- -

Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author Alrajeh, Nabil Ali es_ES
dc.contributor.author Khan, Shafiullah es_ES
dc.contributor.author Lloret, Jaime es_ES
dc.contributor.author Loo, Jonathan es_ES
dc.date.accessioned 2014-10-20T14:00:46Z
dc.date.available 2014-10-20T14:00:46Z
dc.date.issued 2013
dc.identifier.issn 1550-1329
dc.identifier.uri http://hdl.handle.net/10251/43415
dc.description.abstract Energy efficiency is the main concern of research community while designing routing protocols for wireless sensor networks (WSNs). is concern can be addressed by using energy-harvesting scheme in routing protocols. In this paper, we propose a secure routing protocol that is based on cross layer design and energy-harvesting mechanism. It uses a distributed cluster-based security mechanism. In the cross-layer design, parameters are exchanged between different layers to ensure efficient use of energy. Energy-harvesting system is used to extract and store energy, which is used to take decisions for the node state and thus for the routing issues. Simulation results show that our routing protocol can perform better in many scenarios and in hostile attack-prone environment. es_ES
dc.description.sponsorship The authors extend their appreciation to the Research Centre, College of Applied Medical Sciences, and the Deanship of Scientific Research at King Saud University for funding this research. en_EN
dc.language Inglés es_ES
dc.publisher Hindawi Publishing Corporation es_ES
dc.relation.ispartof International Journal of Distributed Sensor Networks es_ES
dc.rights Reconocimiento (by) es_ES
dc.subject.classification INGENIERIA TELEMATICA es_ES
dc.title Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1155/2013/374796
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions es_ES
dc.contributor.affiliation Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres es_ES
dc.description.bibliographicCitation Alrajeh, NA.; Khan, S.; Lloret, J.; Loo, J. (2013). Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2013:1-11. doi:10.1155/2013/374796 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion http://dx.doi.org/10.1155/2013/374796 es_ES
dc.description.upvformatpinicio 1 es_ES
dc.description.upvformatpfin 11 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 2013 es_ES
dc.relation.senia 265808
dc.contributor.funder King Saud University, Arabia Saudí es_ES
dc.description.references Gilbert, J. M., & Balouchi, F. (2008). Comparison of energy harvesting systems for wireless sensor networks. International Journal of Automation and Computing, 5(4), 334-347. doi:10.1007/s11633-008-0334-2 es_ES
dc.description.references Sendra, S., Lloret, J., Garcia, M., & Toledo, J. F. (2011). Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper). Journal of Communications, 6(6). doi:10.4304/jcm.6.6.439-459 es_ES
dc.description.references Mohsin, A. H., Abu Bakar, K., Adekiigbe, A., & Ghafoor, K. Z. (2012). A Survey of Energy-aware Routing protocols in Mobile Ad-hoc Networks: Trends and Challenges. Network Protocols and Algorithms, 4(2). doi:10.5296/npa.v4i2.1154 es_ES
dc.description.references Shakkottai, S., Rappaport, T. S., & Karlsson, P. C. (2003). Cross-layer design for wireless networks. IEEE Communications Magazine, 41(10), 74-80. doi:10.1109/mcom.2003.1235598 es_ES
dc.description.references Srivastava, V., & Motani, M. (2005). Cross-layer design: a survey and the road ahead. IEEE Communications Magazine, 43(12), 112-119. doi:10.1109/mcom.2005.1561928 es_ES
dc.description.references Khan, S., Loo, K.-K., Mast, N., & Naeem, T. (2009). SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks. Journal of Network and Systems Management, 18(2), 190-209. doi:10.1007/s10922-009-9143-3 es_ES
dc.description.references Khan, S., & Loo, J. (2010). Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks. Wireless Personal Communications, 62(1), 201-214. doi:10.1007/s11277-010-0048-y es_ES
dc.description.references Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad Hoc Networks, 3(3), 325-349. doi:10.1016/j.adhoc.2003.09.010 es_ES
dc.description.references Ye, R., & Zhao, H. (2012). An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps. International Journal of Computer Network and Information Security, 4(7), 41-50. doi:10.5815/ijcnis.2012.07.05 es_ES
dc.description.references Abuhaiba, I. S. I., & Hubboub, H. B. (2012). Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks. International Journal of Computer Network and Information Security, 4(12), 18-30. doi:10.5815/ijcnis.2012.12.02 es_ES
