Browse > Article
http://dx.doi.org/10.5392/JKCA.2013.13.01.030

A Risk Factor Detour Multi-Path Routing Scheme in Wireless Multimedia Sensor Networks  

Hwang, Donggyo (충북대학교 정보통신공학부)
Son, In-Goog (충북대학교 정보통신공학부)
Park, Junho (충북대학교 정보통신공학부)
Seong, Dong-Ook (보아스전자(주) 기술연구소)
Yoo, Jaesoo (충북대학교 정보통신공학부)
Publication Information
Abstract
In recent years, with the development of devices to collect multimedia data such as small CMOS camera sensor and micro phone, studies on wireless multimedia sensor network technologies and their applications that extend the existing wireless sensor network technologies have been actively done. In such applications, various basic schemes such as the processing, storage, and transmission of multimedia data are required. Especially, a security for real world environments is essential. In this paper, in order to defend the sniffing attack in various hacking techniques, we propose a multipath routing scheme for physically avoiding the data transmission path from the risk factors. Our proposed scheme establishes the DEFCON of the sensor nodes that are geographically close to risk factors and the priorities according to the importance of the data. Our proposed scheme performs risk factor detour multipath routing through a safe path considering the DEFCON and data priority. Our experimental results show that although our proposed scheme takes the transmission delay time by about 5% over the existing scheme, it reduces the eavesdropping rate that can attack and intercept data by the risk factor by about 18%.
Keywords
Wireless Multimedia Sensor Network; Multi-path; Routing; Risk Factor;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Szewczyk, E. Osterweil, J. Polastre, M. Hamilton, A. Mainwaring, and D. Estrin, "Habitat Monitoring with Sensor Networks," The Journal of Communications of the ACM, Vol.47, No.6, pp.34-40, 2004.
2 C. Jun-Hong, K. Jiejun, M. Gerla and Z. Shengli, "The Challenges of Building Scalable Mobile Underwater Wireless Sensor Networks for Aquatic Applications," The Journal of IEEE Network, Vol.20, No.3, pp.12-18, 2006.
3 C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Proc. of the International Conference on Sensor Network Protocols and Applications, Vol.1, pp.293-315, 2003.
4 R. Lu, X. Lin, H. Zhu, and X. Shen, "TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks," Proc. of the International Conference on Communications, pp.1-6, 2010.
5 S. Lee and M. Gerla, "Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks," Proc. of the IEEE International Conference on Communications, Vol.10, pp.3201-3205, 2001.
6 M. Marina and S. Das, "On-demand Multipath Distance Vector Routing in Ad Hoc Networks," Proc. of the International Conference for Network Protocols, pp.14-23, 2001.
7 B. Karp and H. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Sensor Networks," Proc. of the ACM/IEEE MOBICOM, pp.243-254, 2000.
8 L. Shu, Y. Zhang, L. T. Yang, Y. Wang, M. Hauswirth, and N. Xiong, "TPGF: Geographic Routing in Wireless Multimedia Sensor Networks," The Journal of Telecommunication System, Vol.44, pp.79-95, 201
9 J. H. Lee and I. B. Jung, "Adaptive-Compression Based Congestion Control Technique for Wireless Sensor Networks," The Journal of Sensors, Vol.10, pp.2919-2945, 2010.   DOI   ScienceOn
10 L. Shu, M. Hauswirth, H. C. Chao, M. Chen, and Y. Zhang, "NetTopo: A Framework of Simulation and Visualization for Wireless Sensor Networks," The Journal of Ad Hoc Network, Vol.9, pp.799-820, 2012.