2012
DOI: 10.1109/tvt.2012.2205284
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Energy-Efficient Disjoint Multipath Routing for WSNs

Abstract: Abstract-Recent advances in micro-electro-mechanical systems (MEMS) technology have boosted the deployment of wireless sensor networks (WSNs). Limited by energy storage capability of sensor nodes, it is crucial to jointly consider security and energy efficiency in data collection of WSNs. Disjoint multi-path routing scheme with secret sharing is widely recognized as one of the effective routing strategies to ensure the safety of information. This kind of scheme transforms each packet into several shares to enh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
99
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 120 publications
(100 citation statements)
references
References 28 publications
0
99
0
Order By: Relevance
“…This approach increased security compared to H-SPREAD with the help of random dispersion. Network lifetime and security were jointly considered in [10] with a combination of randomized and deterministic multipath routing; however, the approach was very specific to one particular type of deployment strategy, i.e. nodes (circular) and the BS (center of the network area) deployment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach increased security compared to H-SPREAD with the help of random dispersion. Network lifetime and security were jointly considered in [10] with a combination of randomized and deterministic multipath routing; however, the approach was very specific to one particular type of deployment strategy, i.e. nodes (circular) and the BS (center of the network area) deployment.…”
Section: Related Workmentioning
confidence: 99%
“…With advances in technology, today's sensor nodes can gather and process more data, leading to the creation of new applications in recent years. To achieve cost effectiveness, sensor nodes are not typically equipped with tamper-proof facilities [1][2][3][4][5][6][7][8][9][10][11][12][13]. Due to their hostile and unattended environment, there is a very high chance of nodes being compromised in a WSN.…”
Section: Introductionmentioning
confidence: 99%
“…The idea is either sending multiple copies of the same data through different paths to destination (Karlof and Wagner, 2003;Bhuse et al, 2005;Kefayati et al, 2006;Mavropodi et al, 2007;Pavithra and Reddy, 2015) or splitting the data into N shares and sending the N shares through different paths to destination (Shu et al, 2010;Liu et al, 2012;Li et al, 2014). Destination needs to collect and merge at least M out of N shares to make meaningful data.…”
Section: Related Workmentioning
confidence: 99%
“…Paper [2] by Anfeng et al proposed a technique to formulate the secret-sharing-based multipath routing problem as an optimization problem. The objective is to maximizing both network security and lifetime subject to the energy constraints [4][5] [6][7] [8].…”
Section: Related Workmentioning
confidence: 99%