HOME JOURNALS CONTACT

Information Technology Journal

Year: 2011 | Volume: 10 | Issue: 7 | Page No.: 1359-1366
DOI: 10.3923/itj.2011.1359.1366
An Efficient Data Delivery Mechanism by Exploring Multipath Routes for Wireless Sensor Networks
Zhiqiang Ruan and Xingming Sun

Abstract: This paper study the data delivery mechanisms that can with high probability thwarting node capture attacks in unattended or distributed wireless sensor networks. Classic cryptographic approaches are vulnerable to such attacks, mainly due to their deterministic nature. Because once the adversary compromises the sensor nodes, it can acquire the credential as well as the data collected and held by sensors. Furthermore, the adversary can easily insert bogus sensor readings or change the processing results and then use these keys to authenticate forged information. This study proposes and analyzes the application of Reed-Solomon (RS) codes to address the problem. In the proposed scheme, each sensor node encodes the original data into multiple redundancy data shares by applying predefined (n, k) RS codes and applies non-uniform allocation through multiple node-disjoint paths to the destination. Analysis and simulation results demonstrate that the proposed scheme is efficient and resilient against node capture attack.

Fulltext PDF Fulltext HTML

How to cite this article
Zhiqiang Ruan and Xingming Sun, 2011. An Efficient Data Delivery Mechanism by Exploring Multipath Routes for Wireless Sensor Networks. Information Technology Journal, 10: 1359-1366.

Keywords: Wireless sensor network, data delivery, node capture, fault tolerant and probabilistic analysis

INTRODUCTION

Wireless sensor networks (WSNs) are envisioned to be extremely useful for a broad spectrum of emerging civil and military applications (Akyildiz et al., 2002), such as remote surveillance, hazard leak detection and battlefield sensing. Security issue is still in its early stage of development. Of the various possible security threats encountered in a wireless sensor networks, this study specifically interested in combating compromised-node attacks (Meng et al., 2008). Due to the unattended nature of WSNs, an adversary can physically compromise a subset of nodes to eavesdrop information; they can interfere with the normal operation of the network by actively disrupting, changing, or even paralyzing the functionality of a subset of nodes. One important feature that separates it from other adversarial models is its mobility (Ruan et al., 2010). Specifically, the adversary has one central goal: to prevent certain data collected by sensors from ever reaching the sink or provide forged information to mislead the user to make incorrect decisions.

Existing approaches are achieved by cryptographic techniques (Wei et al., 2007) or watermarking method (Wang et al., 2011). However, due to the limited resource of sensor nodes coupled with the unattended operation of such networks, an adversary who can potentially capture nodes, recover their cryptographic material. Internal adversaries (or compromised nodes) can further alter and insert bogus data and pose as an authorized node in the network. If the sensor networks deployed in hostile environment and always provides highly valuable information to the end user but when most of the information has been forged and misleads the user to make incorrect decisions (Ruan et al., 2010). Attaching message authentication codes can verify the modification of data but cannot verify its validity (Wang et al., 2011). In general, the conventional view of security based on cryptography and authentication alone is not sufficient to provide a complete solution for developing secure and dependable sensor data delivery mechanism due to the unique characteristics and novel misbehaviours encountered in unattended sensor networks.

The intent of this work is to develop an efficient in-network data delivery mechanism for sensor data, while simultaneously robust to stop forwarding as well as filtering out bogus data. The work is motivated from the well studied secret sharing and multipath routing. The strategy is for each node to partition the original data into multiple redundancy data shares by applying predefined Reed-Solomon (RS) codes (Goodson et al., 2004) and utilize non-uniform allocation of data shares through multiple node-disjoint paths to the sink. It is noted that the proposed scheme does not eliminate the utilization of any conventional cryptography approaches, such as data encryption and pairwise key establishment and it works as a complementary component to provide an enhanced security solution with the imperfect unattended WSN.

