Research Article
BibTex RIS Cite

Düşük Enerjili Orta ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü

Year 2016, Volume: 9 Issue: 1, 37 - 50, 07.06.2017

Abstract

Kablosuz Algılayıcı Ağlar,
çok sayıda düşük güçlü sensör düğümünden oluşan ve değişkenlik gösterebilen
ağlardır. Bu makalede, yeni anahtar yönetim metodu ile çeşitli saldırılara
karşı iki güvenli yönlendirme protokolü önerilmektedir. Bu protokoller iki
farklı ortamları için önerilmektedir. Birinci protokol küçük/orta ölçekli
ağlara, ikinci protokol ise, büyük ölçekli ortamlar için tasarlanmaktadır. Her
iki protokol, ağ oluşum fazı, güvenlik ve anahtarlama fazı ve veri transferi
fazı olarak üç fazdan oluşmaktadır. Birinci ve üçüncü fazları aynı olan
protokoller, sadece ikinci fazda farklılıklar göstermektedir. Bu iki fazda
önerilen yeni sanal katmanı kullanarak ağ oluşturulmuş olacak ve veri transferi
verimli olarak yapılacaktır. Birinci protokolde ‘çoklu simetrik anahtar’
tekniğinin geliştirilmesiyle sistemin yükü azaltılarak enerji tüketiminin verimli
hale getirilmesi Wormhole, Sybil, Hello flood, DOS gibi yönlendirme
saldırılarına karşı başarılı olmaktadır. İkinci protokolde ise, yalnızca küme
başları/aktif düğümler ve anahtar sunucuları tarafından kullanılarak enerji
tüketiminin verimli hale getirilmesi ve DoS, trafik analizi ve fiziksel
saldırıları engellemiş olmaktadır.
Geliştirilen
protokoller, literatürdeki birkaç yöntemle karşılaştırıldığında performansta
başarılı olduğu görülmektedir.

References

  • [1] Kiani, F., Amiri, E., Zamani, M., Khodadadi T., AbdulManaf, A. Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, 2015(1), pp.1-14, 2015.
  • [2] Akyildiz, I. F., Sankarasubramaniam Y., Cayirci, E. Wireless Sensor Networks: A Survey, Journal of Computer Networks, 38(4), pp.393-422, 2003.
  • [3] Kiani, F. Designing New Routing Algorithms Optimized for Wireless Sensor Network, LAP LAMBERT Academic Publishing, Dusseldorf, Germany, 2014.
  • [4] Alrajeh, N.A., Khan, S., Shams, B. Intrusion Detection Systems in Wireless Sensor Networks: A Review, International Journal of Distributed Sensor Networks, 2013(1), pp.1-7, 2013.
  • [5] Ahmed, M., Hung, X., Sharma, D. A Taxonomy of Internal Attacks in Wireless Sensor Network, World Academy of Science, Engineering and Technology International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 6(2), pp.203-206, 2012.
  • [6] Mansour, I., Ghalhoub, G., Lafourcade, P. Key Management in Wireless Sensor Networks, J. Sens. Actuator Netw., 4, pp.251-273, 2015.
  • [7] Si, L., Ji, Z., Wang, Z. RETRACTED: The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks, International Conference on Solid State Devices and Materials Science (Elsevier), 25, pp.552-559, 2012.
  • [8] Macedonio, D., Merro, M. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks, Sci. Computer Program, 1, 81, pp.53-78, 2014.
  • [9] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., Culler, D. SPINS: Security Protocols for Sensor Networks, Wireless Networks, 8(5), pp.521-534, 2002.
  • [10] Karlof, C., Sastry, N., Wagner, D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, International Conference on Embedded Networked Sensor Systems (SenSys), ACM, 1, pp.162-175, 2004.
  • [11] Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE InfoCom, 1, pp.13-28, 2004.
  • [12] Anjum, F. Location Dependent Key Management Using Random Key-Pre distribution in Sensor Networks, Proceedings of the 5th ACM workshop on Wireless security (WiSe 06), 5, pp.21-30, 2006.
  • [13] Chan, H., Perrig, A, Song, D. Random Key Pre-Distribution Schemes for Sensor Networks, IEEE Symposium on Research in Security and Privacy, 3, pp.197-213, 2003.
  • [14] Huang, J.M., Yang, S., Dai, Ch. An Efficient Key Management Scheme for Data-Centric Storage Wireless Sensor Networks, International Conference on Electronic Engineering and Computer Science, 4, pp.25-31, 2013.
  • [15] Du, X., Xiao, Y., Guizani, M., Chen, H.H. An Effective Key Management Scheme for Heterogeneous Sensor Networks, Elsevier Ad Hoc Network, 5(1), pp.24-34, 2007.
  • [16] Ning, P., Li, R., Liu, D. Establishing Pairwise Keys in Distributed Sensor Networks, ACM Transaction Information System Security, 8(1), pp.41-77, 2005.
  • [17] Zhu, S., Setia, S. Jajodia, S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Conference on Computer and Communications Security, 10, pp.62-72, 2003.
  • [18] Zhu, S., Setia, S. Jajodia, S. LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Journal ACM Transactions on Sensor Networks (TOSN), 2(4), pp.500-528, 2006.
  • [19] Wang, N., Fang, S. A Hierarchical Key Management Scheme for Secure Group Communications in Mobile Ad Hoc Networks, Journal of System Software, 80(10), pp.1667-1677, 2007.
  • [20] Ramox, A., Filho, R.H. Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks, Sensors, 15(1), pp.2104-2136, 2015.
  • [21] Jemai, A. Mastouri, A. Eleuch, H. Study of Key Pre-Distribution Schemes in Wireless Sensor Networks: Case of BROSK (use of WSNet), International Journal Applied Mathematics & Information Sciences, 5(3), pp.655-667, 2011.
  • [22] Younis, M.F., Ghumman, K., Eltoweissy, M. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks, IEEE Transaction Parallel Distributed Systems, 17(8), pp.865-882, 2006.
  • [23] Qiu, Y., Zhou, J. Y., Baek, J. Authentication and Key Establishment in Dynamic Wireless Sensor Networks, Sensors, 10(4), pp.3718-3731, 2010.
  • [24] Kiani, F., Dalkilic, G. Password Renewal Enhancement for Dynamic Authentication in Wireless Sensor Networks, IEEE Conference on Computational Intelligence, Communication Systems, and Networks, 2, pp.143-146, 2010.
  • [25] Kanavalli, A. SABR: Secure Authentication-Based Routing in Large Scale Wireless Sensor Network, Emerging Research in Computing, Information, Communication and Applications, 223-229, 2015.
  • [26] Kiani, F. A Novel Channel Allocation Method for Time Synchronization in Wireless Sensor Networks, International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, 2016, pp.1-11, 2016.
  • [27] Wang, Y., Attebury, G., Ramamurthy, B. A survey of Security Issues in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, 8(2), pp.2-23, 2006.
  • [28] OMNeT++website. http://whale.hit.bme.hu/omnetpp/
  • [29] www.memsic.com/userfiles/files/.../6020-0062-06_A_WSN_Professional_Series.pdf
  • [30] Sahingoz, K. Large Scale Wireless Sensor Networks with Multi-Level Dynamic Key Management Scheme, Journal of Systems Architecture, 59, pp.801–807, 2013.
Year 2016, Volume: 9 Issue: 1, 37 - 50, 07.06.2017

Abstract

References

  • [1] Kiani, F., Amiri, E., Zamani, M., Khodadadi T., AbdulManaf, A. Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, 2015(1), pp.1-14, 2015.
  • [2] Akyildiz, I. F., Sankarasubramaniam Y., Cayirci, E. Wireless Sensor Networks: A Survey, Journal of Computer Networks, 38(4), pp.393-422, 2003.
  • [3] Kiani, F. Designing New Routing Algorithms Optimized for Wireless Sensor Network, LAP LAMBERT Academic Publishing, Dusseldorf, Germany, 2014.
  • [4] Alrajeh, N.A., Khan, S., Shams, B. Intrusion Detection Systems in Wireless Sensor Networks: A Review, International Journal of Distributed Sensor Networks, 2013(1), pp.1-7, 2013.
  • [5] Ahmed, M., Hung, X., Sharma, D. A Taxonomy of Internal Attacks in Wireless Sensor Network, World Academy of Science, Engineering and Technology International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 6(2), pp.203-206, 2012.
  • [6] Mansour, I., Ghalhoub, G., Lafourcade, P. Key Management in Wireless Sensor Networks, J. Sens. Actuator Netw., 4, pp.251-273, 2015.
  • [7] Si, L., Ji, Z., Wang, Z. RETRACTED: The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks, International Conference on Solid State Devices and Materials Science (Elsevier), 25, pp.552-559, 2012.
  • [8] Macedonio, D., Merro, M. A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks, Sci. Computer Program, 1, 81, pp.53-78, 2014.
  • [9] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., Culler, D. SPINS: Security Protocols for Sensor Networks, Wireless Networks, 8(5), pp.521-534, 2002.
  • [10] Karlof, C., Sastry, N., Wagner, D. TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, International Conference on Embedded Networked Sensor Systems (SenSys), ACM, 1, pp.162-175, 2004.
  • [11] Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE InfoCom, 1, pp.13-28, 2004.
  • [12] Anjum, F. Location Dependent Key Management Using Random Key-Pre distribution in Sensor Networks, Proceedings of the 5th ACM workshop on Wireless security (WiSe 06), 5, pp.21-30, 2006.
  • [13] Chan, H., Perrig, A, Song, D. Random Key Pre-Distribution Schemes for Sensor Networks, IEEE Symposium on Research in Security and Privacy, 3, pp.197-213, 2003.
  • [14] Huang, J.M., Yang, S., Dai, Ch. An Efficient Key Management Scheme for Data-Centric Storage Wireless Sensor Networks, International Conference on Electronic Engineering and Computer Science, 4, pp.25-31, 2013.
  • [15] Du, X., Xiao, Y., Guizani, M., Chen, H.H. An Effective Key Management Scheme for Heterogeneous Sensor Networks, Elsevier Ad Hoc Network, 5(1), pp.24-34, 2007.
  • [16] Ning, P., Li, R., Liu, D. Establishing Pairwise Keys in Distributed Sensor Networks, ACM Transaction Information System Security, 8(1), pp.41-77, 2005.
  • [17] Zhu, S., Setia, S. Jajodia, S. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Conference on Computer and Communications Security, 10, pp.62-72, 2003.
  • [18] Zhu, S., Setia, S. Jajodia, S. LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Journal ACM Transactions on Sensor Networks (TOSN), 2(4), pp.500-528, 2006.
  • [19] Wang, N., Fang, S. A Hierarchical Key Management Scheme for Secure Group Communications in Mobile Ad Hoc Networks, Journal of System Software, 80(10), pp.1667-1677, 2007.
  • [20] Ramox, A., Filho, R.H. Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks, Sensors, 15(1), pp.2104-2136, 2015.
  • [21] Jemai, A. Mastouri, A. Eleuch, H. Study of Key Pre-Distribution Schemes in Wireless Sensor Networks: Case of BROSK (use of WSNet), International Journal Applied Mathematics & Information Sciences, 5(3), pp.655-667, 2011.
  • [22] Younis, M.F., Ghumman, K., Eltoweissy, M. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks, IEEE Transaction Parallel Distributed Systems, 17(8), pp.865-882, 2006.
