Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. / Zang, Yihong; Thomas, Johnson P.; Ghinea, Gheorghita; Thomas, Mathews; Darwish, Salaheddin.

Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012. p. 777-784 6296048.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. / Zang, Yihong; Thomas, Johnson P.; Ghinea, Gheorghita; Thomas, Mathews; Darwish, Salaheddin.

Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012. p. 777-784 6296048.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Zang, Y, Thomas, JP, Ghinea, G, Thomas, M & Darwish, S 2012, Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012., 6296048, pp. 777-784, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United Kingdom, 25/06/12. https://doi.org/10.1109/TrustCom.2012.254

APA

Zang, Y., Thomas, J. P., Ghinea, G., Thomas, M., & Darwish, S. (2012). Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 (pp. 777-784). [6296048] https://doi.org/10.1109/TrustCom.2012.254

Vancouver

Zang Y, Thomas JP, Ghinea G, Thomas M, Darwish S. Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. In Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012. p. 777-784. 6296048 https://doi.org/10.1109/TrustCom.2012.254

Author

Zang, Yihong ; Thomas, Johnson P. ; Ghinea, Gheorghita ; Thomas, Mathews ; Darwish, Salaheddin. / Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs. Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. 2012. pp. 777-784

BibTeX

@inproceedings{d8b1bb24261343b3b7351bde5e66f239,
title = "Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs",
abstract = "Security and efficient routing are two important parameters in sensor networks. In this paper we propose SSBCR (Secured Sector Based Bi-path Clustering and Routing) protocol that takes both these two issues into consideration. It uses a bi-path routing algorithm to decrease the computational overhead as well as energy dissipation in the nodes. A key pre-distribution scheme is proposed such that nodes in the route share keys while those that are not in the route do not share keys with nodes that are in the route. Simulations have been done for both small and large areas, low and high density, on-route and non-route connectivity scenarios. Simulation results show that the proposed protocol not only provides security but also maximizes sensor network lifetime and achieves a high probability of connectivity, particularly when the network is large.",
keywords = "routing, security, Sensor Networks",
author = "Yihong Zang and Thomas, {Johnson P.} and Gheorghita Ghinea and Mathews Thomas and Salaheddin Darwish",
year = "2012",
month = sep,
day = "6",
doi = "10.1109/TrustCom.2012.254",
language = "English",
isbn = "978-1-4673-2172-3",
pages = "777--784",
booktitle = "Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012",
note = "11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 ; Conference date: 25-06-2012 Through 27-06-2012",

}

RIS

TY - GEN

T1 - Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs

AU - Zang, Yihong

AU - Thomas, Johnson P.

AU - Ghinea, Gheorghita

AU - Thomas, Mathews

AU - Darwish, Salaheddin

PY - 2012/9/6

Y1 - 2012/9/6

N2 - Security and efficient routing are two important parameters in sensor networks. In this paper we propose SSBCR (Secured Sector Based Bi-path Clustering and Routing) protocol that takes both these two issues into consideration. It uses a bi-path routing algorithm to decrease the computational overhead as well as energy dissipation in the nodes. A key pre-distribution scheme is proposed such that nodes in the route share keys while those that are not in the route do not share keys with nodes that are in the route. Simulations have been done for both small and large areas, low and high density, on-route and non-route connectivity scenarios. Simulation results show that the proposed protocol not only provides security but also maximizes sensor network lifetime and achieves a high probability of connectivity, particularly when the network is large.

AB - Security and efficient routing are two important parameters in sensor networks. In this paper we propose SSBCR (Secured Sector Based Bi-path Clustering and Routing) protocol that takes both these two issues into consideration. It uses a bi-path routing algorithm to decrease the computational overhead as well as energy dissipation in the nodes. A key pre-distribution scheme is proposed such that nodes in the route share keys while those that are not in the route do not share keys with nodes that are in the route. Simulations have been done for both small and large areas, low and high density, on-route and non-route connectivity scenarios. Simulation results show that the proposed protocol not only provides security but also maximizes sensor network lifetime and achieves a high probability of connectivity, particularly when the network is large.

KW - routing

KW - security

KW - Sensor Networks

UR - http://www.scopus.com/inward/record.url?scp=84868089886&partnerID=8YFLogxK

U2 - 10.1109/TrustCom.2012.254

DO - 10.1109/TrustCom.2012.254

M3 - Conference contribution

AN - SCOPUS:84868089886

SN - 978-1-4673-2172-3

SP - 777

EP - 784

BT - Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

T2 - 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012

Y2 - 25 June 2012 through 27 June 2012

ER -