PRELIMINARIES

This section gives the preliminaries to be used in this study. For the sake of clarity and convenience description, the notations used in the following sections are given in Table 1.

The (n, k) codes are used to share secrets among n users, any k of which can recover the secret cooperatively. The Shamir scheme (Shamir, 1979) is one of such schemes. As pointed out in (Goodson et al., 2004), an RS code may be treated as a special (n, k) secret-sharing scheme with tamper-resistant capability, because it can correct errors.

Let GF(2a) be the finite field of order 2a such that each element in GF(2a) can be represented by a bits. An (n, k) RS code is a linear code, where each symbol is in GF(2a), with parameters: n = 2a -1 and n-k = 2t, where n is the total number of code symbols in the coded block, k is the total number of information symbols and t is the symbol-error-correcting capability of the code. Let m(x) be the information polynomial represented as m(x) = m0+m1x+…+mk-1xk-1, where mi is a a bits code.

The codeword polynomial c(x) corresponding to m(x) can be encoded as:

(1)

Where:

(2)

is the parity check polynomial and g(x) is a publicly known generator polynomial which can be obtained as:

(3)

where, β is a primitive element in GF(2a) and giεGF(2a), note that g(x) has β, β2, …, β2t as roots.

Since each symbol is represented by a bits, an (n, k) RS code can be expended to a (an, ak) binary linear block code. For example, a (17, 9) RS code with four symbol-error-correcting capabilities is of 8x9 = 72 information bits.

Table 1: Notations summary

The computational cost of encoder is roughly k(n-k) additions and k(n-k) multiplications.

The decoding processes of RS code are more complex. Let r(x) = r0+r1x+...+rk-1xk-1, e(x) = e0+e1x+…+ek-1xk-1, c (x)=c0+c1x+…+ck-1xk-1, where ei, ri, ri∈GF (2a), r (x) is the received polynomial, e (x) is error polynomial and c (x) is original data polynomial, then e (x) = r (x)-c(x). From Eq. 1-3 it is known that the roots of g(x) must also be the roots of c (x), r (x) evaluated at each of the roots of g (x) should yield zero only when it is a valid codeword. Any errors will result in one or more of the computations yielding a nonzero result. The computation of a syndrome symbol can be described as follows:

(4)

If there exists v errors, where 0≤v≤t, in the unknown locations j1, j2, …, jv of the received polynomial. Then:

(5)

Define the error values to be Yl=ej1, where l = 1, 2, , v and the error locators to be Xl jt, where l = 1, 2, …, v. Utilize Forney’s algorithm ( Lin and Costello, 2004) to derive the error values Yl. Thus, the error correcting polynomial:

(6)

To recover the original data c (x), using

(7)

THE PROPOSED SCHEME

Description of the Proposed scheme: This study uses symbols or shares interchange and the concept of node or path compromising characteristics gives as follows:

Definition 1: Given a path (s, e) consisting of nodes s, n1, n2, …, nl, e, define (s, e) is compromised as when any one or more of the nodes from n1 to nl is compromised. Otherwise, if (s, e) were not compromised, all data shares on (s, e) would be safe.
Definition 2: Given two node-disjoint paths pi and pj, i≠j, compromise pi is independent of pj.

According to Definition 1, the cost of sending a packet through one path is proportional to its hop count, more importantly, as the length of a multi-hop path increases, the possibility of path compromise is higher. Definition 2 shows the benefit of using node-disjoint path. Note that a compromised source makes the data delivery scheme meaningless, thus it is reasonable to assume that the source are trustworthy.

Let c= (c0 , c1,…, cn-1) be a codeword of an (n, k) RS code over GF(2a), where ci ∈ GF (2a) (1≤i≤n) is a symbol. Here, c0, c1, …, cn-1 are the information that the sensor node needs to send to the destination node or sink. Since an (n, k) RS code can recover up to t=(n-k)/2 errors, n should satisfy n=k+2t.

