Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance
Wireless sensor networks (WSNs) integrate sensor technology, communication technology and information processing technology; it is a synthetic discipline. WSNs have been applied into almost all walks of life. However, in many special fields, network security is a basic and important factor which we...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2013-11-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2013/352062 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832555326622138368 |
---|---|
author | Shukui Zhang Hongyan Zuo Jianxi Fan Juncheng Jia |
author_facet | Shukui Zhang Hongyan Zuo Jianxi Fan Juncheng Jia |
author_sort | Shukui Zhang |
collection | DOAJ |
description | Wireless sensor networks (WSNs) integrate sensor technology, communication technology and information processing technology; it is a synthetic discipline. WSNs have been applied into almost all walks of life. However, in many special fields, network security is a basic and important factor which we must concern for. This paper introduces the key management scheme after analyzing the security threats of LEACH protocol. At the same time, we adopt several related mechanisms to protect the communication among the sensor nodes and the confidentiality of the data transmission. Also, we use the mixed multipath mechanism among the clusters to improve the security of the network and strengthen the intrusion tolerance. |
format | Article |
id | doaj-art-0299189546c946a8864b166e57fc7903 |
institution | Kabale University |
issn | 1550-1477 |
language | English |
publishDate | 2013-11-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj-art-0299189546c946a8864b166e57fc79032025-02-03T05:48:31ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-11-01910.1155/2013/352062352062Resilient Multipath Routing Mechanism Based on Clustering with Intrusion ToleranceShukui Zhang0Hongyan Zuo1Jianxi Fan2Juncheng Jia3 State Key Laboratory for Novel Software Technology, Nanjing University, Nanjin 210093, China School of of Computer Science and Technology, Soochow University, Suzhou 215006, China School of of Computer Science and Technology, Soochow University, Suzhou 215006, China School of of Computer Science and Technology, Soochow University, Suzhou 215006, ChinaWireless sensor networks (WSNs) integrate sensor technology, communication technology and information processing technology; it is a synthetic discipline. WSNs have been applied into almost all walks of life. However, in many special fields, network security is a basic and important factor which we must concern for. This paper introduces the key management scheme after analyzing the security threats of LEACH protocol. At the same time, we adopt several related mechanisms to protect the communication among the sensor nodes and the confidentiality of the data transmission. Also, we use the mixed multipath mechanism among the clusters to improve the security of the network and strengthen the intrusion tolerance.https://doi.org/10.1155/2013/352062 |
spellingShingle | Shukui Zhang Hongyan Zuo Jianxi Fan Juncheng Jia Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance International Journal of Distributed Sensor Networks |
title | Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance |
title_full | Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance |
title_fullStr | Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance |
title_full_unstemmed | Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance |
title_short | Resilient Multipath Routing Mechanism Based on Clustering with Intrusion Tolerance |
title_sort | resilient multipath routing mechanism based on clustering with intrusion tolerance |
url | https://doi.org/10.1155/2013/352062 |
work_keys_str_mv | AT shukuizhang resilientmultipathroutingmechanismbasedonclusteringwithintrusiontolerance AT hongyanzuo resilientmultipathroutingmechanismbasedonclusteringwithintrusiontolerance AT jianxifan resilientmultipathroutingmechanismbasedonclusteringwithintrusiontolerance AT junchengjia resilientmultipathroutingmechanismbasedonclusteringwithintrusiontolerance |