Share This Article:

MRBCH: A Multi-Path Routing Protocol Based on Credible Cluster Heads for Wireless Sensor Networks

Abstract Full-Text HTML Download Download as PDF (Size:612KB) PP. 689-696
DOI: 10.4236/ijcns.2010.38092    3,963 Downloads   7,874 Views   Citations

ABSTRACT

Wireless sensor networks are widely used for its flexibility, but they also suffer from problems like limited capacity, large node number and vulnerability to security threats. In this paper, we propose a multi-path routing protocol based on the credible cluster heads. The protocol chooses nodes with more energy remained as cluster heads at the cluster head choosing phase, and then authenticates them by the neighbor cluster heads. Using trust mechanisms it creates the credit value, and based on the credit value the multi-path cluster head routing can finally be found. The credit value is created and exchanged among the cluster heads only. Theoretical analysis combined with simulation results demonstrate that this protocol can save the resource, prolong the lifetime, and ensure the security and performance of the network.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Y. Yang, E. Bai, J. Hu and W. Wu, "MRBCH: A Multi-Path Routing Protocol Based on Credible Cluster Heads for Wireless Sensor Networks," International Journal of Communications, Network and System Sciences, Vol. 3 No. 8, 2010, pp. 689-696. doi: 10.4236/ijcns.2010.38092.

References

[1] K. Romer and F. Mattern, “The Design Space of Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 11, No. 6, 2004, pp. 54-61.
[2] C. F. Garcia-Hernandez, P. H. Ibarguengoytia-Gonzalez, J. Garcia-Hernandez and J. A. Perez-Diaz, “Wireless Sensor Networks and Application: A Survey,” International Journal of Computer Science and Network Security, Vol. 7, No. 3, 2007, pp. 264-273.
[3] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of IEEE International Workshop on Sensor Network Protocols and Applications, Alaska, 11-13 May 2003, pp. 113-127.
[4] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, “Energy Efficient Communication Protocol for Wireless Sensor Networks,” Proceedings of the Hawaii International Conference on System Sciences, Maui, 4-7 January 2000, pp. 3005-3014.
[5] N. Nasser and Y. F. Chen, “Secure and Energy-Efficient Multi-Path Routing Protocol for Wireless Sensor Networks,” Computer Communications, Vol. 30, No. 11-12, 2007, pp. 2401-2412.
[6] I. Khalil, S. Bagchi, C. N. Rotaru and N. B. Shroff, “UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multi-Hop Wireless Sensor Networks,” Ad Hoc Networks, Vol. 8, No. 1, 2010, pp. 148-164.
[7] S.-B. Lee and Y.-H. Choi, “A Secure Alternate Path Routing in Sensor Networks,” Computer Communications, Vol. 30, No. 1, 2006, pp. 153-165.
[8] S. Madria and J. Yin, “SeRWA: A Secure Routing Protocol against Wormhole Attacks in Sensor Networks,” Ad Hoc Networks, Vol. 7, No. 6, 2009, pp. 1051-1063.
[9] R. Mavropodi and P. Kotzanikolaou, “SecMR: A Secure Multi-Path Routing Protocol for Ad Hoc Networks,” Ad Hoc Networks, Vol. 5, No. 1, 2007, pp. 87-99.
[10] S. Song, K. Hwang, R. Zhou and Y. K. Kwok, “Trusted P2P Transactions with Fuzzy Reputation Aggregation,” IEEE Internet Computing, Vol. 9, No. 6, 2005, pp. 24-34.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.