In order to minimize transmission overhead and simultaneously maximize the security of the scheme, the sender should choose an appropriate value of (n, k) and send different numbers of symbols through difference paths according to their hop counts and path quality. The select of (n, k) reflect the security requirement of the user and the symbol allocation on path reflects the current condition of the network. Assume that basic security mechanisms such as pairwise key establishment between two neighbouring nodes (Ren et al., 2011) are already in place to provide basic communication security.

Suppose a sensor node U has data D to be sent to destination M. Without loss of generality, to secure D, basic encryption and integrity operation are performed before applying RS coding scheme.

The operational procedures of the proposed scheme given as follows:

U generates ciphertext as S =< {D1 h (D, kr), where h (D, kr) is the keyed hash value and kr is the key shared between M and U. Note that the key kr can be either symmetric or asymmetric depending on the chosen access control mechanism, which is independent to the design here and will not be discussed in this study.
U then constructs m (x) = m0+m1+...+mk-1xk-1, where S : = { m0||m1, …, mk-1}. U further encodes k symbols {m0, m1, …, mk-1} into a codeword with n symbols c= (c0, c1,…, cn-1) using Eq. 1-3.
U generates m node-disjoint paths between U and M; the procedure of establishing such secure paths is out of the scope of this study (Lou and Fang, 2001; Papadimitratos and Haas, 2006; Lou and Kwon, 2006).
U uses source routing to send at most qjn symbols on each path j for 1≤j≤m. If qjn is not an integer, a round off value will be used instead. The original data is then securely erased.
Assume M receives all symbols from the m paths, M uses majority rule to eliminate bad symbols and composes received data polynomial r (x).
M identifies faulty path by evaluating Eq. 4 and 5 and uses Forney’s algorithm (Lin and Costello Jr., 2004) to derive error polynomial e(x) using Eq. 6.
M recovers D by reconstructs {D 1 h (D, kr)} kr from c (x) using Eq. 7 any k out of n symbols is sufficient for derive the original polynomial.
M decrypts {D || h (D, kr)} kr with shared key kr and verified the data D, if it is verified, the transmission of the data has succeeded. Otherwise, if the decode process fails due to more than t errors, an alarm report is supposed to release to the network owner

Note that the proposed scheme does not need know the identification of the compromised paths to decode the data successfully. The RS decoder at the destination node will automatically correct any modification by the compromised nodes in these paths.

Non-uniform allocation: Assume that the sender transmits fj fraction of the total n symbols through path j, where 1≤j≤m and

Due to the lack of the knowledge of which paths may be compromised, the sensor node has the best option of making sure that the expected number of symbols compromised on each path is more or less the same.

Let hj be the hop count of path j, 1≤j≤m and x the probability of nodes being compromised, given that the source and destination are not compromised, the probability that path is compromised:

where 1≤j≤m. The expected number of symbols being compromised for path j is fj pj and the source node needs to make sure that fj pj=C, for all j. That is,

(8)


As mentioned earlier, the probability of path compromise is in proportion to the length of multi-hop path. It only need to derive the relation between fj and h. when x is small, then

Therefore, C becomes

(9)

According to Eq. 8 and 9, then

(10)

Thus, a closed form for fj, 1≤j≤m, which is related to h, is derived.

ANALYSIS AND SIMULATION

Analysis: Under the supposed adversary model, the data compromise probability px, which is define as the probability of compromising enough symbols to the adversary so that it can obtain the data with relative ease when the node compromised probability is x (0≤x≤1).

Let m = s2+s3+...+sL, where s2, s3 , …, sL, represented the source node find s2 paths of length (hops count) 2, s3 paths of length 3, … and sL paths of the maximum length L (note that all these paths are node-disjoint paths). Let mx = n2+n3+...+nL, where mx is the number of paths among m available paths that are compromised by the adversary, which contains n2, n3, ... nL number of paths among s2, s3,... sL that are compromised, respectively. More specifically, assume that nj1, nj2,..., njg, 0≤g≤L-1, are the nonzero term of n2, n3, ... nL. Therefore, they are nj1 paths of length j1 compromised; nj2 paths of length j2 compromised…, njgpaths of length jg compromised.

