Title: LKSR: link strength keymatch secure routing in heterogeneous wireless sensor networks

Authors: K. Shaila; G.H. Vineet; C.R. Prashanth; V. Tejaswi; K.R. Venugopal; L.M. Patnaik

Addresses: Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore 560 001, India ' Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore 560 001, India ' Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore 560 001, India ' Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bangalore 560 001, India ' University Visvesvaraya College of Engineering, Bangalore University, Bangalore 560 001, India ' Centre for Electronics Design and Technology (CEDT), Indian Institute of Science, Bangalore, India

Abstract: We consider the problem of multi-hop communication among the nodes of a heterogeneous wireless sensor networks using an unbalanced key distribution to ensure enhanced security. The concept of link strength is introduced, which determines the path to be selected for secure routing. The paths are classified into less secure, moderately secure and highly secure based on the values of link strength. Higher value of link strength ensures enhanced stability against node compromise and masquerading. Numerical analysis and curve fitting techniques are used to determine the relationship among the keys, number of nodes and link strength. Extensive simulation on random and uniformly distributed nodes exhibits exponential behaviour of the link strengths, where link strength directly impacts the security of the paths chosen. Our simulation and empirical results show that the LKSR scheme provides secure routing and exhibits the property of increasing link strength with keymatches. This establishes the stability and scalability of LKSR scheme.

Keywords: heterogeneous networks; key distribution; link strength; node compromise; wireless sensor networks; WSNs; network security; secure routing; keymatches; numerical analysis; curve fitting; simulation.

DOI: 10.1504/IJCSYSE.2013.057222

International Journal of Computational Systems Engineering, 2013 Vol.1 No.4, pp.238 - 256

Published online: 26 Jul 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article