Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2008.15-C.5.329

Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network  

Kim, Eun-Kyung (이화여자대학교 컴퓨터정보통신학과)
Seo, Jae-Won (이화여자대학교 컴퓨터정보통신학과)
Chae, Ki-Joon (이화여자대학교 컴퓨터정보통신학과)
Choi, Doo-Ho (한국전자통신연구원 RFID/USN보안안연구팀)
Oh, Kyung-Hee (한국전자통신연구원 RFID/USN보안안연구팀)
Abstract
The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.
Keywords
Sensor Network; Network Architecture; Energy-efficiency; Key establishment mechanism;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 ITU-T Recommendation Y.1541, "Network performance objectives for IP-based services," February, 2006
2 박승철, "광대역 접속망에서 SIP QoS 지원방안," 정보과학회논문지, 정보통신 제34권 제 1호, 2007년 2월   과학기술학회마을
3 ETSI TISPAN NGN Document, ETSI TS 183 017: "Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control: DIAMETER protocol for session based policy set up information exchange between the Application Function (AF) and the Service Policy Decision Function (SPDF);Protocol specification", in WG 3
4 김신효, 강유성, 정병호, 정교일, “u-센서 네트워크 보안 기술 동향”, 전자통신동향분석, 제20권 제1호, pp. 93-99, 2005. 2   과학기술학회마을   DOI   ScienceOn
5 3GPP TS 29.208 V6.7.0 (Release 6), "End-to-end Quality of Service (QoS) signaling flow," June 2007
6 JDiameter, "https://jdiameter.dev.java.net"
7 이동규, 송성한, 김양중, 정일영, "NGN 기반의 엑세스 망에서 자원제어 시스템 구현," 대한전자공학회 하계종합학술대회 논문집 I, 제30권 제1호, pp.167-168, 2007년 7월
8 ITU-T Draft Document, "Draft Recommendation Y.RACF (Y.2111) Release2 (Version 0.4.0)," Beijing, 10-21 September 2007
9 TaeMan Han, TaeHyun Kwon, YoungWook Cha, SangHa Kim, "Management Information Model And High-Speed Resource Control Mechanism For Next Generation Network," CSN, 2007
10 ITU-T Draft Document,"Draft Recommendation Y.2012 (formally Y.NGN-FRA)[Draft Version0.8]," Geneva, 17-28 July 2006
11 Amit Manjhi, Suman Nath, Phillip B. Gibbons, “Tributaries and Deltas : efficient and robust aggregation in sensor network streams”, SIGMOD 2005, pp.287-298, Jun. 2005   DOI
12 Fei hu, Jason Tillett, Jim Ziobro, neeraj K. Sharma, “An Energy-efficient Approach to Securing Tree-zone-based Sensor Networks,” GLOBECOM 2003, vol 3, pp.1430-1434, Dec. 2003   DOI
13 J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag, 2000
14 R. Blom “An optimal class of symmetric key generation systems. Advances in Cryptology,” Proc. of EUROCRYPT 84, LNCS 209, pp.335–338, Apr. 1985
15 Seema Bandyopadhyay, Edward J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks”, INFOCOM 2003, Vol.3, pp.1713-1723, Mar. 2003
16 Stefan Schmidt, Holger Krahn, Stefan Fischer, and Dietmar W¨atjen, “A Security Architecture for Mobile Wireless Sensor Networks,” European Workshop on Security in Ad-Hoc and Sensor Networks 2004, Aug. 2004
17 W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A pairwise key pre-distribution scheme for wireless sensor networks,” Conference on Computer and Communications Security 2003, pp.42-51, Oct. 2003   DOI
18 L. Eschenauer and V. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Conference on Computer and Communications Security 2002, pp.41-47, 2002   DOI
19 Mahdi Lotfinezhad, Ben Liang, “Energy efficient clustering in sensor networks with mobile agents”, Wireless Communications and Networking Conference 2005, Vol.3, pp.1872-1877, Mar. 2005   DOI
20 J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag, 2000
21 Jamil Ibriq, imad Mahgoub, “Cluster-based routing in wireless sensor networks : issues and challenges”, SPECTS 2004, pp.759-766, Jul. 2004
22 Ruay-shiung Chang, Chia-jou Kuoan, “An Energy efficient routing mechanism for wireless sensor networks”, International conference on Advanced Information Networking and Applications(AINA) 2006, Vol.2 pp.308-312, Apr. 2006