Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance
Author(s) -
Shukui Zhang,
Hongyan Zuo -,
Jianxi Fan,
Juncheng Jia
Publication year - 2013
Publication title -
international journal of distributed sensor networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.324
H-Index - 53
eISSN - 1550-1477
pISSN - 1550-1329
DOI - 10.1155/2013/352062
Subject(s) - computer science , wireless sensor network , computer network , cluster analysis , confidentiality , intrusion detection system , multipath routing , intrusion tolerance , routing (electronic design automation) , computer security , key (lock) , multipath propagation , transmission (telecommunications) , data transmission , routing protocol , distributed computing , wireless routing protocol , telecommunications , channel (broadcasting) , machine learning
Wireless sensor networks (WSNs) integrate sensor technology, communication technology and information processing technology; it is a synthetic discipline. WSNs have been applied into almost all walks of life. However, in many special fields, network security is a basic and important factor which we must concern for. This paper introduces the key management scheme after analyzing the security threats of LEACH protocol. At the same time, we adopt several related mechanisms to protect the communication among the sensor nodes and the confidentiality of the data transmission. Also, we use the mixed multipath mechanism among the clusters to improve the security of the network and strengthen the intrusion tolerance. © 2013 Shukui Zhang et al.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom