Advanced Search
Volume 37 Issue 8
Aug.  2015
Turn off MathJax
Article Contents
Long Zhao-hua, Gong Jun, Wang Bo, Qin Xiao-huan, Liu Da-ming. Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs[J]. Journal of Electronics & Information Technology, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284
Citation: Long Zhao-hua, Gong Jun, Wang Bo, Qin Xiao-huan, Liu Da-ming. Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs[J]. Journal of Electronics & Information Technology, 2015, 37(8): 2000-2006. doi: 10.11999/JEIT141284

Energy Efficiency Study of Secret Communication Method on ClusteringSecure Routing in WSNs

doi: 10.11999/JEIT141284
  • Received Date: 2014-10-19
  • Rev Recd Date: 2015-04-15
  • Publish Date: 2015-08-19
  • The method of secure communications is the critical techniques for Wireless Sensor Networks (WSNs) to guarantee the routing information security in the process of transmission. But most of wireless sensor network routing protocol have problems involving security. From the perspective of balanced energy consumption, a balanced energy consumption of Secret Communication Protocol(SCP) is proposed and the SCP secret communication method is also introduced. In addition, the security scheme of the agreement is analysed in this paper. Finally, simulation is conducted on the performance of the protocol. The results show that this protocol has high performance in terms of energy and security.
  • loading
  • Kohanbash D, Kantor G, and Martin T, et al.. Wireless sensor network design for monitoring and irrigation control: user-centric hardware and software development[J]. HortTechnology, 2013, 23(6): 725-734.
    Park Y T, Sthapit P, and Pyun J Y. Energy efficient data fragmentation for ubiquitous computing[J]. The Computer Journal, 2014, 57(2): 263-272.
    Padmavathi G and Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks[J]. International Journal of Computer Science and Information Security, 2009, 4(1/2): 1-9.
    Wang X and Li Y. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks[J]. Chinese Journal of Electronics, 2009, 18(1): 8-12.
    司海飞, 杨忠, 王珺. 无线传感器网络研究现状与应用[J]. 机电工程, 2011, 28(1): 16-20.
    Si H, Yang Z, and Wang J. Review on research status and application of wireless sensor networks[J] Journal of Mechanical Electrical Engineering, 2011, 28(1): 16-20.
    钱志鸿, 王义君. 面向物联网的无线传感器网络综述[J]. 电子与信息学报, 2013, 35(1): 215-227.
    Qian Z and Wang Y. Internet of things-oriented wireless sensor networks review[J] Journal of Electronics Information Technology, 2013, 35(1): 215-227.
    Wang X, Yang L, and Chen K. Sleach: secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks[J]. Wuhan University Journal of Natural Sciences, 2006, 10(1): 127-131.
    Chen X, Yang Z, and Cheng H. Unequal clustering mechanism of leach protocol for wireless sensor networks[C]. 2009 WRI World Congress on Computer Science and Information Engineering, IEEE, Los Angeles, CA, USA, 2009, 1: 258-262.
    Perrig A, Szewczyk R, and Tygar J D, et al.. Spins: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534.
    Ye M, Li C, Chen G, et al.. EECS: an energy efficient clustering scheme in wireless sensor networks[C]. 24th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 2005: 535-540.
    黄振海, 赖晓龙, 铁满霞, 等. 三元对等鉴别及访问控制方法国际提案进展[J]. 信息技术与标准化, 2009(6): 21-23.
    Huang Z, Lai X, and Tie M, et al.. The progress of Tri- element Peer Authentication (TePA) and access control method[J]. Information Technology Standardization, 2009(6): 21-23.
    Das M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communi- cations, 2009, 8(3): 1086-1090.
    Gu Y, Ji Y, Chen H, et al.. TAPEMAN: towards an optimal data gathering mechanism in wireless sensor networks[J]. Chinese Journal of Electronics, 2013, 19(4): 594-598.
    Kumar P, Choudhury A J, Sain M, et al.. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1470) PDF downloads(471) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return