When the multiple node-disjoint paths are used, the source node transmits n symbols through the m paths with fj fraction for path j, 1≤j≤m, where fj is given by Eq. 10. Define the data compromise probability of the proposed scheme as the probability of at least k symbols being compromised to the adversary. For comparison between the proposed scheme and single path scheme, this study uses to distinguish from single path scheme, which uses . Therefore, the data compromise probability can be calculated as:

Since all found paths are node-disjoint, the total number of nodes between source node and storage node is:

(11)

Based on the independent compromised probability x, the probability that r out of rT nodes are compromised is

(12)

Hence, the overall probability of compromising r nodes is

(13)

Now, the overall probability of compromising ni paths (p2) can be calculated as follows: there are ni paths among si of length i are compromised, according to definition 2, each path is independent of another, with total of mx compromised paths, p2 can directly derive as:

(14)

where 0≤ni≤si for 2≤i≤L.

According to definition 1, a path is compromised due to one or more than one node on the path is compromised, that is, r = mx. Considering all possibilities to select r compromised nodes from nodes on the mx compromised paths. Hence, the probability of at least one node on each compromised path must be compromised is:

(15)

where 1≤yi,l≤ji-1 for 1≤i≤g.

Therefore, the data compromised probability pxour can be calculated by Eq. 12-15.

For fair comparison, the data compromise probability in single path (SP) scheme also calculated. In the SP scheme, the data are transmitted through one randomly chosen path among the m available paths. If it selects a compromised path to transmit, then the whole data is revealed. Hence, when there are mx compromised paths, the data compromised probability is mx / m. Then:

(16)

where, rT is given by Eq. 11 and p3 is given by Eq. 15.

Simulation results: Simulations have been performed in NS-2 to evaluate the efficiency of the proposed scheme under the threat model. Unless specified otherwise, simulations were set up with the following parameters: N = 800 nodes are randomly placed on a square area of 500 m by 500 m. The area is divided into a gird of 25 = 5x5, with each grid cell of size 100mx100m. The radio transceiver range of each sensor node is 40m. The RS code is assumed to be (n, k) = (17, 9).

In order to understand the benefit of using node-disjoint paths serving in defending against of node capture, Fig. 1 investigated the probability of data compromised px as a function of node compromised probability x. It artificially decreased N, with half the nodes (N = 400) and allow the source node to randomly select all available paths during the path selection process for comparison purposes. Assume each sensor node has equally likely to be compromised with probability x, x = 0.01, …, 0.09. Based on Fig. 1, it can be concluded that under the same node density N (N = 400 or N = 800), the probability of data compromised increases with node compromised probability and given the same node compromised probability x, the proposed scheme using enhanced node-disjoint paths outperform randomly selected paths scheme with lower data compromised probability.

Fig. 1: px as a function of x for different node density and routing strategy

Fig. 2: px as a function of x for different data allocation scheme

An example of these results is that when N = 800 and x = 0.07, the corresponding px is 0.39 and 0.1, respectively. It can further conclude that with a larger N, there have a relatively more neighbours, increasing potential more node-disjoint paths. Note that the proposed scheme uses shortest and trust-aware multi-hop paths, when the number of such paths is larger; the proposed scheme can tolerate higher node compromised probability. Due to the selection process of random path, the selected paths may intersect, that is, some nodes appear in more than one path from a source node towards to storage node and thus, the security performance worsens. This result verifies the effectiveness of the proposed idea.

Figure 2 presents the data compromise probability from another angle, where px is a function of node compromise probability x for different data share distribution scheme.

