Routing Strategy and Data Security Technology in IPv6 Wireless Sensor Networks

Authors

  • Li Zhaoyan Xihua University, Chengdu
  • Zhao Chengfang Xihua University, Chengdu

DOI:

https://doi.org/10.3991/ijoe.v14i08.9181

Keywords:

wireless sensor network, routing authentication, network coding, permutation encryption, homomorphic function

Abstract


A new routing rule detection and identity authentication mechanism based on the path sequence is proposed to cope with the vulnerability problem of wireless sensor networks (WSNs) against various attacks, especially in unattended environments. Then, the great permutation encryption algorithm (G-PEC) for WSN is proposed. Finally, a signature scheme against pollution attack based on linear network coding is improved. The results show that the proposed path sequence-based authentication method with the Contiki simulation platform can significantly reduce the computing overhead of sensor nodes and decrease the energy consumption and delay of nodes to a greater extent than the traditional authentication method. The G-PEC can effectively resist eavesdropping attack, and the new signature scheme does not need additional secure channels. The proposed mechanism also provides source message authentication.

Author Biographies

Li Zhaoyan, Xihua University, Chengdu

School of Computer & Software Engineering

Zhao Chengfang, Xihua University, Chengdu

School of Computer & Software Engineering

Downloads

Published

2018-08-30

How to Cite

Zhaoyan, L., & Chengfang, Z. (2018). Routing Strategy and Data Security Technology in IPv6 Wireless Sensor Networks. International Journal of Online and Biomedical Engineering (iJOE), 14(08), pp. 94–106. https://doi.org/10.3991/ijoe.v14i08.9181

Issue

Section

Papers