Mostrar el registro sencillo del ítem
dc.contributor.author | Alrajeh, Nabil Ali![]() |
es_ES |
dc.contributor.author | Khan, Shafiullah![]() |
es_ES |
dc.contributor.author | Lloret, Jaime![]() |
es_ES |
dc.contributor.author | Loo, Jonathan![]() |
es_ES |
dc.date.accessioned | 2014-10-20T14:00:46Z | |
dc.date.available | 2014-10-20T14:00:46Z | |
dc.date.issued | 2013 | |
dc.identifier.issn | 1550-1329 | |
dc.identifier.uri | http://hdl.handle.net/10251/43415 | |
dc.description.abstract | Energy efficiency is the main concern of research community while designing routing protocols for wireless sensor networks (WSNs). is concern can be addressed by using energy-harvesting scheme in routing protocols. In this paper, we propose a secure routing protocol that is based on cross layer design and energy-harvesting mechanism. It uses a distributed cluster-based security mechanism. In the cross-layer design, parameters are exchanged between different layers to ensure efficient use of energy. Energy-harvesting system is used to extract and store energy, which is used to take decisions for the node state and thus for the routing issues. Simulation results show that our routing protocol can perform better in many scenarios and in hostile attack-prone environment. | es_ES |
dc.description.sponsorship | The authors extend their appreciation to the Research Centre, College of Applied Medical Sciences, and the Deanship of Scientific Research at King Saud University for funding this research. | en_EN |
dc.language | Inglés | es_ES |
dc.publisher | Hindawi Publishing Corporation | es_ES |
dc.relation.ispartof | International Journal of Distributed Sensor Networks | es_ES |
dc.rights | Reconocimiento (by) | es_ES |
dc.subject.classification | INGENIERIA TELEMATICA | es_ES |
dc.title | Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1155/2013/374796 | |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres | es_ES |
dc.description.bibliographicCitation | Alrajeh, NA.; Khan, S.; Lloret, J.; Loo, J. (2013). Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2013:1-11. doi:10.1155/2013/374796 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | http://dx.doi.org/10.1155/2013/374796 | es_ES |
dc.description.upvformatpinicio | 1 | es_ES |
dc.description.upvformatpfin | 11 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 2013 | es_ES |
dc.relation.senia | 265808 | |
dc.contributor.funder | King Saud University, Arabia Saudí | es_ES |
dc.description.references | Gilbert, J. M., & Balouchi, F. (2008). Comparison of energy harvesting systems for wireless sensor networks. International Journal of Automation and Computing, 5(4), 334-347. doi:10.1007/s11633-008-0334-2 | es_ES |
dc.description.references | Sendra, S., Lloret, J., Garcia, M., & Toledo, J. F. (2011). Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper). Journal of Communications, 6(6). doi:10.4304/jcm.6.6.439-459 | es_ES |
dc.description.references | Mohsin, A. H., Abu Bakar, K., Adekiigbe, A., & Ghafoor, K. Z. (2012). A Survey of Energy-aware Routing protocols in Mobile Ad-hoc Networks: Trends and Challenges. Network Protocols and Algorithms, 4(2). doi:10.5296/npa.v4i2.1154 | es_ES |
dc.description.references | Shakkottai, S., Rappaport, T. S., & Karlsson, P. C. (2003). Cross-layer design for wireless networks. IEEE Communications Magazine, 41(10), 74-80. doi:10.1109/mcom.2003.1235598 | es_ES |
dc.description.references | Srivastava, V., & Motani, M. (2005). Cross-layer design: a survey and the road ahead. IEEE Communications Magazine, 43(12), 112-119. doi:10.1109/mcom.2005.1561928 | es_ES |
dc.description.references | Khan, S., Loo, K.-K., Mast, N., & Naeem, T. (2009). SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks. Journal of Network and Systems Management, 18(2), 190-209. doi:10.1007/s10922-009-9143-3 | es_ES |
dc.description.references | Khan, S., & Loo, J. (2010). Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks. Wireless Personal Communications, 62(1), 201-214. doi:10.1007/s11277-010-0048-y | es_ES |
dc.description.references | Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325-349. doi:10.1016/j.adhoc.2003.09.010 | es_ES |
dc.description.references | Ye, R., & Zhao, H. (2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. International Journal of Computer Network and Information Security, 4(7), 41-50. doi:10.5815/ijcnis.2012.07.05 | es_ES |
dc.description.references | Abuhaiba, I. S. I., & Hubboub, H. B. (2012). Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks. International Journal of Computer Network and Information Security, 4(12), 18-30. doi:10.5815/ijcnis.2012.12.02 | es_ES |