The uniform allocation can be regarded as fj = 1/m for all paths and single path (SP) scheme is to send all shares through one path. Based on Fig. 2, it can be concluded that the non-uniform allocation applied in the proposed scheme outperform uniform scheme and SP scheme in terms of lower probability of data compromised. Such as if x is 0.06, then px for the proposed scheme, uniform scheme and SP scheme is 0.05, 0.25 and 0.6, respectively. The proposed scheme improves 5 times and 12 times over uniform scheme and SP scheme, respectively. It can further conclude that the selection of fj has major effects on security performance. In the uniform scheme, long paths may be assigned with equally size of shares and lead to higher probability of data compromised. Moreover, the results proved again that multipath transmission is preferred over SP scheme when security is a major concern.

Figure 3 presents the probability of data compromised by varying the value of (n, k) and show data compromise probability px for different node compromised probability x. Based on this figure, it can be conclude that px is decreased by increasing both n and k, the network can tolerant faulty paths from t = 1 to 4 given m node-disjoint paths. More importantly, it provides a nice property of flexibility that a predefined threshold of px can be guaranteed by choosing an appropriate (n, k). For example, given a system threshold px = 0.4, with node compromised probability from 0.01 to 0.09, only (17, 9), (13, 7) satisfied the requirement, given px = 0.1, only (17, 9) satisfied the conditions when the node compromised probability lower than 0.05.

Fig. 3: px as a function of x for (17, 9), (13, 7), (9, 5), (5, 3) RS coding schemes.

A comparison is made between the proposed scheme and H-SPREAD (Lou and Kwon, 2006); First, consider the circumstance that there is no data modification happen in the network. Define the robustness as the probability of data not compromised due to r compromised nodes, denoted as R1, obviously, R1 = 1-px. Fig. 4a shows R as a function of r for the proposed scheme and H-SPREAD. Based on this figure, it can be conclude that the proposed scheme outperforms H-SPREAD with better robustness as r increases. In H-SPREAD, the author attempts to find multiple node-disjoint paths for both security and reliability. As a result, the number of node-disjoint paths is small. Besides, each path is sent to equivalent number of symbols leading to the poor performance. An example of these results is that when r is 100, 200, 300, the robustness of H-SPREAD is 0.575, 0.175 and 0.022, respectively. When r up to 350, the robustness of the proposed scheme and H-SPREAD is 055 and 0, respectively, obviously, the proposed scheme significant improves the robustness of the network.

Fig. 4: Comparison (a) robustness and (b) reliability of the proposed scheme with H-SPREAD

Further conclusion can be made that the selection of node-disjoint paths and non-uniform data allocation as well as redundancy has major effects on robustness in the proposed scheme.

Consider another circumstance that the adversary compromises r sensor nodes and they can further modify existing data and/or inject fake data into compromised sensors. Define reliability as the ratio of filtering bogus message, denoted as R2. Figure 4b plots R2 as a function of r for the proposed scheme and H-SPREAD. Based on this figure, it is observed that the reliability of the proposed scheme significantly improved over H-SPREAD. Actually, in H-SPREAD, it cannot address a number of important problems, such as, the authenticity of sensed data, the possibility that adversary modifies in any data found in sensor nodes. Once the sensor node is captured, the cryptographic keys as well as the data were exposed. They can easily insert bogus sensor readings or change the processing results and then use these keys to authenticate forged information. Thus, H-SPREAD fails to filter faked messages. In the proposed scheme, RS coding scheme which can tolerant at most terrors, where t = (n-k)/2. Therefore, it can achieve higher reliability. However, it has to point out that when r exceeded in 250, the reliability of the proposed scheme drops dramatically, after r up to 400, the reliability of the proposed scheme has no benefits over existing schemes. In this case, it can be explained that with the more compromised nodes in the networks, the more faulty paths exists, if the number of faulty path more than t, it cannot use the majority rule to filter out bad parity codes. However, when that happens, they are telltale signs indicate massive nodes invalid and should exclude out of the network.

