Next Article in Journal
Detecting and Classifying Human Touches in a Social Robot Through Acoustic Sensing and Machine Learning
Previous Article in Journal
A Fairness Oriented Neighbor-Channel-Aware MAC Protocol for Airborne Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs

School of Information Science and Engineering, Southeast University, Nanjing 210096, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(5), 1133; https://doi.org/10.3390/s17051133
Submission received: 20 January 2017 / Revised: 11 May 2017 / Accepted: 13 May 2017 / Published: 16 May 2017

Abstract

:
In wireless sensor networks, nodes are mostly deployed in unsupervised areas and are vulnerable to a variety of attacks. Therefore, data security is a vital aspect to be considered. However, due to the limited computation capability and memory of sensor nodes, it is difficult to perform the complex encryption algorithm, as well as the key distribution and management algorithm. Toward this end, a low-complexity algorithm for security in wireless sensor networks is of significant importance. In this article, a weakly secure network coding based multipath routing scheme is proposed, which can guarantee the data confidentiality in transmission probabilistically, and can improve the energy efficiency in the meantime. Then the simulations of the probability of transmission being secure are performed. The results show that with the increase of the number of hops k, the probability of transmission being secure suffers from a rapid decrease. On the contrary, with the increase of multicast capacity h it undergoes a slight growth. Therefore, the weak security can be achieved with probability approaching 1 by limiting the number of hops and increasing the multicast capacity. Meanwhile, the simulations of energy consumption are performed and the comparison between the energy consumption of the scheme in this article and the multipath routing scheme without network coding is conducted. The results show that by employing network coding, the scheme in this article can improve the energy efficiency, and the more packets transmitted, the more energy consumption can be reduced.

1. Introduction

Due to the complex working environment, wireless sensor networks (WSNs) can suffer from a variety of attacks. Therefore, transmission security, including data confidentiality, data integrity, and data availability, is a vital aspect to be considered [1,2,3,4]. Existing researches on security of WSNs are mostly based on encryption/decryption. In [5], a symmetric encryption algorithm is proposed, which is an amalgamation of two different encryption algorithms in randomized method. In [6], the authors analyzed the security challenges in WSNs and smart home systems, then proposed a security evaluation technique based on attack graph generation. SNEP protocol is one of most maturely applied security protocols in WSNs [7]. Since the communication among the nodes requires the involvement of the base station, the SNEP protocol is of rather low efficiency and is not applicable in large-scale networks. Since the low-cost wireless sensors which are battery-powered have limited computational capability and memory, it is difficult to perform complicated encryption algorithms in WSNs. Moreover, achieving key distribution and key management is also a great challenge in large-scale WSNs. In [8], a random key distribution based key management protocol is proposed. In this protocol, a key pool with size of S is established firstly and each node in the network stores m keys of the key pool. Once any two nodes in the network have the same key, a secure channel can be established between them. However, the biggest problem is that if there are no identical keys between a pair of nodes, the secure data transmission between them cannot be completed. To overcome the disadvantages in the aforementioned techniques, a weakly-secure network coding based multipath routing scheme is proposed in this article to guarantee the confidentiality of messages. The superiority of the scheme in this article over encryption is that it gets rid of the complex encryption algorithm and key distribution/management, so it can greatly reduce the computation overhead.
Compared with Shannon security [9,10,11,12,13], the requirement of weak security in this article is not information-theoretically perfect [14]. While the Shannon security requires the attacker cannot get any information about the source message, in the paradigm of weak security, the attacker cannot get any useful information about the source message, which means the attacker cannot decode any part of the source message correctly. As a result, weak security can bring higher transmission capacity than Shannon security. Therefore, the weakly secure network coding based scheme is adopted in this article to improve the transmission efficiency and reduce the transmission overhead.
The main contributions of this article can be listed as follows. Firstly, the relationship between the probability of transmission being secure and some network parameters is presented through mathematical derivations and simulations. Then it is shown that by setting the parameters appropriately, the weak security can be achieved with the probability approaching 1. Secondly, by employing network coding in the intermediate nodes and calculating the least number of communication nodes to satisfy the network requirements, the method proposed in this article can largely reduce the transmission overhead compared with the multipath routing scheme without network coding.
The remainder of this article is organized as follows. In Section 2, the network model is introduced, including the adversary model and the algorithms to get the number of paths as well as the least number of communication nodes. Then the simulation results about these algorithms are presented as well. In Section 3, the pre-coding scheme and random network coding scheme are presented. In Section 4, the security analysis is conducted, and the probability of the transmission being weakly secure is derived. In Section 5, the analysis of energy consumption of two different schemes is performed, namely, the network coding based multipath routing scheme and the multipath routing scheme without network coding. In Section 6, the simulations based on the above analysis are performed and the results are presented. In Section 7, the conclusions based on the simulations are presented.

