Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks
In wireless sensor networks (WSNs), hierarchical routing protocol is commonly used for energy efficiency. In particular, the TEEN (Threshold sensitive Energy Efficient sensor Network) protocol is used widely as a basic clustered multihop routing protocol. However, energy efficient routing protocols...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2013-06-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2013/391986 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849435059184992256 |
|---|---|
| author | Saewoom Lee Youngtae Noh Kiseon Kim |
| author_facet | Saewoom Lee Youngtae Noh Kiseon Kim |
| author_sort | Saewoom Lee |
| collection | DOAJ |
| description | In wireless sensor networks (WSNs), hierarchical routing protocol is commonly used for energy efficiency. In particular, the TEEN (Threshold sensitive Energy Efficient sensor Network) protocol is used widely as a basic clustered multihop routing protocol. However, energy efficient routing protocols without proper security suffer from many security vulnerabilities. Hence, in this paper, we propose a hybrid key scheme specially for the TEEN protocol: a symmetric key scheme for the intracluster and a public key scheme for the intercluster. The simulation results show that network lifetime of the proposed hybrid key scheme decreases about 8% than the TEEN protocol and about 4% compared with the TEEN protocol with symmetric key scheme. On the other hand, a hybrid key scheme provides better probability of successful transmission than that of the symmetric key scheme. |
| format | Article |
| id | doaj-art-e4203e815a2947f9873ce53bad193b1f |
| institution | Kabale University |
| issn | 1550-1477 |
| language | English |
| publishDate | 2013-06-01 |
| publisher | Wiley |
| record_format | Article |
| series | International Journal of Distributed Sensor Networks |
| spelling | doaj-art-e4203e815a2947f9873ce53bad193b1f2025-08-20T03:26:25ZengWileyInternational Journal of Distributed Sensor Networks1550-14772013-06-01910.1155/2013/391986Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor NetworksSaewoom Lee0Youngtae Noh1Kiseon Kim2 School of Information and Mechatronics, Department of Nanobio Materials and Electronics (DNE) World-Class University (WCU), Gwangju Institute of Science and Technology (GIST), 1 Oryong-dong, Buk-Gu, Gwangju 500-712, Republic of Korea Department of Computer Science, University of California, Los Angeles (UCLA), Los Angeles, CA 90095, USA School of Information and Mechatronics, Department of Nanobio Materials and Electronics (DNE) World-Class University (WCU), Gwangju Institute of Science and Technology (GIST), 1 Oryong-dong, Buk-Gu, Gwangju 500-712, Republic of KoreaIn wireless sensor networks (WSNs), hierarchical routing protocol is commonly used for energy efficiency. In particular, the TEEN (Threshold sensitive Energy Efficient sensor Network) protocol is used widely as a basic clustered multihop routing protocol. However, energy efficient routing protocols without proper security suffer from many security vulnerabilities. Hence, in this paper, we propose a hybrid key scheme specially for the TEEN protocol: a symmetric key scheme for the intracluster and a public key scheme for the intercluster. The simulation results show that network lifetime of the proposed hybrid key scheme decreases about 8% than the TEEN protocol and about 4% compared with the TEEN protocol with symmetric key scheme. On the other hand, a hybrid key scheme provides better probability of successful transmission than that of the symmetric key scheme.https://doi.org/10.1155/2013/391986 |
| spellingShingle | Saewoom Lee Youngtae Noh Kiseon Kim Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks International Journal of Distributed Sensor Networks |
| title | Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks |
| title_full | Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks |
| title_fullStr | Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks |
| title_full_unstemmed | Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks |
| title_short | Key Schemes for Security Enhanced TEEN Routing Protocol in Wireless Sensor Networks |
| title_sort | key schemes for security enhanced teen routing protocol in wireless sensor networks |
| url | https://doi.org/10.1155/2013/391986 |
| work_keys_str_mv | AT saewoomlee keyschemesforsecurityenhancedteenroutingprotocolinwirelesssensornetworks AT youngtaenoh keyschemesforsecurityenhancedteenroutingprotocolinwirelesssensornetworks AT kiseonkim keyschemesforsecurityenhancedteenroutingprotocolinwirelesssensornetworks |