Security topology in wireless sensor networks with routing optimisation

Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, lever...

Full description

Saved in:
Bibliographic Details
Published in2008 Fourth International Conference on Wireless Communication and Sensor Networks pp. 7 - 15
Main Authors Ismail, M., Sanavullah, M.Y.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2008
Subjects
Online AccessGet full text
ISBN1424433274
9781424433278
DOI10.1109/WCSN.2008.4772673

Cover

Loading…
Abstract Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. These numerous sensors are used (similar to different sensory organs in human beings) for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication. Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power. Also, wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.e. how long can the wireless sensor networks survive and how well are the wireless sensor networks recovery after the malicious attacks. In this context, in this thesis, the power, mobility, and task management planes that can monitor the power, movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes coordinate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery algorithm is proposed and its performance is studied for different types of node distributions. The proposed work is the development of architecture for secure communication in mobile wireless networks. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on a clustered network is a novelty.
AbstractList Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. These numerous sensors are used (similar to different sensory organs in human beings) for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication. Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power. Also, wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.e. how long can the wireless sensor networks survive and how well are the wireless sensor networks recovery after the malicious attacks. In this context, in this thesis, the power, mobility, and task management planes that can monitor the power, movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes coordinate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery algorithm is proposed and its performance is studied for different types of node distributions. The proposed work is the development of architecture for secure communication in mobile wireless networks. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on a clustered network is a novelty.
Author Ismail, M.
Sanavullah, M.Y.
Author_xml – sequence: 1
  givenname: M.
  surname: Ismail
  fullname: Ismail, M.
  organization: Electron. & Commun., Vinayaga Mission Univ., Salem, India
– sequence: 2
  givenname: M.Y.
  surname: Sanavullah
  fullname: Sanavullah, M.Y.
  organization: Dept. of EEE, K.S.R. Eng. Coll., Tiruchengode, India
BookMark eNo1UF1LwzAAjOhAO_sDxJf8gdZ8Ns2jFJ3C0IcNfBxNms5ol5QkY_TfW3Hey3HccRyXgSvnnQHgDqMSYyQfPprNW0kQqksmBKkEvQC5FDVmhDFKSc0vQfYvBFuA7DcrkWSCX4M8xi80g3FaMXkDVhujj8GmCSY_-sHvJ2gdPNlgBhMjjMZFH6Az6eTDd5yN9AmDPybr9tCPyR5sbJP17hYs-naIJj_zEmyfn7bNS7F-X702j-vCSpSKXjBOakSqtpeqrTuCMcFECt0pRXmljESCUCV0q5VCms67JeE1x53GGs_WEtz_1VpjzG4M9tCGaXf-gf4APtxRsQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/WCSN.2008.4772673
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424433285
1424433282
EndPage 15
ExternalDocumentID 4772673
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-f74528026af9ba8d21121297cdbb356be90723b7cacbb0c3089925851dc1c1723
IEDL.DBID RIE
ISBN 1424433274
9781424433278
IngestDate Wed Aug 27 02:30:26 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2008909475
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-f74528026af9ba8d21121297cdbb356be90723b7cacbb0c3089925851dc1c1723
PageCount 9
ParticipantIDs ieee_primary_4772673
PublicationCentury 2000
PublicationDate 2008-Dec.
PublicationDateYYYYMMDD 2008-12-01
PublicationDate_xml – month: 12
  year: 2008
  text: 2008-Dec.
PublicationDecade 2000
PublicationTitle 2008 Fourth International Conference on Wireless Communication and Sensor Networks
PublicationTitleAbbrev WCSN
PublicationYear 2008
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000453649
Score 1.4432572
Snippet Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base...
SourceID ieee
SourceType Publisher
StartPage 7
SubjectTerms Base stations
Collaboration
Data processing
Data security
Information security
Network topology
Routing
Sense organs
Wireless communication
Wireless sensor networks
Title Security topology in wireless sensor networks with routing optimisation
URI https://ieeexplore.ieee.org/document/4772673
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED21nZgAtYhveWAkbRondjxXlAqpFVKL6Fb5K1IFJKhNBvj1nBO3CMTAEtkZLMeR_O7dvbsDuEGIj7lkIsgS41w3-EgjSwMmlR5KQ3HiEoWnMzZ5ih-WybIFt_tcGGttLT6zfTesY_mm0JVzlQ1iNAUZp21oI3FrcrX2_hQ0TSiLxS53i1KkW7uSTn6e-qjmMBSD59F81igp_aI_uqvU4DI-hOluW42m5KVflaqvP39VbPzvvo-g953GRx73AHUMLZt34X7uO9aRsumP8EHWOXEVi1_x0iNbpLXFhuSNOnxLnJ-WbIrKqaNJgffLm9f_9GAxvluMJoHvphCsRVgGGY-TKEXGJTOhZGqQ-CFqCa6NUjRhyiJLjqjiWmqlQk1dODByMUOjhxqtHHoCnbzI7SkQIXiGsCZDJtDeo0ZypbWQiIdJmumEnkHXncHqvamXsfKff_736ws4qDUYtUTkEjrlprJXCPSluq7_8Bf-KKUY
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VMsAEqEV844GRtGmcxPFcUQq0FVKL6FbZjiNVQILSZIBfzzlxi0AMLJGdwXIcye8-3rsDuEKI95kIuZMEsQnd4CPyNHVCIVVPxBQnRig8noTDJ_9-HswbcL3RwmitK_KZ7phhlcuPM1WaUFnXR1MwZHQLtgMjxq3VWpuIChonNPT5Wr1FKTpc66JOdh7ZvGbP5d3n_nRScyntsj_6q1TwMtiD8XpjNavkpVMWsqM-f9Vs_O_O96H9LeQjjxuIOoCGTltwO7U960hRd0j4IMuUmJrFr3jtkRU6tllO0pofviImUkvyrDT8aJLhDfNmGUBtmA1uZv2hY_spOEvuFk7C_MCL0OcSCZciitH1Q9ziTMVS0iCUGv1kj0qmhJLSVdQkBD2TNYxVT6GdQw-hmWapPgLCOUsQ2IQbcrT4aCyYVIoLRMQgSlRAj6FlzmDxXlfMWNjPP_n79SXsDGfj0WJ0N3k4hd2KkVERRs6gWeSlPkfYL-RF9be_AM40qGA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+Fourth+International+Conference+on+Wireless+Communication+and+Sensor+Networks&rft.atitle=Security+topology+in+wireless+sensor+networks+with+routing+optimisation&rft.au=Ismail%2C+M.&rft.au=Sanavullah%2C+M.Y.&rft.date=2008-12-01&rft.pub=IEEE&rft.isbn=9781424433278&rft.spage=7&rft.epage=15&rft_id=info:doi/10.1109%2FWCSN.2008.4772673&rft.externalDocID=4772673
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424433278/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424433278/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424433278/sc.gif&client=summon&freeimage=true