79
Views
30
CrossRef citations to date
0
Altmetric
Original Articles

New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks

, &
Pages 341-365 | Received 01 Dec 2015, Published online: 03 Apr 2017

References

  • K. Anil Kumar, “IMCC protocol in heterogeneous wireless sensor network for high quality data transmission in military applications,” In: 1st IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 339–343, 2010.
  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. doi: 10.1016/S1389-1286(01)00302-4
  • Parveen Kumar, “Study Of Heterogeneous Energy Models in Wireless Sensor,” Journal of Global Research in Computer Science, vol. 6, No. 2, pp. 12–16, 2015.
  • Q. Yang, X. Zhu, H. Fu, and X. Che, “Survey of Security Technologies on Wireless Sensor Networks,” Journal of sensors, Hindawi Publishing corp, vol. 2015, 2014.
  • M. Sharifnejad, M. Sharifi, M. Ghiasabadi, and S. Beheshti, “A survey on wireless sensor network security,” in Processing of the 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Hammamet, Tunisia, 2007.
  • A. Manjeshwar and D. P. Agrawal, “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks,” In Proceedings of 15th International Parallel and Distributed Processing Symposium Workshops (IPDPS ’01), Issues in Wireless Networks and Mobile, pp. 2009–2015, 2000.
  • Megha Shah, Tamanna “Improvement in Life of Routing Protocol by Styling an Improved Cluster Head theme using LEACH,” Journal of Network Communications and Emerging Technologies (JNCET), vol 3, Issue 2, 2015.
  • Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPINS: security protocols for sensor networks,” In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (Mobicom ’01), pp. 189–199, 2001.
  • L. Eschenauer and V. D. Gligor, “A key management scheme for distributed sensor networks,” in Proc. 9th ACM Conference on Computer and Communication Security, pp. 41–47, 2002.
  • H. Chan, A. Perrig, and D. Song, “Random key pre distribution schemes for sensor networks,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 197–213, 2003.
  • Taejoon Park, Kang G. Shin, LiSP: A lightweight security protocol for wireless sensor networks, ACM Transactions on Embedded Computing Systems (TECS), vol.3 No.3, pp.634–660, 2004. doi: 10.1145/1015047.1015056
  • H. O. Sanli, S. Ozdemir, and H. Cam, “SRDA: secure reference based data aggregation protocol for wireless sensor networks,” In Proceedings of the IEEE 60th Vehicular Technology Conference (VTC ’04), pp. 406–410, 2004.
  • T. Dimitriou and I. Krontiris, “A localized, distributed protocol for secure information exchange in sensor networks,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS ’05), pp. 37–45, 2005.
  • S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), pp. 62–72, 2003.
  • D. Liu, P. Ning, and W. Du, “Group based key pre distribution in wireless sensor networks,” In Proceedings of the ACM Workshop on Wireless Security, pp. 11–20, 2005.
  • X. J. Du, M. Guizani, Y. Xiao, and H.-H. Chen, “Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1223–1229, 2009. doi: 10.1109/TWC.2009.060598
  • Y. Qiu, J. Y. Zhou, J. Baek et al., “Authentication and key establishment in dynamic wireless sensor networks,” Sensors, vol. 10, no. 4, pp. 3718–3731, 2010. doi: 10.3390/s100403718
  • R. Watro, D. Kong, S.-F. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: securing sensor networks with public key technology,” in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64, 2004.
  • Z. Benenson, N. Gedicke, and O. Raivio, “Realizing robust user authentication in sensor networks,” in Proceedings of the Workshop on Real World Wireless Sensor Networks, pp.135–142, 2005.
  • C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 56–57, 2000.
  • A. Ouadjaout, Y. Challal, N. Lasla, and M. Bagaa, “SEIF: secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks,” in Proceedings of the 3rd IEEE International Conference on Availability, Security, and Reliability (ARES ’08), pp. 503–505, 2008.
  • Z. M. Zhang, C. G. Jiang, and J. Deng, “Multiple-path redundancy secret anonymous routing protocol for wireless sensor networks,” In Proceedings of the 6th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM’10), pp.1–4, 2010.
  • M. A. Moustafa, M. Youssf, and N. M. El-Dering, “MSR: a multipath secure reliable routing protocol for WSNs,” in Proceedings of the 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA ’11), pp. 54–59, 2011.
