Open Access
Subscription Access
Open Access
Subscription Access
The Research on Energy Efficient Watching Method using Cluster Header in WSN
Subscribe/Renew Journal
Many problems in WSN security are same as in the traditional network. However, some problems are different at all in computer network such as internet, because of characteristics of WSN self. Sensor nodes of WSN cannot use coding such as public key, complicated authorization and the firewall, because sensor nodes have limited energy and there are little hardware resources such as computation, memory and signal processing. So, recently, they have researched on secure routing and configuration of trust system and optimization of watching node alignment. In previous works, they referred the watching attack of WSN of which topology is routing, but they have not referred the watching attack of WSN of which topology is clustering. First, we configure trust system and propose the optimization of watching node’s position and watching period in clustering WSN in this paper. Second we compare and analyze the proposed method and the method in routing WSN by mathematical modeling.
Keywords
WSN, Routing, Security, Trust System.
Subscription
Login to verify subscription
User
Font Size
Information
- S. Buchegger and J.Y. Le Boudec, “Performance Analysis of the Confidant Protocol: Cooperation of Nodes “Fairness In Dynamic Ad-hoc Networks”, Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networks and Computing, pp. 223-229, 2002.
- Q. He, D. Wu and P. Khosla, “SORI: A Secure and Objective Reputation-Based Incentive Scheme for Ad Hoc Networks”, Proceedings of International Conference on Wireless Communications and Networking, pp. 745-753, 2004.
- P. Michiardi and R. Molva, “Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”, Proceedings of International Conference on Advanced Communications and Multimedia Security, pp. 107-121, 2002.
- Ismat K. Maarouf and A.R. Naseer, “WSNodeRater-An Optimized Reputation System Framework for Security Aware Energy Efficient Geographic Routing in WSNs”, Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 265-269, 2007.
- A. Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks”, Communications of the ACM, Vol. 47, No. 6, pp. 53-57, 2004.
- M.L. Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 8, No. 3, pp. 1086-1090, 2009.
- Jie Zhang, Jianying Zhou and Joseph Chee Ming Teo, “Toward Energy-Efficient Trust System through Watchdog Optimization for WSNs”, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, pp. 613-625, 2015.
Abstract Views: 262
PDF Views: 1