dc.description.references | Kellner, A., Alfandi, O., & Hogrefe, D. (2012). A Survey on Measures for Secure Routing in Wireless Sensor Networks. International Journal of Sensor Networks and Data Communications, 1, 1-17. doi:10.4303/ijsndc/235548 | es_ES |
dc.description.references | Md Abdul Azeem, Rahman khan, K. ur, & Pramod. (2011). Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey. International Journal of Computer Science & Engineering Survey, 2(4), 189-204. doi:10.5121/ijcses.2011.2414 | es_ES |
dc.description.references | Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315. doi:10.1016/s1570-8705(03)00008-8 | es_ES |
dc.description.references | Kur B.Secure routing protocols for wireless sensor networks [M.S. thesis]2008Brno, Czech RepublicMasaryk University Faculty of Informatics | es_ES |
dc.description.references | P, S., D, S., & P, D. (2010). Secured Greedy Perimeter Stateless Routing For Wireless Sensor Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(2), 9-20. doi:10.5121/ijasuc.2010.1202 | es_ES |
dc.description.references | Liu, M., Cao, J., Chen, G., & Wang, X. (2009). An Energy-Aware Routing Protocol in Wireless Sensor Networks. Sensors, 9(1), 445-462. doi:10.3390/s90100445 | es_ES |
dc.description.references | Younus, M., Minhas, A. A., Javed, M. Y., & Naseer, A. (2009). EEAR: Efficient Energy Aware Routing in wireless sensor networks. 2009 7th International Conference on ICT and Knowledge Engineering. doi:10.1109/ictke.2009.5397333 | es_ES |
dc.description.references | Noh, D., Yoon, I., & Shin, H. (2008). Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs. Journal of Networks, 3(1). doi:10.4304/jnw.3.1.78-85 | es_ES |
dc.description.references | Jumira, O., Wolhuter, R., & Zeadally, S. (2012). Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks. Concurrency and Computation: Practice and Experience, 25(1), 58-84. doi:10.1002/cpe.2838 | es_ES |
dc.description.references | Doost, R., Chowdhury, K. R., & Di Felice, M. (2010). Routing and Link Layer Protocol Design for Sensor Networks with Wireless Energy Transfer. 2010 IEEE Global Telecommunications Conference GLOBECOM 2010. doi:10.1109/glocom.2010.5683334 | es_ES |
dc.description.references | Dai, G., Qiu, J., Liu, P., Lin, B., & Zhang, S. (2012). Remaining Energy-Level-Based Transmission Power Control for Energy-Harvesting WSNs. International Journal of Distributed Sensor Networks, 8(5), 934240. doi:10.1155/2012/934240 | es_ES |
dc.description.references | Eu, Z. A., Tan, H.-P., & Seah, W. K. G. (2010). Opportunistic routing in wireless sensor networks powered by ambient energy harvesting. Computer Networks, 54(17), 2943-2966. doi:10.1016/j.comnet.2010.05.012 | es_ES |
dc.description.references | Förster, A., Förster, A., & Murphy, A. L. (2010). Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 49-63. doi:10.1007/978-3-642-11723-7_4 | es_ES |
dc.description.references | Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14-15), 2826-2841. doi:10.1016/j.comcom.2007.05.024 | es_ES |
dc.description.references | Sravanthi Chalasani, & Conrad, J. M. (2008). A survey of energy harvesting sources for embedded systems. IEEE SoutheastCon 2008. doi:10.1109/secon.2008.4494336 | es_ES |
dc.description.references | Park, G., Rosing, T., Todd, M. D., Farrar, C. R., & Hodgkiss, W. (2008). Energy Harvesting for Structural Health Monitoring Sensor Networks. Journal of Infrastructure Systems, 14(1), 64-79. doi:10.1061/(asce)1076-0342(2008)14:1(64) | es_ES |
dc.description.references | Mateu, L., & Moll, F. (2005). <title>Review of energy harvesting techniques and applications for microelectronics (Keynote Address)</title>. VLSI Circuits and Systems II. doi:10.1117/12.613046 | es_ES |
dc.description.references | Moser C.Power management in energy harvesting embedded systems. Doctor of Sciences dissertation [Ph.D. thesis]2009Zurich, SwitzerlandSwiss Federal Institute of Technology Zurich | es_ES |
dc.description.references | Whalley, D. (2007). Guest Editorial. ACM Transactions on Embedded Computing Systems, 6(1), 1. doi:10.1145/1210268.1216577 | es_ES |
dc.description.references | Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (s. f.). Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. doi:10.1109/hicss.2000.926982 | es_ES |
dc.description.references | Ba, M., Niang, I., Gueye, B., & Noel, T. (2010). A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks. 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. doi:10.1109/euc.2010.70 | es_ES |