents a survey of energy efficient methods and techniques for in the environment of mobile computing according to four levels, including network interface, network protocols, operating systems, and application design.
References
SHOWING 1-10 OF 15 REFERENCES
Scalable Session Key Construction Protocol for Wireless Sensor Networks
- Computer Science
- 2002
This paper proposes a new protocol BROSK to construct link dependent keys by broadcasting key negotiation messages and shows that the scalability of this new protocol is better than two other security protocols of sensor network, SPINS and SNAKE.
Energy-efficient communication protocol for wireless microsensor networks
- Computer ScienceProceedings of the 33rd Annual Hawaii International Conference on System Sciences
- 2000
LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
A key-management scheme for distributed sensor networks
- Computer ScienceCCS '02
- 2002
A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks
- Computer Science
- 2002
Future sensor networks will be composed of a large number of densely deployed sensors/actuators. A key feature of such networks is that their nodes are untethered and unattended. Consequently, energy…
Security for Sensor Networks
- Computer Science
- 2004
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems
- Computer Science
- 2001
This work explores three themes in the design of self-configuring sensor networks: tuning density to trade operational quality against lifetime; using multiple sensor modalities to obtain robust measurements; and exploiting fixed environmental characteristics.
A Non-interactive Public-Key Distribution System
- Computer Science, MathematicsDes. Codes Cryptogr.
- 1996
An identity-based non-interactive public key distribution system is presented that is based on a novel trapdoor one-way function allowing a trusted authority to compute the discrete logarithms modulo…
Instrumenting the world with wireless sensor networks
- Computer Science2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221)
- 2001
This work identifies opportunities and challenges for distributed signal processing in networks of these sensing elements and investigates some of the architectural challenges posed by systems that are massively distributed, physically-coupled, wirelessly networked, and energy limited.
ACE: An Emergent Algorithm for Highly Uniform Cluster Formation
- Computer ScienceEWSN
- 2004
The efficient subdivision of a sensor network into uniform, mostly non-overlapping clusters of physically close nodes is an important building block in the design of efficient upper layer network…