The Scientific World Journal
Volume 2014 (2014), Article ID 185156, 12 pages
http://dx.doi.org/10.1155/2014/185156
Research Article
A Routing Path Construction Method for Key Dissemination Messages in Sensor Networks
College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Republic of Korea
Received 1 April 2014; Accepted 2 July 2014; Published 17 July 2014
Academic Editor: You-Chiun Wang
Copyright © 2014 Soo Young Moon and Tae Ho Cho. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Linked References
- N. Xu, “A survey of sensor network applications,” Tech. Rep., University of Southern California, 2002. View at Google Scholar
- J. A. Stankovic, “When sensor and actuator networks cover the world,” ETRI Journal, vol. 30, no. 5, pp. 627–633, 2008. View at Publisher · View at Google Scholar · View at Scopus
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002. View at Publisher · View at Google Scholar · View at Scopus
- J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications, vol. 11, no. 6, pp. 6–28, 2004. View at Publisher · View at Google Scholar · View at Scopus
- P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. F. Hu, “Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards,” Computer Communications, vol. 30, no. 7, pp. 1655–1695, 2007. View at Publisher · View at Google Scholar · View at Scopus
- D. Djenouri, L. Khelladi, and A. N. Badache, “A survey of security issues in mobile ad hoc and sensor networks,” IEEE Communications Surveys & Tutorials, vol. 7, no. 4, pp. 2–28, 2005. View at Publisher · View at Google Scholar
- C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. View at Publisher · View at Google Scholar · View at Scopus
- S. William, Network Security Essentials, Pearson Education, 3rd edition, 2007.
- F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-route filtering of injected false data in sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 839–850, 2005. View at Publisher · View at Google Scholar · View at Scopus
- S. Zhu, S. Setia, S. Jajodia, and P. Ning, “Interleaved hop-by-hop authentication against false data injection attacks in sensor networks,” ACM Transactions on Sensor Networks, vol. 3, no. 3, pp. 14–33, 2007. View at Publisher · View at Google Scholar · View at Scopus
- Z. Yu and Y. Guan, “A dynamic en-route filtering scheme for data reporting in wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150–163, 2010. View at Publisher · View at Google Scholar · View at Scopus
- H. Lee and T. Cho, “Key inheritance-based false data filtering scheme in wireless sensor networks,” in Distributed Computing and Internet Technology, vol. 4317 of Lecture Notes in Computer Science, pp. 116–127, Springer, Berlin, Germany, 2006. View at Google Scholar
- T. P. Nghiem and T. H. Cho, “A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks,” Journal of Parallel and Distributed Computing, vol. 69, no. 5, pp. 441–450, 2009. View at Publisher · View at Google Scholar · View at Scopus
- H. Y. Lee and T. H. Cho, “Fuzzy adaptive selection of filtering schemes for energy saving in sensor networks,” IEICE Transactions on Communications, vol. E90-B, no. 12, pp. 3346–3353, 2007. View at Publisher · View at Google Scholar · View at Scopus
- H. Y. Lee and T. H. Cho, “Fuzzy-based path selection method for improving the detection of false reports in sensor networks,” IEICE Transactions on Information and Systems, vol. 92, no. 8, pp. 1574–1576, 2009. View at Publisher · View at Google Scholar · View at Scopus
- S. Y. Moon and T. H. Cho, “Key index-based routing for filtering false event reports in wireless sensor networks,” IEICE Transactions on Communications, vol. 95, no. 9, pp. 2807–2814, 2012. View at Publisher · View at Google Scholar · View at Scopus
- J. M. Kim, Y. S. Han, H. Y. Lee, and T. H. Cho, “Path renewal method in filtering based wireless sensor networks,” Sensors, vol. 11, no. 2, pp. 1396–1404, 2011. View at Publisher · View at Google Scholar · View at Scopus
- A. Savvides, C.-C. Han, and M. B. Strivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 166–179, July 2001. View at Scopus
- N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, “Cricket location-support system,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 32–43, Boston, Mass, USA, August 2000. View at Scopus
- J. Arias, J. Lázaro, A. Zuloaga, J. Jiménez, and A. Astarloa, “GPS-less location algorithm for wireless sensor networks,” Computer Communications, vol. 30, no. 14-15, pp. 2904–2916, 2007. View at Publisher · View at Google Scholar · View at Scopus
- Y. Yu, R. Govindan, and D. Estrin, “Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks,” Tech. Rep. UCLA/CSD-TR-01-0023, 2001. View at Google Scholar
- B. Karp and H. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom '00), pp. 243–254, 2000.
- S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, “Secure pebblenets,” in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '01), pp. 156–163, ACM, October 2001. View at Scopus
- W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS '00), vol. 2, IEEE, January 2000. View at Publisher · View at Google Scholar · View at Scopus
- I. Mantin, Analysis of the stream cipher RC4, 2001.
- D. J. Wheeler and R. M. Needham, “TEA, a tiny encryption algorithm,” in Fast Software Encryption, vol. 1008 of Lecture Notes in Computer Science, pp. 363–366, Springer, 1995. View at Publisher · View at Google Scholar
- W. Ye, J. Heidemann, and D. Estrin, “Medium access control with coordinated adaptive sleeping for wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493–506, 2004. View at Publisher · View at Google Scholar · View at Scopus
- P. Levis, S. Madden, J. Polastre et al., “Tinyos: an operating system for sensor networks,” in Ambient Intelligence, pp. 115–148, Springer, 2005. View at Google Scholar
- M. Crossbow, Mica2 Wireless Measurement System Datasheets, 2003.
- E. Zurich, BTnode rev. 3, Hardware Reference, 2007.