dc.description.references Kellner, A., Alfandi, O., & Hogrefe, D. (2012). A Survey on Measures for Secure Routing in Wireless Sensor Networks. International Journal of Sensor Networks and Data Communications, 1, 1-17. doi:10.4303/ijsndc/235548 es_ES
dc.description.references Md Abdul Azeem, Rahman khan, K. ur, & Pramod. (2011). Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey. International Journal of Computer Science & Engineering Survey, 2(4), 189-204. doi:10.5121/ijcses.2011.2414 es_ES
dc.description.references Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315. doi:10.1016/s1570-8705(03)00008-8 es_ES
dc.description.references Kur B.Secure routing protocols for wireless sensor networks [M.S. thesis]2008Brno, Czech RepublicMasaryk University Faculty of Informatics es_ES
dc.description.references P, S., D, S., & P, D. (2010). Secured Greedy Perimeter Stateless Routing For Wireless Sensor Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing, 1(2), 9-20. doi:10.5121/ijasuc.2010.1202 es_ES
dc.description.references Liu, M., Cao, J., Chen, G., & Wang, X. (2009). An Energy-Aware Routing Protocol in Wireless Sensor Networks. Sensors, 9(1), 445-462. doi:10.3390/s90100445 es_ES
dc.description.references Younus, M., Minhas, A. A., Javed, M. Y., & Naseer, A. (2009). EEAR: Efficient Energy Aware Routing in wireless sensor networks. 2009 7th International Conference on ICT and Knowledge Engineering. doi:10.1109/ictke.2009.5397333 es_ES
dc.description.references Noh, D., Yoon, I., & Shin, H. (2008). Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs. Journal of Networks, 3(1). doi:10.4304/jnw.3.1.78-85 es_ES
dc.description.references Jumira, O., Wolhuter, R., & Zeadally, S. (2012). Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks. Concurrency and Computation: Practice and Experience, 25(1), 58-84. doi:10.1002/cpe.2838 es_ES
dc.description.references Doost, R., Chowdhury, K. R., & Di Felice, M. (2010). Routing and Link Layer Protocol Design for Sensor Networks with Wireless Energy Transfer. 2010 IEEE Global Telecommunications Conference GLOBECOM 2010. doi:10.1109/glocom.2010.5683334 es_ES
dc.description.references Dai, G., Qiu, J., Liu, P., Lin, B., & Zhang, S. (2012). Remaining Energy-Level-Based Transmission Power Control for Energy-Harvesting WSNs. International Journal of Distributed Sensor Networks, 8(5), 934240. doi:10.1155/2012/934240 es_ES
dc.description.references Eu, Z. A., Tan, H.-P., & Seah, W. K. G. (2010). Opportunistic routing in wireless sensor networks powered by ambient energy harvesting. Computer Networks, 54(17), 2943-2966. doi:10.1016/j.comnet.2010.05.012 es_ES
dc.description.references Förster, A., Förster, A., & Murphy, A. L. (2010). Optimal Cluster Sizes for Wireless Sensor Networks: An Experimental Analysis. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 49-63. doi:10.1007/978-3-642-11723-7_4 es_ES
dc.description.references Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14-15), 2826-2841. doi:10.1016/j.comcom.2007.05.024 es_ES
dc.description.references Sravanthi Chalasani, & Conrad, J. M. (2008). A survey of energy harvesting sources for embedded systems. IEEE SoutheastCon 2008. doi:10.1109/secon.2008.4494336 es_ES
dc.description.references Park, G., Rosing, T., Todd, M. D., Farrar, C. R., & Hodgkiss, W. (2008). Energy Harvesting for Structural Health Monitoring Sensor Networks. Journal of Infrastructure Systems, 14(1), 64-79. doi:10.1061/(asce)1076-0342(2008)14:1(64) es_ES
dc.description.references Mateu, L., & Moll, F. (2005). <title>Review of energy harvesting techniques and applications for microelectronics (Keynote Address)</title>. VLSI Circuits and Systems II. doi:10.1117/12.613046 es_ES
dc.description.references Moser C.Power management in energy harvesting embedded systems. Doctor of Sciences dissertation [Ph.D. thesis]2009Zurich, SwitzerlandSwiss Federal Institute of Technology Zurich es_ES
dc.description.references Whalley, D. (2007). Guest Editorial. ACM Transactions on Embedded Computing Systems, 6(1), 1. doi:10.1145/1210268.1216577 es_ES
dc.description.references Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (s. f.). Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. doi:10.1109/hicss.2000.926982 es_ES
dc.description.references Ba, M., Niang, I., Gueye, B., & Noel, T. (2010). A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks. 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. doi:10.1109/euc.2010.70 es_ES


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem