By Topic

An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jiliang Zhou ; College of Information Science and Technology, Donghua University, Songjiang, Shanghai City, China ; Caixia Li ; Qiying Cao ; Yu Shen

To solve radically the contradiction between the severely limited resource and security for the application in privacy-vital environment in wireless sensor networks (WSNs), we propose a new routing protocol called ITSRP: an Intrusion-tolerant secure routing protocol. We securely and efficiently reconstruct the routing packet in which we design some fields to emphasize the security accounting to the key exchange, but the design doesn't result in the complexity of the protocol. In comparison with other previous secure routing protocols, ITSRP integrates the authenticated key exchange and energy factor into the secure routing algorithm and tolerates damage caused by salient intruders who has compromised deployed sensor nodes and is intent on injecting, modifying or blocking packets. The security mechanism incorporated defends against wormhole attacks, sinkhole attacks and sybil attacks etc. Simulation results and comparisons with existing protocols prove the advantages and the effectiveness of ITSRP.

Published in:

Information and Automation, 2008. ICIA 2008. International Conference on

Date of Conference:

20-23 June 2008