An energy efficient flooding protocol for enhanced security in Wireless Sensor Networks

Johnu Celestine, Keerthi Vallepalli, Tushar Vinayaraj, Jasim Almotir, Abdelshakour A. Abuzneid
{"title":"An energy efficient flooding protocol for enhanced security in Wireless Sensor Networks","authors":"Johnu Celestine, Keerthi Vallepalli, Tushar Vinayaraj, Jasim Almotir, Abdelshakour A. Abuzneid","doi":"10.1109/LISAT.2015.7160203","DOIUrl":null,"url":null,"abstract":"There have been a plethora of researches focusing on providing privacy for the base station in Wireless Sensor Networks. One of the proposed solutions is to use dummy data sources, where dummy traffic is introduced to obfuscate the real traffic. This makes the adversary no longer able to see difference between real and fake traffic. In this solution, every node becomes a dummy data source and sends dummy packets to neighbor nodes, which create dummy traffic and hide the real packet from adversary. This technique uses flooding method for routing. Every node sends the received packet to all its neighbor nodes except the one which initiated the process. However, this technique has several disadvantages, most important, large bandwidth and energy consumption. In this paper, we propose a novel protocol which uses dummy data sources with variable packet size to provide security and conserve energy in WSN.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Long Island Systems, Applications and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2015.7160203","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

There have been a plethora of researches focusing on providing privacy for the base station in Wireless Sensor Networks. One of the proposed solutions is to use dummy data sources, where dummy traffic is introduced to obfuscate the real traffic. This makes the adversary no longer able to see difference between real and fake traffic. In this solution, every node becomes a dummy data source and sends dummy packets to neighbor nodes, which create dummy traffic and hide the real packet from adversary. This technique uses flooding method for routing. Every node sends the received packet to all its neighbor nodes except the one which initiated the process. However, this technique has several disadvantages, most important, large bandwidth and energy consumption. In this paper, we propose a novel protocol which uses dummy data sources with variable packet size to provide security and conserve energy in WSN.
一种提高无线传感器网络安全性的高能效泛洪协议
关于无线传感器网络中基站的隐私保护问题已经有了大量的研究。提出的解决方案之一是使用虚拟数据源,其中引入虚拟流量来混淆真实流量。这使得对手不再能够看到真实和虚假流量之间的区别。在该方案中,每个节点都成为一个虚拟数据源,并向邻居节点发送虚拟数据包,从而产生虚拟流量,并对攻击者隐藏真实数据包。该技术使用泛洪方法进行路由。除了发起进程的节点外,每个节点将接收到的数据包发送给所有相邻节点。然而,这种技术有几个缺点,最重要的是,大带宽和能量消耗。本文提出了一种利用可变数据包大小的虚拟数据源来保证无线传感器网络安全性和节能的新协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信