Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 185156, 12 pages
http://dx.doi.org/10.1155/2014/185156
Research Article

A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks

College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Republic of Korea

Received 1 April 2014; Accepted 2 July 2014; Published 17 July 2014

Academic Editor: You-Chiun Wang

Copyright © 2014 Soo Young Moon and Tae Ho Cho. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. N. Xu, “A survey of sensor network applications,” Tech. Rep., University of Southern California, 2002. View at Google Scholar
  2. J. A. Stankovic, “When sensor and actuator networks cover the world,” ETRI Journal, vol. 30, no. 5, pp. 627–633, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002. View at Publisher · View at Google Scholar · View at Scopus
  4. J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications, vol. 11, no. 6, pp. 6–28, 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu, “Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards,” Computer Communications, vol. 30, no. 7, pp. 1655–1695, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. D. Djenouri, L. Khelladi, and A. N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications Surveys & Tutorials, vol. 7, no. 4, pp. 2–28, 2005. View at Publisher · View at Google Scholar
  7. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. View at Publisher · View at Google Scholar · View at Scopus
  8. S. William, Network Security Essentials, Pearson Education, 3rd edition, 2007.
  9. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-route filtering of injected false data in sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839–850, 2005. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “Interleaved hop-by-hop authentication against false data injection attacks in sensor networks,” ACM Transactions on Sensor Networks, vol. 3, no. 3, pp. 14–33, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Yu and Y. Guan, “A dynamic en-route filtering scheme for data reporting in wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150–163, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. H. Lee and T. Cho, “Key inheritance-based false data filtering scheme in wireless sensor networks,” in Distributed Computing and Internet Technology, vol. 4317 of Lecture Notes in Computer Science, pp. 116–127, Springer, Berlin, Germany, 2006. View at Google Scholar
  13. T. P. Nghiem and T. H. Cho, “A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks,” Journal of Parallel and Distributed Computing, vol. 69, no. 5, pp. 441–450, 2009. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Y. Lee and T. H. Cho, “Fuzzy adaptive selection of filtering schemes for energy saving in sensor networks,” IEICE Transactions on Communications, vol. E90-B, no. 12, pp. 3346–3353, 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Y. Lee and T. H. Cho, “Fuzzy-based path selection method for improving the detection of false reports in sensor networks,” IEICE Transactions on Information and Systems, vol. 92, no. 8, pp. 1574–1576, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Y. Moon and T. H. Cho, “Key index-based routing for filtering false event reports in wireless sensor networks,” IEICE Transactions on Communications, vol. 95, no. 9, pp. 2807–2814, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. J. M. Kim, Y. S. Han, H. Y. Lee, and T. H. Cho, “Path renewal method in filtering based wireless sensor networks,” Sensors, vol. 11, no. 2, pp. 1396–1404, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Savvides, C.-C. Han, and M. B. Strivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 166–179, July 2001. View at Scopus
  19. N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, “Cricket location-support system,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 32–43, Boston, Mass, USA, August 2000. View at Scopus
  20. J. Arias, J. Lázaro, A. Zuloaga, J. Jiménez, and A. Astarloa, “GPS-less location algorithm for wireless sensor networks,” Computer Communications, vol. 30, no. 14-15, pp. 2904–2916, 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Yu, R. Govindan, and D. Estrin, “Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks,” Tech. Rep. UCLA/CSD-TR-01-0023, 2001. View at Google Scholar
  22. B. Karp and H. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom '00), pp. 243–254, 2000.
  23. S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, “Secure pebblenets,” in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), pp. 156–163, ACM, October 2001. View at Scopus
  24. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS '00), vol. 2, IEEE, January 2000. View at Publisher · View at Google Scholar · View at Scopus
  25. I. Mantin, Analysis of the stream cipher RC4, 2001.
  26. D. J. Wheeler and R. M. Needham, “TEA, a tiny encryption algorithm,” in Fast Software Encryption, vol. 1008 of Lecture Notes in Computer Science, pp. 363–366, Springer, 1995. View at Publisher · View at Google Scholar
  27. W. Ye, J. Heidemann, and D. Estrin, “Medium access control with coordinated adaptive sleeping for wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493–506, 2004. View at Publisher · View at Google Scholar · View at Scopus
  28. P. Levis, S. Madden, J. Polastre et al., “Tinyos: an operating system for sensor networks,” in Ambient Intelligence, pp. 115–148, Springer, 2005. View at Google Scholar
  29. M. Crossbow, Mica2 Wireless Measurement System Datasheets, 2003.
  30. E. Zurich, BTnode rev. 3, Hardware Reference, 2007.