  • [23] Qiu, Y., Zhou, J. Y., Baek, J. Authentication and Key Establishment in Dynamic Wireless Sensor Networks, Sensors, 10(4), pp.3718-3731, 2010.
  • [24] Kiani, F., Dalkilic, G. Password Renewal Enhancement for Dynamic Authentication in Wireless Sensor Networks, IEEE Conference on Computational Intelligence, Communication Systems, and Networks, 2, pp.143-146, 2010.
  • [25] Kanavalli, A. SABR: Secure Authentication-Based Routing in Large Scale Wireless Sensor Network, Emerging Research in Computing, Information, Communication and Applications, 223-229, 2015.
  • [26] Kiani, F. A Novel Channel Allocation Method for Time Synchronization in Wireless Sensor Networks, International Journal of Numerical Modelling: Electronic Networks, Devices and Fields, 2016, pp.1-11, 2016.
  • [27] Wang, Y., Attebury, G., Ramamurthy, B. A survey of Security Issues in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, 8(2), pp.2-23, 2006.
  • [28] OMNeT++website. http://whale.hit.bme.hu/omnetpp/
  • [29] www.memsic.com/userfiles/files/.../6020-0062-06_A_WSN_Professional_Series.pdf
  • [30] Sahingoz, K. Large Scale Wireless Sensor Networks with Multi-Level Dynamic Key Management Scheme, Journal of Systems Architecture, 59, pp.801–807, 2013.
There are 30 citations in total.

Details

Journal Section Makaleler(Araştırma)
Authors

Farzad Kiani

Publication Date June 7, 2017
Published in Issue Year 2016 Volume: 9 Issue: 1

Cite

APA Kiani, F. (2017). Düşük Enerjili Orta ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, 9(1), 37-50.
AMA Kiani F. Düşük Enerjili Orta ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü. TBV-BBMD. June 2017;9(1):37-50.
Chicago Kiani, Farzad. “Düşük Enerjili Orta Ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi 9, no. 1 (June 2017): 37-50.
EndNote Kiani F (June 1, 2017) Düşük Enerjili Orta ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 9 1 37–50.
IEEE F. Kiani, “Düşük Enerjili Orta ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü”, TBV-BBMD, vol. 9, no. 1, pp. 37–50, 2017.
ISNAD Kiani, Farzad. “Düşük Enerjili Orta Ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 9/1 (June 2017), 37-50.
JAMA Kiani F. Düşük Enerjili Orta ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü. TBV-BBMD. 2017;9:37–50.
MLA Kiani, Farzad. “Düşük Enerjili Orta Ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, vol. 9, no. 1, 2017, pp. 37-50.
Vancouver Kiani F. Düşük Enerjili Orta ve Büyük Ölçekli Kablosuz Algılayıcı Ağlar için Güvenli Yönlendirme Protokolü. TBV-BBMD. 2017;9(1):37-50.

Article Acceptance

Use user registration/login to upload articles online.

The acceptance process of the articles sent to the journal consists of the following stages:

1. Each submitted article is sent to at least two referees at the first stage.

2. Referee appointments are made by the journal editors. There are approximately 200 referees in the referee pool of the journal and these referees are classified according to their areas of interest. Each referee is sent an article on the subject he is interested in. The selection of the arbitrator is done in a way that does not cause any conflict of interest.

3. In the articles sent to the referees, the names of the authors are closed.

4. Referees are explained how to evaluate an article and are asked to fill in the evaluation form shown below.

5. The articles in which two referees give positive opinion are subjected to similarity review by the editors. The similarity in the articles is expected to be less than 25%.

6. A paper that has passed all stages is reviewed by the editor in terms of language and presentation, and necessary corrections and improvements are made. If necessary, the authors are notified of the situation.

0

.   This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.