Next Article in Journal
Assessment of the Contribution of BeiDou GEO, IGSO, and MEO Satellites to PPP in Asia—Pacific Region
Next Article in Special Issue
Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks
Previous Article in Journal
A Single Eu-Doped In2O3 Nanobelt Device for Selective H2S Detection
Previous Article in Special Issue
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
Article Menu

Export Article

Open AccessArticle
Sensors 2015, 15(12), 29958-29969; doi:10.3390/s151229782

A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes

1
College of Information Engineering, Shanghai Maritime University, Shanghai 201306, China
2
Department of Computer Science, Tennessee State University, Nashville, TN 37209, USA
*
Author to whom correspondence should be addressed.
Academic Editor: Rongxing Lu
Received: 28 October 2015 / Revised: 20 November 2015 / Accepted: 24 November 2015 / Published: 1 December 2015
(This article belongs to the Special Issue Security and Privacy in Sensor Networks)
View Full-Text   |   Download PDF [1792 KB, uploaded 1 December 2015]   |  

Abstract

It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network. View Full-Text
Keywords: wireless sensor network; nodes mobility; security topology control; identity authentication; soft handover wireless sensor network; nodes mobility; security topology control; identity authentication; soft handover
Figures

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Zhang, Y.; Chen, W.; Liang, J.; Zheng, B.; Jiang, S. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes. Sensors 2015, 15, 29958-29969.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top