Enhancements of Authenticated Differentiated Pre-distribution Key Methodology Based on GPSR
Wireless sensor network consists of plentiful energy and computing power-constrained tiny sensor nodes. On the basis of the protection of security, the main goal of our study is to maintain the network life time at a maximum with the appropriate routing p
- PDF / 1,703,312 Bytes
- 9 Pages / 439.37 x 666.142 pts Page_size
- 61 Downloads / 193 Views
Abstract Wireless sensor network consists of plentiful energy and computing power-constrained tiny sensor nodes. On the basis of the protection of security, the main goal of our study is to maintain the network life time at a maximum with the appropriate routing protocol. In this article, we will propose a new routing algorithm on the basis of the original routing algorithm. Considering the security of the wireless sensor network, the residual energy of nodes as well as issues such as physical distance, we try to extend the maximum lifetime of a wireless sensor network with all the combination of these factors for routing. This energy-balance routing algorithm takes into account the number of pre-distributed shared keys between the sending node and receiving node, the residual energy of the receiving node and the physical distance between two nodes in order to protect the security at the same time, to maintain the network life time at a maximum. Keywords WSN
Energy saving Life time RKP
Introduction With the rapid development of wireless sensor network, it has too many crucial applications in many aspects, i.e. military applications, environmental applications, health applications, home applications and numerous commercial applications [1]. L. Sun Z.-J. Zhang School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China e-mail: [email protected] L. Sun Z.-J. Zhang (&) Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China e-mail: [email protected]
Y.-M. Huang et al. (eds.), Advanced Technologies, Embedded and Multimedia for Human-centric Computing, Lecture Notes in Electrical Engineering 260, DOI: 10.1007/978-94-007-7262-5_92, Ó Springer Science+Business Media Dordrecht 2014
817
818
L. Sun and Z.-J. Zhang
Compared with traditional networks, wireless sensor network has many advantages, but also because of its features of battery-powered, large number of nodes, mobility, and low processing capacity defect, so that there are a lot of restrictions on its applications. This requires complete the maximum amount of data transfer with minimal energy cost under the resource-constrained condition such as computing power and storage capacity. At the same time, wireless sensor nodes are often deployed in public, untrusted or even hostile environments, which often bring a large quantity of security problems. The security problems will be more important in wireless sensor network than in other networks. In all safety problems, the security of data transmission is particularly significant. The main target in the design of the security agreement is to provide a safe and reliable security data communication between sensor nodes. The first key agreement protocol was introduced by L. Eschenauer and V. D. Gligor called random key pre-distribution (RKP) which has been very popular during these years. Random key pre-distribution (RKP) is the one of the key distribution that is dev
Data Loading...