Secure and Energy-Efficient Disjoint Multipath Routing for WSNs

Recent advances in microelectromechanical system (MEMS) technology have boosted the deployment of wireless sensor networks (WSNs). Limited by the energy storage capability of sensor nodes, it is crucial to jointly consider security and energy efficiency in data collection of WSNs. The disjoint multi...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on vehicular technology Vol. 61; no. 7; pp. 3255 - 3265
Main Authors: Liu, Anfeng, Zheng, Zhongming, Zhang, Chao, Chen, Zhigang, Shen, Xuemin
Format: Journal Article
Language:English
Published: New York, NY IEEE 01.09.2012
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9545, 1939-9359
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Recent advances in microelectromechanical system (MEMS) technology have boosted the deployment of wireless sensor networks (WSNs). Limited by the energy storage capability of sensor nodes, it is crucial to jointly consider security and energy efficiency in data collection of WSNs. The disjoint multipath routing scheme with secret sharing is widely recognized as one of the effective routing strategies to ensure the safety of information. This kind of scheme transforms each packet into several shares to enhance the security of transmission. However, in many-to-one WSNs, shares have high probability to traverse through the same link and to be intercepted by adversaries. In this paper, we formulate the secret-sharing-based multipath routing problem as an optimization problem. Our objective aims at maximizing both network security and lifetime, subject to the energy constraints. To this end, a three-phase disjoint routing scheme called the Security and Energy-efficient Disjoint Route (SEDR) is proposed. Based on the secret-sharing algorithm, the SEDR scheme dispersively and randomly delivers shares all over the network in the first two phases and then transmits these shares to the sink node. Both theoretical and simulation results demonstrate that our proposed scheme has significant improvement in network security under both scenarios of single and multiple black holes without reducing the network lifetime.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:0018-9545
1939-9359
DOI:10.1109/TVT.2012.2205284