Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1191

Secure Mobile Query in Wireless Sensor Networks  

Lim, Chae Hoon (Department of Computer Engineering, Sejong University)
Abstract
In large-scale distributed sensor networks, it is often recommended to employ mobile sinks, instead of fixed base stations, for data collection to prolong network lifetime and enhance security. Mobile sinks may also be used, e.g., for network repair, identification and isolation of compromised sensor nodes and localized reprogramming, etc. In such circumstances, mobile sinks should be able to securely interact with neighbor sensor nodes while traversing the network. This paper presents a secure and efficient mobile query protocol that can be used for such purposes.
Keywords
Wireless sensor networks; Security; Mobile sink; Query authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J.Buchmann, E.Dahmen, and M.Szydlo, "Hash-based digital signature schemes," Post-quantum Cryptography, pp.35-93, 2009.
2 A.Burns et al., "SHIMMER-A wireless sensor platform for noninvasive biomedical research," IEEE Sensors Journal, vol.10, no.9, pp.1527-1534, 2010.   DOI   ScienceOn
3 M.Di Francesco, S.K.Das, and G.Anastasi, "Data collection in wireless sensor networks with mobile elements: A survey," ACM Trans. on Sensor Networks, vol.8, no.1, pp.1-31, 2011.
4 M. Johnson et al., "A comparative review of wireless sensor network mote technology," Proc of IEEE Sensors 2009, pp.1439-1442, 2009.
5 A.Perrig et al., "SPINS: Security protocols for sensor networks," Wireless networks, vol.8, no.5, pp.512-534, 2002.
6 A.Rasheed and R.Mahapatra "Secure data collection scheme in wireless sensor networks with mobile sink," Proc. IEEE Int. Symp. on Network Computing and Applications, pp.332-340, 2008.
7 A.Rasheed and R.Mahapatra "The three-tier security scheme in wireless sensor networks with mobile sinks," IEEE Trans. on Parallel and Distributed Systems, vol.23, no.5, pp.958-965, 2011.
8 H.Song, S.Zhu, W.Zhang, and G.Cao. "Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks," ACM Trans. on Sensor Networks, vol.4, no.4, pp.1-30, 2008.
9 M.A.Simplicio Jr, P.S.L.M.Barreto, C.B.Margi, and T.C.M.B.Carvalho, "A survey on key management mechanisms for distributed wireless sensor networks," Computer Networks, vol.54, no.15, pp.2591-2612, 2010.   DOI   ScienceOn
10 X.Xiao, V.K.Rayi, B.Sun, X.Du, F.Hu, and M.Galloway, "A survey of key management schemes in wireless sensor networks," Computer Communications, vol.30, pp.2314-2341, 2007.   DOI   ScienceOn
11 L.Zhou, J.Ni, and C.V.Ravishankar, "Supporting secure communication and data collection in mobile sensor networks," Proc. IEEE INFOCOM, pp.1-12, 2006.
12 S.Zhu, S.Setia, and S.Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Trans. on Sensor Networks, vol.2, no.4, pp.500-528, 2006.   DOI
13 A.Rasheed and R.Mahapatra "Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks," IEEE Trans. on Parallel and Distributed Sys., vol.22, no.1, pp.176-184, 2011.   DOI   ScienceOn
14 LAN-MAN Standards Committee of the IEEE Computer Socity, Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate personal area networks (LR-WPAN),