Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks
One concerned issue in the routing protocol for wireless sensor networks (WSNs) is how to provide with as much security to some special applications as possible. Another is how to make full use of the severely limited resource presented by WSNs. The existing routing protocols in the recent literatur...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2013-04-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2013/108968 |
_version_ | 1797709048578048000 |
---|---|
author | Jiliang Zhou |
author_facet | Jiliang Zhou |
author_sort | Jiliang Zhou |
collection | DOAJ |
description | One concerned issue in the routing protocol for wireless sensor networks (WSNs) is how to provide with as much security to some special applications as possible. Another is how to make full use of the severely limited resource presented by WSNs. The existing routing protocols in the recent literatures focus either only on addressing security issues while expending much power or only on improving lifetime of network. None of them efficiently combine the above-mentioned two challenges to one integrated solutions. In this paper, we propose efficient and secure routing protocol based on encryption and authentication for WSNs: BEARP, which consists of three phases: neighbor discovery phase, routing discovery phase, and routing maintenance phase. BEARP encrypts all communication packets and authenticates the source nodes and the base station (BS), and it ensures the four security features including routing information confidentiality, authentication, integrity, and freshness. Furthermore, we still design routing path selection system, intrusion detection system, and the multiple-threaded process mechanism for BEARP. Thus, all the secure mechanisms are united together to effectively resist some typical attacks including selective forwarding attack, wormhole attacks, sinkhole attacks, and even a node captured. Our BEARP especially mitigates the loads of sensor nodes by transferring routing related tasks to BS, which not only maintains network wide energy equivalence and prolongs network lifetime but also improves our security mechanism performed uniquely by the secure BS. Simulation results show a favorable increase in performance for BEARP when compared with directed diffusion protocol and secure directed diffusion protocol in the presence of compromised nodes. |
first_indexed | 2024-03-12T06:31:40Z |
format | Article |
id | doaj.art-0ab86d26776f4532b89d837f873b1c8f |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T06:31:40Z |
publishDate | 2013-04-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-0ab86d26776f4532b89d837f873b1c8f2023-09-03T01:35:57ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772013-04-01910.1155/2013/108968Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor NetworksJiliang ZhouOne concerned issue in the routing protocol for wireless sensor networks (WSNs) is how to provide with as much security to some special applications as possible. Another is how to make full use of the severely limited resource presented by WSNs. The existing routing protocols in the recent literatures focus either only on addressing security issues while expending much power or only on improving lifetime of network. None of them efficiently combine the above-mentioned two challenges to one integrated solutions. In this paper, we propose efficient and secure routing protocol based on encryption and authentication for WSNs: BEARP, which consists of three phases: neighbor discovery phase, routing discovery phase, and routing maintenance phase. BEARP encrypts all communication packets and authenticates the source nodes and the base station (BS), and it ensures the four security features including routing information confidentiality, authentication, integrity, and freshness. Furthermore, we still design routing path selection system, intrusion detection system, and the multiple-threaded process mechanism for BEARP. Thus, all the secure mechanisms are united together to effectively resist some typical attacks including selective forwarding attack, wormhole attacks, sinkhole attacks, and even a node captured. Our BEARP especially mitigates the loads of sensor nodes by transferring routing related tasks to BS, which not only maintains network wide energy equivalence and prolongs network lifetime but also improves our security mechanism performed uniquely by the secure BS. Simulation results show a favorable increase in performance for BEARP when compared with directed diffusion protocol and secure directed diffusion protocol in the presence of compromised nodes.https://doi.org/10.1155/2013/108968 |
spellingShingle | Jiliang Zhou Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks International Journal of Distributed Sensor Networks |
title | Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks |
title_full | Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks |
title_fullStr | Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks |
title_full_unstemmed | Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks |
title_short | Efficient and Secure Routing Protocol Based on Encryption and Authentication for Wireless Sensor Networks |
title_sort | efficient and secure routing protocol based on encryption and authentication for wireless sensor networks |
url | https://doi.org/10.1155/2013/108968 |
work_keys_str_mv | AT jiliangzhou efficientandsecureroutingprotocolbasedonencryptionandauthenticationforwirelesssensornetworks |