2. Network Model

2.1. Adversary Model

In this article, the communication network can be described as a directed acyclic graph G = ( V , E ) , where V is the set of nodes and E is the set of links. For each link e E , we define t a i l ( e ) and h e a d ( e ) as the tail and head of e, respectively. In the set of nodes V, it is denoted by s the source node, and by T the sink node, which is the base station in the practical WSNs. For each node v V , let Out ( v ) and In ( v ) denote the set of outgoing channels and incoming channels of v, respectively. That is, Out ( v ) = { ( v , u ) : ( v , u ) E } and In ( v ) = { ( u , v ) : ( u , v ) E } . For the eavesdropper, let V e a v and E e a v denote the set of nodes and channels being eavesdropped, respectively. The multi-cast capacity H is the minimum number of edges in any cut between the source node and sink node. Each channel e E contains a message packet, whose elements are selected from a finite field F q , where q is the size of the finite field. For the source node, we introduce H artificial channels which carry the H source packets that the source node transmits to the base station.
It is supposed that there exist some nodes that are randomly deployed in a specified district, and the number of nodes is denoted by N. After the routing procedure is completed, there exist N c intermediate nodes that are involved in transmission. It is assumed that there is an adversary which is randomly located in the district, and for each intermediate node, there is a probability that it may be attacked by the adversary and the figure of the probability is up to the range that the adversary can control. Once the intermediate node is attacked, it can be controlled by the adversary and the messages it receives and transmits can be observed completely by the adversary. For each transmission, whether an individual node is controlled is independent. Notably, the source node and the base station cannot be attacked, otherwise the malicious node can get the message without any loss.

2.2. Calculation of Number of Paths

Suppose that the successful delivery ratio (SDR) is denoted by r. For every single link between any two nodes, the link failure probability is e. In addition, the average number of hops of the paths from the source node to the base station is k, the desired multicast capacity is h. To simplify the question, it is assumed that the number of hops of each path exactly equals to k. Transmission of packets on each hop can be regarded as dependent event, hence, for each path, the probability of successfully delivering one packet is
p k = ( 1 - e ) k
For one transmission, only if the number of successful paths is at least h do we call it a successful transmission. Since the desired multicast capacity is h, it requires H h paths to guarantee the expected successful delivery ratio R. Under the condition that link failure probability is e and the number of hops is k, let H h , e , k , R denote the least number of paths to implement to achieve capacity of h and SDR of R. Among the H paths, the number of successful paths should be at least h to guarantee the correct recovery of original message at the base station. Hence, the SDR can be represented as
r = i = h H C H i p k i ( 1 - p k ) H - i
where C H i is the binomial coefficient, defined as C H i = H ! ( H - i ) ! ( i ) ! .
In this article, it is essential to determine the least number of H, referring to as H h , e , k , R , to guarantee that the successful delivery ratio satisfies r R , i.e.
i = h H h , e , k , R C H h , e , k , R i p k i ( 1 - p k ) H h , e , k , R - i R
In practice, it can be impossible to find the analytical solution of formula (3). So we need to find the numeric solution by the iteration algorithm. However, when h gets larger, it can be of great computational complexity to perform the iteration algorithm to get H. Consequently, it is necessary to adopt another algorithm with light complexity to get the approximated solution of (3), which is also presented in [15,16]. Let H s denote the number of the successful paths in the H paths, then H s satisfies the Binomial distribution B(H, p k ), and the mean value and the variance of H s can be written as
μ = E ( H s ) = H p k = H ( 1 - e ) k
σ 2 = H p k ( 1 - p k ) = H ( 1 - e ) k ( 1 - ( 1 - e ) k )
The successful delivery ratio r can be rewritten as
r = P ( H s h )
Thus, the question can be described as finding the least H that guarantees P ( H s h ) R . According to the central-limit theorem, the Binomial distribution can be regarded as Normal distribution approximately, i.e.,
H s N ( μ , σ 2 )
Let
H s * = H s - μ σ
then H s * satisfies the standard normal distribution, i.e.
H s * N ( 0 , 1 )
In the standard normal distribution, for the given R, the value of x R that satisfies P ( H s * x R ) R can be obtained from the probability density function of standard normal distribution, which means
h = x R σ + μ
After that, the value of H can be calculated through the Equation (11).
h = x R σ + μ = x R H ( 1 - e ) k ( 1 - ( 1 - e ) k ) + H ( 1 - e ) k
Hereto, given the desired successful delivery ration R, the link failure probability e, the average number of hops k, and the expected multi-cast capacity h, the least number of paths can be calculated according to Algorithm 1:
Algorithm 1 approximated algorithm of Calculating H
1:
Initializing with R, e, k, and h
2:
Calculating x R
3:
Calculating H
According to the aforementioned algorithms, the simulations with different initializing values are performed, and the results are shown in Figure 1, Figure 2 and Figure 3:

