Volume 1, Number 1 (Spring-Summer-91 2013)                   SCJ 2013, 1(1): 16-23 | Back to browse issues page

XML Persian Abstract Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Babamir F S, Eslami Z. Optimizing Survival of Trusted Data in Unattended Wireless Sensor Networks . SCJ. 2013; 1 (1) :16-23
URL: http://scj.kashanu.ac.ir/article-1-27-en.html

1- MSC , babamir@gmail.com
Abstract:   (4492 Views)
In wireless sensor networks, the collected data are stored in the network nodes for a long time until the receivers take them. Since some network nodes may become accidentally corrupt or some mobile adversary intrudes to some node, data survival and secure and complete data transmission to some receiver is a concern. Moreover, we should consider communication efficiency and the needed store for the survival. This specific feature distinguishes the unattended wireless sensor networks from others. In 2011, Ren et al. presented a proposal for maximizing survival duration and stability of the collected data by sensor network nodes. In this paper, we first show two main weaknesses of the Ren et al proposal: (1) the propagated data in the network is not authenticated this weakness causes the network becomes more susceptible to attack and (2) data are not identified when they become corrupt during transmission. These weaknesses cause more traffic in the network and result in the network inefficiency. Having shown the weaknesses, we present a method to resolve them using the homomorphic signature.
Full-Text [PDF 325 kb]   (1673 Downloads)    
Type of Study: Research | Subject: Special
Received: 2012/11/22 | Accepted: 2013/08/12 | Published: 2015/09/3

Add your comments about this article : Your username or email:
Write the security code in the box

Send email to the article author

© 2015 All Rights Reserved | Soft Computing Journal

Designed & Developed by : Yektaweb