DISCUSSION

The concept of multi-path routing dates back to 1970s, when it was initially proposed to spread the traffic for the purpose of load balancing and throughput enhancement (Maxemchuk, 1975). Later on, one of its sub-classes, path-disjoint multi-path routing, has attracted a lot of attention in wireless sensor networks due to its robustness in combating security issues. Some examples include the SMR (Lee and Gerla, 2007), DSR (Johnson et al., 1999), and AOMDV (Marina and Das, 2001) and AODMV (Ye et al., 2003).

The second category includes recent work that explicitly considers security metrics in constructing routes. Specifically, the SPREAD algorithm by Lou et al. (2004) attempts to find multiple most secure and node disjoint paths. The security of a path is defined as the likelihood of node compromise along that path and is labelled as the weight in path selection. A modified Dijkstra algorithm is used to iteratively find the top-k most secure node-disjoint paths. The H-SPREAD algorithm (Lou and Kwon, 2006) improves upon SPREAD by simultaneously accounting for both security and reliability requirements.

The work by Yang et al. (2005) considers the report fabrication attacks launched by compromised nodes. The work by Ren et al. (2006) further considers selective forwarding attacks, whereby a compromised node selectively drops packets to jeopardize data availability. Both works are based on a similar cryptographic method: the secret keys used by sensor nodes are specific to their geographic locations, which limits the impact of a compromised node.

Most of above mentioned works relying on a cryptographic method for resolving the node capture attacks. As a result, these approaches are no longer valid if the adversary randomly compromise or jam nodes. This is because once the adversary captures a sensor node, the credential and the encryption algorithm will be disclosed, even they can limit the impact of a compromised node within a local area. Instead of relying on a cryptographic method for resolving the issue, this work mainly exploits the routing functionality of the network to reduce the chance that the adversary can acquire a packet in the first place. Besides, by taking the advantage of the fact that different paths have different probabilities of being compromised or becoming faulty. Therefore, different amounts of symbols are sent through paths of different lengths. By doing so, the adversary has to compromise a k out of n sensors to recover the original data. Besides, by properly choosing the n and k parameters, it can give any sufficiently large majority the authority to take some action while giving any sufficiently large minority the power to block it. The experiment results are well support with the analysis and verify the effectiveness of the proposed scheme.

CONCLUSIONS

This study has presented an efficient in-network sensor data-delivering scheme in distributed wireless sensor networks. As is shown above, the presence of a powerful mobile adversary raises many challenges. The conventional view of security based on cryptography and authentication alone is not sufficient to provide a complete solution for developing secure and dependable sensor data delivery due to the unique characteristics and novel misbehaviours encountered in distributed sensor networks. This study investigates the first attempt to introduce RS code scheme and multipath routing protocol to add an additional support for an enhanced security solution. Analysis and simulation results show that proposed techniques significant improvement the data survival over existing scheme.

ACKNOWLEDGMENTS

This study is partially supported by National Basic Research Program of China (973 Program) under Grant No. 2009CB326202 (2009.4-2011.8, Hunan University) and 2010CB334706 (2010.4-2013.3, Hunan University). Key Program of National Natural Science Foundation of China under Grant No. 60736016 (2008.1-2011.12, Hunan University). National Natural Science Foundation of China under Grant No.60873198 (2009.1-2011.12, Hunan University), 60973128 (2010.1-2012.12, Hunan University), 60973113 (2010.1-2012.12, Hunan University), 61073191 (2011.01-2013.12, Hunan University) and 61070196 (2011.01-2013.12, Hunan University).

