An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks

Jing Chen, Huanguo Zhang, Junhui Hu
{"title":"An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks","authors":"Jing Chen, Huanguo Zhang, Junhui Hu","doi":"10.1109/AMS.2008.41","DOIUrl":null,"url":null,"abstract":"Routing security is one of the most important considerations in Wireless Sensor Networks (WSNs). Currently, more and more people pay attention to this issue. But most of the secure protocols must use public key and symmetric cryptographies which induce heavy load to nodes in the whole routing stage. In this paper, we propose an Efficiency Security Model of Routing (ESMR). In routing stage, ESMR only uses public key cryptography when new nodes enter the wireless sensor network and does not use symmetric cryptography at all. Through the security analyzing, we find our cryptography method only can resist the outside attackers, but it is helpless to inside attackers. Therefore, reputation mechanism is proposed against inside attackers in ESMR. The simulation result shows that the performance of ESMR is not as good as LEACH (Low-Energy Adaptive Clustering Hierarchy routing protocol) in no attacker environment, but it becomes better and better with the number of attackers increasing.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AMS.2008.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

Routing security is one of the most important considerations in Wireless Sensor Networks (WSNs). Currently, more and more people pay attention to this issue. But most of the secure protocols must use public key and symmetric cryptographies which induce heavy load to nodes in the whole routing stage. In this paper, we propose an Efficiency Security Model of Routing (ESMR). In routing stage, ESMR only uses public key cryptography when new nodes enter the wireless sensor network and does not use symmetric cryptography at all. Through the security analyzing, we find our cryptography method only can resist the outside attackers, but it is helpless to inside attackers. Therefore, reputation mechanism is proposed against inside attackers in ESMR. The simulation result shows that the performance of ESMR is not as good as LEACH (Low-Energy Adaptive Clustering Hierarchy routing protocol) in no attacker environment, but it becomes better and better with the number of attackers increasing.
无线传感器网络中路由协议的高效安全模型
路由安全是无线传感器网络(WSNs)中最重要的问题之一。目前,越来越多的人开始关注这个问题。但是大多数安全协议必须使用公钥和对称加密,这在整个路由阶段都会给节点带来很大的负载。本文提出了一种路由效率安全模型(ESMR)。在路由阶段,ESMR只在新节点进入无线传感器网络时使用公钥加密,根本不使用对称加密。通过安全性分析,我们发现我们的加密方法只能抵御外部攻击者,而对内部攻击者却无能为力。因此,在ESMR中提出了针对内部攻击者的信誉机制。仿真结果表明,在无攻击者环境下,ESMR的性能不如LEACH (Low-Energy Adaptive Clustering Hierarchy路由协议),但随着攻击者数量的增加,ESMR的性能越来越好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信