Author : Deepali Ausekar 1
Date of Publication :19th April 2017
Abstract: Wireless Sensor Networks (WSNs) contains large number of sensor nodes where sensor nodes are used to sense environmental parameters e.g. temperature, humidity etc. It senses data, process and transmit it and sometimes there is need to disseminate data through wireless links to adjust configuration parameters of sensors or distribute management commands and quires to sensors. Several Data dissemination protocols have been proposed to address this need but all follow Centralized Method. In this paper we have proposed DiDrip protocol to disseminate Data items which follows distributive approach to make WSN more efficient and secure.
Reference :
-
- J. W. Hui and D. Culler, The dynamic behavior of a data dissemination protocol for network programming at scale, in Proc. 2nd Int. Conf. Embedded Netw. Sensor Syst.,2004, pp. 8194..
- D. He, C. Chen, S. Chan, and J. Bu, DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks, IEEE Trans. Wireless Commun., vol. 11, no. 5, pp. 19461956, May 2012.
- T.Dang,N. Bulusu,W. Feng, and S. Park, DHV:Acode consistency maintenance protocol for multi-hop wireless sensor networks, in Proc. 6th Eur. Conf.Wireless Sensor Netw., 2009, pp. 327342.
- G. Tolle and D. Culler, Design of an applicationcooperative management system for wireless sensor networks, in Proc. Eur. Conf. Wireless Sensor Netw., 2005, pp. 121132.
- K. Lin and P. Levis, Data discovery and dissemination with DIP, in Proc. ACM/IEEE Int. Conf. Inf. Process. Sensor Netw., 2008, pp. 433444.
- M. Ceriotti, G. P. Picco, A. L. Murphy, S. Guna, M. Corra, M. Pozzi, D. Zonta, and P. Zanon, Monitoring heritage buildings with wireless sensor networks: The Torre Aquila deployment, in Proc. IEEE Int. Conf. Inf. Process. Sensor Netw., 2009, pp. 277288.
- D. He, S. Chan, S. Tang, and M. Guizani, Secure data discovery and dissemination based on hash tree for wireless sensor networks, IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4638 4646, Sep. 2013.
- M. Rahman, N. Nasser, and T. Taleb, Pairing-based secure timing synchronization for heterogeneous sensor networks, in Proc. IEEE Global Telecommun. Conf., 2008, pp. 15.
- P. Levis, N. Patel, D. Culler, and S. Shenker, Trickle: A self-regulating algorithm for code maintenance and propagation in wireless sensor networks, in Proc. 1st Conf. Symp. Netw. Syst. Design Implementation, 2004, pp. 1528.
- A. Perrig, R. Canetti, D. Song, and J. Tygar, Efficient and secure source authentication for multicast, in Proc. Netw. Distrib. Syst. Security Symp., 2001, pp. 3546.
- Y. Chen, I. Lin, C. Lei, and Y. Liao, Broadcast authentication in sensor networks using compressed bloom filters, in Proc. 4th IEEE Int. Conf. Distrib. Comput. Sensor Syst., 2008, pp. 99111.
- R. Merkle, Protocols for public key cryptosystems, in Proc. IEEE Security Privacy,1980, pp. 122134. 23 [13] M. Bellare and P. Rogaway, Collision-resistant hashing: Towards making UOWHFs practical, in Proc. Adv. Cryptology, 1997, pp. 5673.
- http://www.google.co.in/basic wsn
- A. Perrig, R. Canetti, J. Tygar, and D. Song, Efficient authentication and signing of multicast streams over lossy channels, in Proc. IEEE Security Privacy, 2000, pp. 5673.
- Daojing He, Member, IEEE, Sammy Chan, Member, IEEE, Mohsen Guizani, Fellow, IEEE, Haomiao Yang, Member, IEEE, and Boyang Zhou”Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks” 24