REFERENCES

  • Akyildiz, I.F., W. Su, Y. Sankarasubramaniam and E. Cayirci, 2002. Wireless sensor networks: A survey. Comput. Networks, 38: 393-422.
    CrossRef    Direct Link    


  • Meng, L., W. Fu, Z. Xu, J. Zhang and J. Hua, 2008. A novel Ad hoc routing protocol based on mobility prediction. Inform. Technol. J., 7: 537-540.
    CrossRef    Direct Link    


  • Ruan, Z., X. Sun, W. Liang, D. Sun and Z. Xia, 2010. CADS: Co-operative anti-fraud data storage scheme for unattended wireless sensor networks. Inform. Technol. J., 9: 1361-1368.
    CrossRef    Direct Link    


  • Wei, D., H.A. Chan and B. Silombela, 2007. Rectangular grids design to balance power consumption for homogeneous sensor networks with high node density. Inform. Technol. J., 6: 827-834.
    CrossRef    Direct Link    


  • Wang, B., X. Sun, Z. Ruan and H. Ren, 2011. Multi-mark: multiple watermarking method for privacy data protection in wireless sensor networks. Inform. Technol. J., 10: 833-840.
    CrossRef    Direct Link    


  • Shamir, A., 1979. How to share a secret. Commun. ACM, 22: 612-613.
    CrossRef    Direct Link    


  • Lin, S. and D.J. Costello, 2004. Error Control Coding: Fundamentals and Applications. 2nd Edn., Pearson-Prentice Hall, Englewood Cliffs, NJ., ISBN-13: 9780130179739, Pages: 1260


  • Ren, H., X. Sun, Z. Ruan and B. Wang, 2011. An efficient scheme against node capture attacks using secure pairwise key for sensor networks. Inform. Technol. J., 10: 71-79.
    CrossRef    Direct Link    


  • Lou, W. and Y. Fang, 2001. A multipath routing approach for secure data delivery. Proceedings of the Communications for Network-Centric Operations: Creating the Information Force, (MILCOM`01), IEEE., pp: 1467-1473.


  • Papadimitratos, P. and Z.J. Haas, 2006. Secure data transmission in mobile Ad-Hoc networks. IEEE J. Selected Areas Comm., 24: 343-356.
    CrossRef    


  • Lou, W. and Y. Kwon, 2006. H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transact. Vehicular Technol., 55: 1320-1330.
    CrossRef    


  • Maxemchuk, N.F., 1975. Dispersity routing. Proc. IEEE ICC., 41: 10-13.


  • Lee, S.J. and M. Gerla, 2007. Split multipath routing with maximally disjoint paths in ad-hoc networks. Proceedings of the ICC Conference, June 11-14, IEEE., pp: 3201-3205.


  • Johnson, D.B., D.A. Maltz and J. Broch, 1999. DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In: In Ad Hoc Networking, Perkins, C.E. (Ed.). Addison-Wesley, USA., pp: 139-172


  • Marina, M.K. and S.R. Das, 2001. On-demand multi path distance vector routing in ad hoc networks. Proceedings of the 9th International Conference on Network Protocols, November 11-14, 2001, Washington, DC., USA., pp: 14-23.


  • Ye, Z., V. Krishnamurthy and S.K. Tripathi, 2003. A framework for reliable routing in mobile ad hoc networks. Proc. IEEE INFOCOM., 1: 270-280.


  • Lou, W., W. Liu and F. Yuguang, 2004. SPREAD: Enhancing data confidentiality in mobile ad hoc networks. Proceedings of 23rd AnnualJoint Conference of the IEEE Computer and Communications Societies, March 7-11, 2004, Hong Kong, China, pp: 2404-2413.


  • Yang, H., F. Ye, Y. Yuan, S. Lu and W. Arbaugh, 2005. Toward resilient security in wireless sensor networks. Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing, May 25-28, USA., pp: 34-45.


  • Ren, K., W. Lou and Y. Zhang, 2006. LEDS: Providing location-aware end-to-end data security in wireless sensor networks. Proceedings of the IEEE INFOCOM Conference, April 23-29, IEEE., pp: 2584-2595.


  • Goodson, G.R., J.J. Wylie, G.R. Ganger and M.K. Reiter, 2004. Efficient byzantine-tolerant erasure-coded storage. Proceedings of the International Conference on Dependable Systems and Networks, June 28-July 1, 2004, IEEE Computer Society, Washington, DC, USA., pp: 135-144.

  • © Science Alert. All Rights Reserved