Abstract
Sensor nodes easily suffer from failure, attack or capture because of the limited energy, storage, communication ability, complex and severe network environment when WSN is applied to emergency or battlefield environment. Thus, the basic scout mission is influenced. In this paper, a survivability route protocol named SRPC in cluster-based WSN is put forward. The protocol uses key negotiation and identity authentication mechanism to resist the attacks of malicious nodes; when the main cluster head is destroyed, monitoring data will be transmitted to the base station by the backup cluster head chain. The simulation results show that, SRPC protocol can not only resist the attacks of the enemy malicious nodes based on energy balance, but also assure reliable delivery of the packets after the cluster head is attacked or destroyed. As a result, the survivable ability of WSN in battlefield is improved.
Publisher
Trans Tech Publications, Ltd.
Reference7 articles.
1. Yi Xu. The principle and method of wireless sensor network [M]. Beijng: Tsinghua University press, (2012).
2. LU Gang, ZHOU Ming-Tian, SHE Kun, et al. Life time Analys is on Routing Protocols of Wireless Sensor Networks[J]. Journal of Software, 2009,20(2):375-393.
3. J Sterbenz, R Krishnan, R Hain, etal. Survivable mobile wireless networks: issues, challenges and research directions [A]. ACM Workshop on Wireless Security [C], Atlanta, USA, Sep, 2002: 31-40.
4. Kui Ren, Kai Zeng, Wenjing Lou. On efficient key pre-distribution in large scale WSNs[C]. Military Communications Conference, 2005. MILCOM 2005. IEEE 2005:20-26.
5. Yanchun Yang, Kefei Chen. Secure LEACH routing protocol for wireless sensor networks based on one-way hash chain[J]. Computer Engineering and Design, 2009, 30(20): 4620-4623.