A secure directed diffusion routing protocol for wireless sensor networks

Nashwa El-Bendary, Omar S. Soliman, Neveen I. Ghali, Aboul Ella Hassanien, Vasile Palade, Hongbo Liu

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

7 Citations (Scopus)

Abstract

This paper presents a secure routing protocol for wireless sensor networks based on the recognized directed diffusion algorithm. The proposed secure routing protocol uses the μTESLA (micro Timed, Efficient, Streaming, Loss-tolerant Authentication) algorithm in order to authenticate acknowledgement messages sent from the sink to the source nodes for confirming delivery of data-event messages. A simulation based implementation and performance evaluation for the proposed protocol was conducted against black hole and acknowledgement-spoofing attacks. Simulations show that the proposed secure routing protocol achieved better event-delivery and event-dropping ratios compared to the original directed diffusion protocol. However, it resulted higher cost in the mean dissipated energy and average delay in some situations due to acknowledgements and authentication processes for delivered events and also due to the retransmissions of non-acknowledged events.

Original languageEnglish
Title of host publicationProceedings - 2nd International Conference on Next Generation Information Technology, ICNIT 2011
PublisherIEEE
Pages149-152
Number of pages4
ISBN (Electronic) 9788988678398
ISBN (Print)9788988678381
Publication statusPublished - 2011
Externally publishedYes
Event2nd International Conference on Next Generation Information Technology, ICNIT 2011 - Gyeongju, Korea, Republic of
Duration: 21 Jun 201123 Jun 2011

Conference

Conference2nd International Conference on Next Generation Information Technology, ICNIT 2011
Country/TerritoryKorea, Republic of
CityGyeongju
Period21/06/1123/06/11

Keywords

  • μTESLA
  • Directed Diffusion
  • Wireless Sensor Network (WSN)

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'A secure directed diffusion routing protocol for wireless sensor networks'. Together they form a unique fingerprint.

Cite this