{"title":"Secure Routing and Broadcast Authentication in Heterogeneous Sensor Networks","authors":"Aasma Abid, Mukhtar Hussain, F. Kausar","doi":"10.1109/NBiS.2009.18","DOIUrl":null,"url":null,"abstract":"Security of sensor network communication architecture relies on its routing scheme. This paper presents a secure routing scheme for heterogeneous sensor networks (HSNs). HSNs have proven to be more secure and scalable as compared to homogeneous sensor networks which are prone to routing attacks due to resource constraints. In our proposed scheme, routing tables are generated with multipath routing. Base station generates inter-cluster routes and cluster head generates intra-cluster routes. This minimizes the computation load on cluster nodes. We also provide light-weight broadcast authentication used for secure routing table generation and data communication; and to reduce communication overhead. Further, proposed scheme introduces security architecture with in routing protocol. The analysis of proposed scheme shows that it is secure against routing attacks and tolerant to compromised nodes.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2009.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Security of sensor network communication architecture relies on its routing scheme. This paper presents a secure routing scheme for heterogeneous sensor networks (HSNs). HSNs have proven to be more secure and scalable as compared to homogeneous sensor networks which are prone to routing attacks due to resource constraints. In our proposed scheme, routing tables are generated with multipath routing. Base station generates inter-cluster routes and cluster head generates intra-cluster routes. This minimizes the computation load on cluster nodes. We also provide light-weight broadcast authentication used for secure routing table generation and data communication; and to reduce communication overhead. Further, proposed scheme introduces security architecture with in routing protocol. The analysis of proposed scheme shows that it is secure against routing attacks and tolerant to compromised nodes.