By Topic

Data protection in multipath WSNs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Monnet, Q. ; Lab. LACL, Univ. Paris-Est, Creteil, France ; Mokdad, L. ; Ben Ithman, J.

Used in areas such as pollution measurement or data gathering over battlefields, wireless sensor networks have attracted more and more attention over the last years. The deployment of such a network is accompanied by several security issues, including data confidentiality. Robust encryption algorithms addressed to network communication exist, but they do not always match the low resources restrictions - low processor, memory, limited energy - set upon the sensors. To overcome this, other, simpler solutions have been proposed, such as the Securing Data based on Multi-Path routing method, or an application of the Shamir's Secret Sharing Scheme, which both use distinct paths in the network to send pieces of data obtained by splitting the original message. This paper addresses the two methods named above, and proposes a solution based on traffic classification, using alternatively the Securing Data based on Multi-Path routing method, the Shamir's Secret Sharing Scheme, and strong encryption algorithms.

Published in:

Computers and Communications (ISCC), 2013 IEEE Symposium on

Date of Conference:

7-10 July 2013