DOI QR코드

DOI QR Code

Confidential Convergecast Based on Random Linear Network Coding for the Multi-hop Wireless Sensor Network

  • 투고 : 2024.01.09
  • 심사 : 2024.02.03
  • 발행 : 2024.04.30

초록

The multi-hop wireless sensor network (WSN) suffers from energy limitation and eavesdropping attacks. We propose a simple and energy-efficient convergecast mechanism using inter-flow random linear network coding that can provide confidentiality to the multi-hop WSN. Our scheme consists of two steps, constructing a logical tree of sensor nodes rooted at the sink node, with using the Bloom filter, and transmitting sensory data encoded by sensor nodes along the logical tree upward to the sink where the encoded data are decoded according to our proposed multi-hop network coding (MHNC) mechanism. We conducted simulations using OMNET++ CASTALIA-3.3 framework and validated that MHNC outperforms the conventional mechanism in terms of packet delivery ratio, data delivery time and energy efficiency.

키워드

과제정보

This work was supported by 2020 Research Fund of the University of Seoul.

참고문헌

  1. L. Cheng, L. Kong, Y. Gu, J. Niu, T. Zhu, C. Liu, S. Mumtaz, and T. He, "Collision-free dynamic convergecast in low-duty-cycle wireless sensor networks," IEEE Transactions on Wireless Communications, vol. 21, no. 3, pp. 1665-1680, 2022. http://dio.org/10.1109/TWC.2021.3105983
  2. X. Zhou, X. Yang, J. Ma, I. Kevin, and K. I. K. Wang, "Energy-efficient smart routing based on link correlation mining for wireless edge computing in IoT," IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14988-14997, 2022. https://doi.org/10.1109/jiot.2021.3077937
  3. M. Kumar and S. Z. Hussain, "Simulation model for wireless body area network using Castalia," in Proceedings of 2022 1st International Conference on Informatics (ICI), Noida, India, 2022, pp. 204-207. http://dio.org/10.1109/ICI53355.2022.9786924
  4. A. Akbar, M. B. Malik, J. Qureshi, and M. Awais, "MAC aware random network coding for wireless unicast flows," in Proceedings of 2020 14th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 2020, pp. 1-6. https://doi.org/10.1109/icosst51357.2020.9332803
  5. M. A. Brahimi, F. Merazka, and G. K. Kurt, "Secure network coding for data encoded using subspace codes," Physical Communication, vol. 48, article no. 101408, 2021. https://doi.org/10.1016/j.phycom.2021.101408
  6. O. A. Khashan, R. Ahmad, and N. M. Khafajah, "An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks," Ad Hoc Networks, vol. 115, article no. 102448, 2021. https://doi.org/10.1016/j.adhoc.2021.102448
  7. P. Prakasam, M. Madheswaran, K. P. Sujith, and M. S. Sayeed, "An enhanced energy efficient lightweight cryptography method for various IoT devices," ICT Express, vol. 7, no. 4, pp. 487-492, 2021. https://doi.org/10.1016/j.icte.2021.03.007
  8. C. Marcolla, V. Sucasas, M. Manzano, R. Bassoli, F. H. Fitzek, and N. Aaraj, "Survey on fully homomorphic encryption, theory, and applications," Proceedings of the IEEE, vol. 110, no. 10, pp. 1572-1609, 2022. https://doi.org/10.1109/jproc.2022.3205665
  9. R. S. Cotrim, J. M. L. P. Caldeira, V. N. Soares, and Y. Azzoug, "Power saving MAC protocols in wireless sensor networks: a survey," TELKOMNIKA (Telecommunication Computing Electronics and Control), vol. 19, no. 6, pp. 1778-1786, 2021. http://doi.org/10.12928/telkomnika.v19i6.19148
  10. L. Alkama and L. Bouallouche-Medjkoune, "IEEE 802.15.4 historical revolution versions: a survey," Computing, vol. 103, pp. 99-131, 2021. https://doi.org/10.1007/s00607-020-00844-3