Iterative key distribution based on MAD neighborhood in underwater mobile sensor networks

Chuan Gang Liu, Chih Hung Chao, Chih Wen Leou, Jung-Shian Li

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

As underwater monitoring technology is well-developed, the underwater sensor network plays an important role for the exploration of the oceans. But there exist possible risks of sensor nodes being captured by adversaries and the transmissions in the underwater communication being illegally accessed. As a result, it is vital to take the security issue into account in such an underwater mobile sensor network. In this paper, our goal is to propose a key distribution scheme adequate for underwater mobile sensor networks. We adopt a mobility model to capture the movement of the sensors floating on the sea. Our key distribution scheme is designed to fit the characteristics of the sensors' movement, and hence the connection and security can be improved in underwater sensor networks. Our scheme can also reduce redundant keys in the key distribution system. We also propose a secure routing method based on the Focused Beam Routing Protocol to adapt to our proposed iterative key distribution scheme. The simulation results show that our scheme possesses better performance, including better local connectivity, availability of path key, resilience and routing results.

Original languageEnglish
Pages (from-to)1467-1485
Number of pages19
JournalComputer Journal
Volume55
Issue number12
DOIs
Publication statusPublished - 2012 Dec 1

Fingerprint

Sensor networks
Wireless networks
Sensors
Routing protocols
Sensor nodes
Availability
Monitoring
Communication

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Liu, Chuan Gang ; Chao, Chih Hung ; Leou, Chih Wen ; Li, Jung-Shian. / Iterative key distribution based on MAD neighborhood in underwater mobile sensor networks. In: Computer Journal. 2012 ; Vol. 55, No. 12. pp. 1467-1485.
@article{8ccda1a7611c4b04a6f560d0822d6b09,
title = "Iterative key distribution based on MAD neighborhood in underwater mobile sensor networks",
abstract = "As underwater monitoring technology is well-developed, the underwater sensor network plays an important role for the exploration of the oceans. But there exist possible risks of sensor nodes being captured by adversaries and the transmissions in the underwater communication being illegally accessed. As a result, it is vital to take the security issue into account in such an underwater mobile sensor network. In this paper, our goal is to propose a key distribution scheme adequate for underwater mobile sensor networks. We adopt a mobility model to capture the movement of the sensors floating on the sea. Our key distribution scheme is designed to fit the characteristics of the sensors' movement, and hence the connection and security can be improved in underwater sensor networks. Our scheme can also reduce redundant keys in the key distribution system. We also propose a secure routing method based on the Focused Beam Routing Protocol to adapt to our proposed iterative key distribution scheme. The simulation results show that our scheme possesses better performance, including better local connectivity, availability of path key, resilience and routing results.",
author = "Liu, {Chuan Gang} and Chao, {Chih Hung} and Leou, {Chih Wen} and Jung-Shian Li",
year = "2012",
month = "12",
day = "1",
doi = "10.1093/comjnl/bxs031",
language = "English",
volume = "55",
pages = "1467--1485",
journal = "Computer Journal",
issn = "0010-4620",
publisher = "Oxford University Press",
number = "12",

}

Iterative key distribution based on MAD neighborhood in underwater mobile sensor networks. / Liu, Chuan Gang; Chao, Chih Hung; Leou, Chih Wen; Li, Jung-Shian.

In: Computer Journal, Vol. 55, No. 12, 01.12.2012, p. 1467-1485.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Iterative key distribution based on MAD neighborhood in underwater mobile sensor networks

AU - Liu, Chuan Gang

AU - Chao, Chih Hung

AU - Leou, Chih Wen

AU - Li, Jung-Shian

PY - 2012/12/1

Y1 - 2012/12/1

N2 - As underwater monitoring technology is well-developed, the underwater sensor network plays an important role for the exploration of the oceans. But there exist possible risks of sensor nodes being captured by adversaries and the transmissions in the underwater communication being illegally accessed. As a result, it is vital to take the security issue into account in such an underwater mobile sensor network. In this paper, our goal is to propose a key distribution scheme adequate for underwater mobile sensor networks. We adopt a mobility model to capture the movement of the sensors floating on the sea. Our key distribution scheme is designed to fit the characteristics of the sensors' movement, and hence the connection and security can be improved in underwater sensor networks. Our scheme can also reduce redundant keys in the key distribution system. We also propose a secure routing method based on the Focused Beam Routing Protocol to adapt to our proposed iterative key distribution scheme. The simulation results show that our scheme possesses better performance, including better local connectivity, availability of path key, resilience and routing results.

AB - As underwater monitoring technology is well-developed, the underwater sensor network plays an important role for the exploration of the oceans. But there exist possible risks of sensor nodes being captured by adversaries and the transmissions in the underwater communication being illegally accessed. As a result, it is vital to take the security issue into account in such an underwater mobile sensor network. In this paper, our goal is to propose a key distribution scheme adequate for underwater mobile sensor networks. We adopt a mobility model to capture the movement of the sensors floating on the sea. Our key distribution scheme is designed to fit the characteristics of the sensors' movement, and hence the connection and security can be improved in underwater sensor networks. Our scheme can also reduce redundant keys in the key distribution system. We also propose a secure routing method based on the Focused Beam Routing Protocol to adapt to our proposed iterative key distribution scheme. The simulation results show that our scheme possesses better performance, including better local connectivity, availability of path key, resilience and routing results.

UR - http://www.scopus.com/inward/record.url?scp=84870420057&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84870420057&partnerID=8YFLogxK

U2 - 10.1093/comjnl/bxs031

DO - 10.1093/comjnl/bxs031

M3 - Article

VL - 55

SP - 1467

EP - 1485

JO - Computer Journal

JF - Computer Journal

SN - 0010-4620

IS - 12

ER -