Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Industrial Wireless Sensor Network-Oriented Energy-Efficient Secure AODV Protocol

  • Conference paper
  • First Online:
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2016)

Abstract

As a traditional routing protocol, the Ad hoc On-demand Distance Vector routing (AODV) protocol has been applied in many Industrial fields. Meanwhile, researches on AODV have very in-depth, whether in improving performance, or enhancing security. Unfortunately, there are few researches on joint energy efficiency and security. In this article, we propose an Energy-efficient Secure AODV Protocol (E-SAODV) in Industrial Wireless Sensor Network (IWSN). In E-SAODV, the low complexity verification and the Delayed Transmitting Mechanism (DTM) is proposed and applied. The mechanism involve two parts: the polynomial of the Cyclic Redundancy Check 4 (CRC-4) that substitutes the shortest key of RSA digital signature in SAODV guarantees the integrity of data verification, and reduces storage space, computation and energy consumption. DTM is implemented to separate the check code and valid data, and to achieves tamper-proof. The simulation results show that comprehensive performance of proposed E-SAODV is a trade-off the energy efficiency and security, and better than AODV and SAODV, and could meet the requirement of the throughput in the industrial scene.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhu, C., Yang, L.T., Shu, L., Leung, V.C.M., Hara, T., Nishio, S.: Insights of top-k query in duty-cycled wireless sensor networks. IEEE Trans. Ind. Electron. 2, 1317–1328 (2015)

    Article  Google Scholar 

  2. Zhu, C., Leung, V.C.M., Hu, X., Shu, L., Yang, L.T.: A review of key issues that concern the feasibility of mobile cloud computing. In: The IEEE International Conference on Cyber, Physical and Social Computing (CPSCom), pp. 769–776. IEEE Press, New York (2013)

    Google Scholar 

  3. Wang, K., Shao, Y., Shu, L., Zhang, Y., Zhu, C.: Mobile big data fault-tolerant processing for eHealth networks. IEEE Netw. 1, 36–42 (2016)

    Article  Google Scholar 

  4. Shu, L., Wang, L., Niu, J., Zhu, C., Mukherjee, M.: Releasing network isolation problem in group-based industrial wireless sensor networks. IEEE Syst. J. 10, 1–11 (2015)

    Article  Google Scholar 

  5. Luis, P., Francisco, A., Lorenzo, F., Oscar, R.: Performance of global-appearance descriptors in map building and localization using omni-directional vision. Sens. (Basel) 2, 3033–3064 (2014)

    Google Scholar 

  6. Liu, T., Gao, X., Wang, L.: Study on multi-objective optimization of oil production process. In: The 11th World Congress on Intelligent Control and Automation, pp. 1824–1829 (2014)

    Google Scholar 

  7. Moyne, J., Yedatore, M., Iskandar, J., Hawkins, P., Scoville, J.: Chamber matching across multiple dimensions utilizing predictive maintenance, equipment health monitoring, virtual metrology and run-to-run control. In: The 25th Annual SEMI on Advanced Semiconductor Manufacturing Conference, pp. 86–91 (2014)

    Google Scholar 

  8. Dujovne, D., Watteyne, T., Vilajosana, X., Thubert, P.: 6TiSCH: deterministic IP-enabled industrial internet (of things). IEEE Commun. Mag. 12, 36–41 (2014)

    Article  Google Scholar 

  9. Gandhewar, N., Patel, R.: Detection and prevention of sinkhole attack on AODV protocol in mobile ad hoc network. In: The Fourth International Conference on Computational Intelligence and Communication Networks, pp. 714–718 (2012)

    Google Scholar 

  10. Tomar, S.P.S., Chaurasia, B.K.: Detection and isolation of sinkhole attack from AODV routing protocol in MANET. In: The International Conference on the Computational Intelligence and Communication Networks, pp. 799–802 (2014)

    Google Scholar 

  11. Xiong, K., Yin, M., Li, W., Jiang, H.: A rank sequence method for detecting black hole attack in ad hoc network. In: The International Conference on Intelligent Computing and Wireless Sensor Network, pp. 155–159 (2015)

    Google Scholar 

  12. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: The Second Workshop on Mobile Computing Systems and Applications, pp. 90–100. IEEE Press, New York (1999)

    Google Scholar 

  13. Jain, P., Suryavanshi, A.: Energy efficient local route repair multicast AODV routing schemes in wireless ad hoc network. In: The International Conference on Advanced Communication Control and Computing Technologies, pp. 1168–1173 (2014)

    Google Scholar 

  14. Joshi, A., Kaur, R.: A novel multi-cast routing protocol for VANET. In: The IEEE International Advance Computing Conference, pp. 41–45. IEEE Press, New York (2015)

    Google Scholar 

  15. Fang, W., Shi, Z., Shan, L., Li, F., Xiong, Y.: A multi-parameter joint evaluation scheme in energy consumption for wireless sensor networks. Chin. High Technol. Lett. 8–9, 753–759 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fang, W., Zhang, C., He, W., Chen, W., Ma, F. (2017). Industrial Wireless Sensor Network-Oriented Energy-Efficient Secure AODV Protocol. In: Lee, JH., Pack, S. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 199. Springer, Cham. https://doi.org/10.1007/978-3-319-60717-7_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60717-7_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60716-0

  • Online ISBN: 978-3-319-60717-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics