By Topic

A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
El-Semary, A.M. ; Coll. of Comput. Sci. & Eng., Taibah Univ., Al-Madina Al-Munawara, Saudi Arabia ; Azim, M.M.A.

Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as sinkhole and select forwarding. Therefore, developing secure and energy-efficient routing protocols to protect WSNs against these attacks while efficiently utilize the energy of the deployed nodes has become imperative. Several routing protocols have been proposed in the literature. However, most of these protocols forward packets based on information collected from neighbor nodes. This allows a malicious sensor node to deceive its neighbor to forward their packets through it. This makes the network's nodes vulnerable to various types of attacks such as sinkhole, spoofing, and select forwarding attacks. Therefore, this paper proposes a two-tier energy-efficient secure routing protocol for WSNs in which each sensor node forwards its packets based on its own information. Thus it cannot be deceived by any other sensor node. Simulation results indicate clearly that, the performance of the proposed protocol outperforms that of both the Path Energy Weight and the minimum hop protocols under several attacks such as sinkhole and spoofing or Sybil attacks. In addition, the proposed protocol exhibits a grateful performance under attack-free conditions and evenly distributes the network loads among the deployed nodes to prolong the network life time.

Published in:

Information Assurance and Security (IAS), 2011 7th International Conference on

Date of Conference:

5-8 Dec. 2011