Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.3.459

Study of Operating μTESLA in Multi-hop Unattended WSN  

Choi, JinChun (INHA University)
Kang, Jeonil (INHA University)
Nyang, DaeHun (INHA University)
Lee, KyungHee (The University of Suwon)
Abstract
${\mu}TESLA$ is well known as the most representative energy-efficient broadcast authentication method. Until now, there are many researches that figure out the problems or limitation of ${\mu}TESLA$ and mitigate or solve them, but most researches have been verified in the environment far from the real world. We consider the necessity of verifying what the real efficiency of ${\mu}TESLA$ is. In this paper, we assume that sensors that continuously repeat hibernation and activity perform communication under the UWSN(Unattended WSN), which BS does not stay in the network. In this environment, we newly inspect the performance of ${\mu}TESLA$ by performing various simulations.
Keywords
Unattended Wireless Sensor Network; broadcast message authentication; ${\mu}TESLA$; NS-2;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., & Sichitiu, M. "Analyzing and Modeling Encryption Overhead for Sensor Network Nodes," WSNA '03: Proc. 2nd ACM Int'l. Conf. Wireless Sensor Networks and Applications, New York: ACM Press, pp. 151-159. Sep. 2003.
2 Bojkovic, Zoran S., Bojan M. Bakmaz, and Miodrag R. Bakmaz. "Security issues in wireless sensor networks." International Journal of Communications 2.1 pp. 106-115. 2008.
3 A. Perrig, R. Canetti, J.D. Tygar and D. Song, "The TESLA broadcast authentication protocol," Proceedings of RSA CryptoBytes'02, 2002.
4 Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D. "SPINS: Security protocols for sensor networks." Proceedings of the 7th annual international conference on Mobile computing and networking. ACM, 2001.
5 Di Pietro, R., Mancini, L. V., Soriente, C., Spognardi, A., and Tsudik, G, "Data security in unattended wireless sensor networks." Computers, IEEE Transactions on 58.11 pp. 1500-1511. 2009.   DOI   ScienceOn
6 S. Roychowdhury and C. Patra, "Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing," Special Issue of IJCCT Vol.1 Issue 2, 3, 4; 2010 for International Conference [ACCTA-2010], pp. 3-5, Aug. 2010.
7 B. Karp and H.T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," MobiCOM 00, pp. 243-254, Aug. 2000.
8 Di Pietro, R., Mancini, L. V., Soriente, C., Spognardi, A., and Tsudik, G, "Catch me (if you can): Data survival in unattended sensor networks." Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on. IEEE, pp. 185-194, Mar. 2008.
9 Crossbow, MICAz Data Sheet, 6020-0060-04 Rev A, http://www.openautomation.net/uploadsproductos/micaz_datasheet.pdf
10 Atmel AVR., ATmega128L Data Sheet, Rev. 2467O-AVR-10/06, http://www.atmel.com/Images/doc2467.pdf
11 Texas Instruments, CC2420 Data Sheet, SWRS041c, http://www.ti.com/lit/ds/symlink/cc2420.pdf
12 Kramer, Marc, and Alexander Geraldy. "Energy measurements for micaz node." 5. GI/ITG KuVS Fachgesprach ,Drahtlose Sensornetze 2006.
13 Fan, Zhang, and Li Wenfeng. "Energy efficiency testbed for wireless sensor networks." Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on. IEEE, pp. 3807-3812, Oct. 2010.