Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

The Research on Energy Efficient Watching Method using Cluster Header in WSN


Affiliations
1 College of Information Engineering, WonSan Jogunsil University of Technology, Korea, Democratic People's Republic of
     

   Subscribe/Renew Journal


Many problems in WSN security are same as in the traditional network. However, some problems are different at all in computer network such as internet, because of characteristics of WSN self. Sensor nodes of WSN cannot use coding such as public key, complicated authorization and the firewall, because sensor nodes have limited energy and there are little hardware resources such as computation, memory and signal processing. So, recently, they have researched on secure routing and configuration of trust system and optimization of watching node alignment. In previous works, they referred the watching attack of WSN of which topology is routing, but they have not referred the watching attack of WSN of which topology is clustering. First, we configure trust system and propose the optimization of watching node’s position and watching period in clustering WSN in this paper. Second we compare and analyze the proposed method and the method in routing WSN by mathematical modeling.

Keywords

WSN, Routing, Security, Trust System.
Subscription Login to verify subscription
User
Notifications
Font Size

  • S. Buchegger and J.Y. Le Boudec, “Performance Analysis of the Confidant Protocol: Cooperation of Nodes “Fairness In Dynamic Ad-hoc Networks”, Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networks and Computing, pp. 223-229, 2002.
  • Q. He, D. Wu and P. Khosla, “SORI: A Secure and Objective Reputation-Based Incentive Scheme for Ad Hoc Networks”, Proceedings of International Conference on Wireless Communications and Networking, pp. 745-753, 2004.
  • P. Michiardi and R. Molva, “Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”, Proceedings of International Conference on Advanced Communications and Multimedia Security, pp. 107-121, 2002.
  • Ismat K. Maarouf and A.R. Naseer, “WSNodeRater-An Optimized Reputation System Framework for Security Aware Energy Efficient Geographic Routing in WSNs”, Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 265-269, 2007.
  • A. Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks”, Communications of the ACM, Vol. 47, No. 6, pp. 53-57, 2004.
  • M.L. Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 8, No. 3, pp. 1086-1090, 2009.
  • Jie Zhang, Jianying Zhou and Joseph Chee Ming Teo, “Toward Energy-Efficient Trust System through Watchdog Optimization for WSNs”, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp. 613-625, 2015.

Abstract Views: 215

PDF Views: 1




  • The Research on Energy Efficient Watching Method using Cluster Header in WSN

Abstract Views: 215  |  PDF Views: 1

Authors

Won Chol Jang
College of Information Engineering, WonSan Jogunsil University of Technology, Korea, Democratic People's Republic of
Jong Ae Choe
College of Information Engineering, WonSan Jogunsil University of Technology, Korea, Democratic People's Republic of
Du Ho Pak
College of Information Engineering, WonSan Jogunsil University of Technology, Korea, Democratic People's Republic of

Abstract


Many problems in WSN security are same as in the traditional network. However, some problems are different at all in computer network such as internet, because of characteristics of WSN self. Sensor nodes of WSN cannot use coding such as public key, complicated authorization and the firewall, because sensor nodes have limited energy and there are little hardware resources such as computation, memory and signal processing. So, recently, they have researched on secure routing and configuration of trust system and optimization of watching node alignment. In previous works, they referred the watching attack of WSN of which topology is routing, but they have not referred the watching attack of WSN of which topology is clustering. First, we configure trust system and propose the optimization of watching node’s position and watching period in clustering WSN in this paper. Second we compare and analyze the proposed method and the method in routing WSN by mathematical modeling.

Keywords


WSN, Routing, Security, Trust System.

References