Routing Strategy and Data Security Technology in IPv6 Wireless Sensor Networks
DOI:
https://doi.org/10.3991/ijoe.v14i08.9181Keywords:
wireless sensor network, routing authentication, network coding, permutation encryption, homomorphic functionAbstract
A new routing rule detection and identity authentication mechanism based on the path sequence is proposed to cope with the vulnerability problem of wireless sensor networks (WSNs) against various attacks, especially in unattended environments. Then, the great permutation encryption algorithm (G-PEC) for WSN is proposed. Finally, a signature scheme against pollution attack based on linear network coding is improved. The results show that the proposed path sequence-based authentication method with the Contiki simulation platform can significantly reduce the computing overhead of sensor nodes and decrease the energy consumption and delay of nodes to a greater extent than the traditional authentication method. The G-PEC can effectively resist eavesdropping attack, and the new signature scheme does not need additional secure channels. The proposed mechanism also provides source message authentication.
Downloads
Published
2018-08-30
How to Cite
Zhaoyan, L., & Chengfang, Z. (2018). Routing Strategy and Data Security Technology in IPv6 Wireless Sensor Networks. International Journal of Online and Biomedical Engineering (iJOE), 14(08), pp. 94–106. https://doi.org/10.3991/ijoe.v14i08.9181
Issue
Section
Papers