Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 1321079, 11 pages
http://dx.doi.org/10.1155/2016/1321079
Research Article

An Energy-Efficient Secure Scheme in Wireless Sensor Networks

1School of Information and Communication Engineering, Chungbuk National University, 1 Chungdaero, Seowon-gu, Cheongju 362-763, Republic of Korea
2LOTTE Engineering & Construction IS Team, LOTTE Data Communication Co., Saerom B/D, No. 18-1, Jamwon-dong, Seocho-gu, Seoul 137-903, Republic of Korea
3Agency for Defense Development, Bugyuseong-daero 488, Yuseong, Daejeon 305-600, Republic of Korea

Received 18 November 2015; Revised 28 April 2016; Accepted 10 May 2016

Academic Editor: Hana Vaisocherova

Copyright © 2016 Kyoungsoo Bok et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Park, H. Park, D.-O. Seong, and J. Yoo, “A sensor positioning scheme with high accuracy in nonuniform wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 507605, 7 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. T. M. Cao, B. Bellata, and M. Oliver, “Design of a generic management system for wireless sensor networks,” Ad Hoc Networks, vol. 20, pp. 16–35, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for self-organization of a wireless sensor network,” IEEE Personal Communications, vol. 7, no. 5, pp. 16–27, 2002. View at Publisher · View at Google Scholar · View at Scopus
  5. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–105, 2002. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Zhu, L. Shu, T. Hara, L. Wang, S. Nishio, and L. T. Yang, “A survey on communication and data management issues in mobile sensor networks,” Wireless Communications and Mobile Computing, vol. 14, no. 1, pp. 19–36, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. X.-H. Li and Z.-H. Guan, “Energy-aware routing in wireless sensor networks using local betweenness centrality,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 307038, 9 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. Z. Sun and Z. Shao, “Greedy forwarding routing strategy based on energy efficiency in wireless sensor network,” Journal of Networks, vol. 8, no. 10, pp. 2317–2323, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. J. M. Kahn, R. H. Katz, and K. S. J. Pister, “Next century challenges: mobile networking for ‘Smart Dust’,” in Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 271–278, Seattle, Wash, USA, August 1999. View at Publisher · View at Google Scholar
  10. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “TSRF: a trust-aware secure routing framework in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 209436, 14 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Zhou, “Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 108968, 17 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Lu, X. Lin, H. Zhu, and X. Shen, “TESP2: timed efficient source privacy preservation scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 105–110, IEEE, Cape Town, South Africa, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Samundiswary, D. Sathian, and P. Dananjayan, “Secured greedy perimeter stateless routing for wireless sensor networks,” International Journal of Ad Hoc, Sensor & Ubiquitous Computing, vol. 1, no. 2, pp. 9–20, 2010. View at Google Scholar
  15. R. Rivest, The MD5 Message-Digest Algorithm, MIT Laboratory for Computer Science and RSA Data Security Inc, 1992.
  16. B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 243–254, August 2000. View at Scopus
  17. National Bureau of Standards (NBS), Data Encryption Standard, vol. 46 of FIPS Publications, National Bureau of Standards (NBS), 1977.
  18. NIST, “Advanced encryption standard,” FIPS Pub. 197, U.S. Department of Commerce, 2001. View at Google Scholar
  19. http://en.wikipedia.org/wiki/Data_Encryption_Standard.
  20. http://en.wikipedia.org/wiki/Advanced_Encryption_Standard.
  21. http://en.wikipedia.org/wiki/MD5.
  22. C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162–175, Baltimore, Md, USA, November 2004. View at Scopus
  23. Y. Li and J. Ren, “Source-location privacy through dynamic routing in wireless sensor networks,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '10), IEEE, San Diego, Calif, USA, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. Y.-R. Chuang, H.-W. Tseng, S.-T. Sheu, and C.-W. Su, “An almost overhead-free error control scheme for IEEE 802.16-based multi-hop networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '09), pp. 1–6, Honolulu, Hawaii, USA, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. Y.-R. Chuang, H.-W. Tseng, and S.-T. Sheu, “A performance study of discrete-error-checking scheme (DECS) with the optimal division locations for IEEE 802.16-based multihop networks,” IEEE Transactions on Computers, vol. 62, no. 12, pp. 2354–2365, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  26. http://www.accuweather.com.