An Improved Secure Routing Protocol Based on Clustering for Wireless Sensor Networks

The security and efficiency are essential primary points for Wireless Sensor Networks (WSNs) when designing routing strategy. This paper proposes a secure routing solution based on LEACH protocol and clustering method in which system security is integrate

  • PDF / 200,850 Bytes
  • 7 Pages / 439.37 x 666.142 pts Page_size
  • 58 Downloads / 234 Views

DOWNLOAD

REPORT


Abstract The security and efficiency are essential primary points for Wireless Sensor Networks (WSNs) when designing routing strategy. This paper proposes a secure routing solution based on LEACH protocol and clustering method in which system security is integrated into sensor node and clusters are changed dynamically and periodically according to node mobility, and it is different with the traditional encryption mechanism by using key clustering homemade management to reach the overall security. The simulation results show that the proposed secure routing protocol improve the survivability of node more efficiently in a harsh sensor network environment. Through clustering management dynamically, the immunity of WSNs has been enhanced, and it can be concluded that this routing protocol improved the network security effectively. Keywords Wireless sensor network • Routing protocol • Security • LEACH

1 Introduction A wireless Sensor Networks (WSNs) is an ad hoc wireless telecommunication network which embodies a number of tiny, low-powered sensor nodes densely or sparsely deployed in the area of interest to accomplish a particular mission like habitat monitoring, agricultural farming, battlefield surveillance etc. [1]. The extensive rise of using WSNs in diverse applications such as hostile, unattended, and inaccessible environments, have mandated the users to be more assured about the security and efficiency compared to the survivability. As long as security schemes

L. Chen (*) • L. Chen College of Computer Science, Yangtze University, Jinzhou, China e-mail: [email protected] W. Wang (ed.), Mechatronics and Automatic Control Systems, Lecture Notes in Electrical Engineering 237, DOI 10.1007/978-3-319-01273-5_112, © Springer International Publishing Switzerland 2014

995

996

L. Chen and L. Chen

provide confidentiality, authentication, and integrity, which are critical for such applications, a secure and survivable infrastructure is always desired. Network survivability has been defined as the ability of the network to fulfill its mission in the presence of attacks and/or failures in a timely mode [2]. In such hostile environments, the information exchanged between two communicating parties might include highly sensitive data that must be safeguarded, therefore security investigation and efficient routing strategy for WSNs have been a continuous research hot topic in the recent decades [3]. LEACH (Low Energy Adaptive Clustering Hierarchy) is a classical and hierarchical routing protocol which is based on the idea of clustering to lengthen the network lifetime and forward data reliably, but LEACH protocol is not secure enough to against all kinds of network threats, so it has no ability to resist some attacks in network layer. Therefore, a variety of improved routing protocols based on LEACH are investigated to improve security of WSNs, such as RLEACH protocol which is based on LEACH and embed encryption and authentication technologies to prevent unauthorized node to participate in route creating and data tran