  • Teo J Y, Ha Y, Tham C K. Interference-minimized multipath routing with congestion control in wireless sensor network for high-rate streaming [J]., IEEE Transactions on Mobile Computing, 7 (9): 1124-1137, 2008. doi: 10.1109/TMC.2008.24
  • S. Fouchal, D. Mansouri, L. Mokdad and M. Iouallalen “Recursive-clustering-based approach for denial of service (DOS) attacks in wireless sensor networks”, Volume 28, Issue 2, pages 309–324, 25, 2015.
  • T. Kavitha, D. Sridharan, “Security Vulnerabilities In Wireless Sensor Networks: A Survey,” Journal of Information Assurance and Security Vol 5, pp 031–044, 2010.
  • Panagiotis Sarigiannidis, Eirini Karapistoli, Anastasios A. Economides” Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information”, Elsevier, Expert systems with applications, vol 42, Issue 21, 30, pp 7560–7572, 2015
  • Yong Wang, Garhan Attebury, And Byrav Ramamurthy, “A Survey Of Security Issues In Wireless Sensor Networks” , IEEE Communications Surveys & Tutorials, vol 8, No. 2, 2006. doi: 10.1109/COMST.2006.315852
  • Naser M. Alajmi and Khaled M. Elleithy “Selective Forwarding Attacks Detection in WSNs”, ASEE Northeast Section Conference, American Society for Engineering Education,2015
  • S. Umamaheswari and R. Mahalakshmi “Performance Analysis of Wireless Sensor Networks in Presence of Wormhole Attacks for Various Topologies”, International Journal of Applied Engineering Research, vol 10, No. 7, pp. 16181–16196, 2015.
  • Muhammad Umar Aftab, Omair Ashraf, Muhammad Irfan, Muhammad Majid, Amna Nisar, Muhammad Asif Habib, “A Review Study of Wireless Sensor Networks and Its Security” Communications and Network, vol 7, pp 172–179, 2015. doi: 10.4236/cn.2015.74016
  • Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha “Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks”, IEEE Transactions On Dependable And Secure Computing, vol. 12, No. 1, 2015. doi: 10.1109/TDSC.2014.2316816
  • Weisheng Tang, Xiaoyuan Ma, Jun Huang and Jianming Wei “Toward Improved RPL: A Congestion Avoidance Multipath Routing Protocol with Time Factor for Wireless Sensor Networks”, Hindawi Publishing Corporation, Journal of Sensors, 2015.
  • Mohamed I. Gaber, Imbaby I. Mahmoud, Osama, Abdelhalim Zekry “Comparison of Routing Protocols in Wireless Sensor Networks for Monitoring Applications”, International Journal of Computer Applications, vol 113 – No. 12, 2015. doi: 10.5120/19875-1879
  • Koffka Khan, Wayne Goodridge “Energy Aware Ad Hoc On-Demand Multipath Distance Vector Routing”, I.J. Intelligent Systems and Applications, vol 07, pp 50–56, 2015. doi: 10.5815/ijisa.2015.07.07
  • Zhongyuan Qin, Xinshuai Zhang, Kerong Feng, Qunfang Zhang, and Jie Huang “An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks” Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, vol 2015, pp 7, 2015.
  • Koffka Khan, “The Security of Elliptic Curve Cryptosystems - A Survey”, Global Journal of Computer Science and Technology: E Network, Web & Security, vol 15, Issue 5 Ver 1.0, 2015.
  • X. Zeng, R. Bagrodia, and M. Gerla, “GloMoSim: a library for parallel simulation of large scale wireless networks,” Proceedings. Twelfth Work. Parallel Distrib. Simul. PADS ’98 , pp. 154–161, 1998.
  • Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, ICACT, pp: 1043–1048, 2006.
  • Tanveer Zia and Albert Zomaya, “ Security Issues in Wireless Sensor Networks”, IEEE.
  • [41] Z. M. Zhang, C. G. Jiang, and J. Deng, “Multiple-path redundancy secret anonymous routing protocol for wireless sensor networks,” In Proceedings of the 6th IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM ’10), pp. 1–4, 2010.
  • J.P. Walters, Z.Q. Lian, W.S. Shietal., “Wireless sensor network security: a survey,” in Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, 2006.
  • Kakelli Anil Kumar, Addepalli V. N. Krishna, K. Shahu Chatrapati, “Interference Minimization Protocol in Heterogeneous Wireless Sensor Networks for Military Applications”, Springer, vol 51, pp 479–487, 2016.
  • Kakelli Anil Kumar , Addepalli V. N. Krishna, K. Shahu Chatrapati, “Congestion Control in Heterogeneous Wireless Sensor Networks for High-Quality Data Transmission”, Springer, vol 439, pp 429–437,2016.
  • Kakelli Anil Kumar , Addepalli V. N. Krishna, K. Shahu Chatrapati, “Interference Minimization Protocol in Heterogeneous Wireless Sensor Network for High Quality Data Transmission”, International Journal of Applied Engineering Research, vol. 10 No.81, 2015.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.