2.3. Least Number of Communication Nodes

After getting the least number of paths H according to the algorithms mentioned above, the routing procedure can be proceeded to establish those H paths to build the communication network. For the sake of energy efficiency and transmission security, it is essential to involve as few nodes as possible in communication under the network conditions. Given the number of hops of each path, and the number of paths, we define N l as the least number of communication nodes, a.k.a the least number of nodes that need to be involved in communication to satisfy the conditions.
Algorithm 2 The algorithm to calculate the least number of communication nodes
1:
Initiate with the parameters H , k
2:
Create the first path and set n u m _ n o d e k - 1 , s _ p a t h 1
3:
while s _ p a t h < H do
4:
      \ \ Create a new path
5:
      p _ f l a g 0
6:
     while p _ f l a g = = 0 do
7:
           c _ h o p 0
8:
          while c _ h o p < k - 1 do
9:
                for i = 1 : n u m _ n o d e do
10:
                       n e w _ n o d e 1
11:
                       if the i - t h node is the current hop||exists parallel channels||exists a loop then
12:
                             Continue
13:
                       else
14:
                             pick the i - t h node as the next hop
15:
                              n e w _ n o d e 0
16:
                             break
17:
                       end if
18:
                end for
19:
                if n e w _ n o d e = = 1 then
20:
                      pick up a new node as the next hop
21:
                        n u m _ n o d e n u m _ n o d e + 1
22:
                end if
23:
                 c _ h o p c _ h o p + 1
24:
          end while
25:
           p _ f l a g 1
26:
           s _ p a t h s _ p a t h + 1
27:
     end while
28:
end while
29:
N l n u m _ n o d e
In Algorithm 2, the first path with k hops is established initially. To do so, there should be k - 1 intermediate nodes involved. Then, it can be proceeded to establish the rest H - 1 paths. What is notable is that the network topology is node-braided and edge-disjoint, which means that between any two paths, there may exist common nodes but cannot exist any common edges. Therefore, when executing the routing, it should be firstly determined whether the existing intermediate nodes can be used as the next hop of the current path, if not, then it is necessary to introduce a new node. Meanwhile, it is crucial that there cannot exist parallel links between any two nodes, either loops in the whole network.
According to Algorithm 2, some simulations are performed and the results are shown in Figure 4.

3. Weakly Secure Network Coding

In this section, a packet format which can get rid of centralized knowledge of network topology is proposed, which is shown in Figure 5.
Here the ’Source ID’ is the ID of the transmitting node, the ’Dest ID’ is the ID of the receiving node, and the ’Generation ID’ is the identifier of a generation. The source node categories all the source packets into some groups and each group includes h source packets. Such a group is called one generation. In each generation, the h packets are assigned with a packet ID ranging from 1 to h respectively. In addition, the source sends one generation in each transmission. The ’Coding Vector’ is the vector of combination coefficients of the coded packet.
To achieve weak security, the source node needs to encode the data before transmitting it and this process is called pre-coding. The pre-coding algorithm in this article is generated from the algorithm in [17]. Compared with the algorithm in [17], the algorithm in this article introduces more non-linear property to the coded packets.
According to the hypothesis, the source node can transmit h packets in one transmission. Therefore, without loss of generality, the source message can be denoted as
M = [ m 1 , m 2 , , m h ] T
Then the pre-coded message can be written as
M = [ m 1 , m 2 , , m h ] T
where
m 1 = f ( m 1 ) + m 2 m 2 = f ( m 1 + m 2 ) + m 3 m n - 1 = f ( m 1 + m 2 + + m n - 1 ) + m n m n = m 1 + f ( m 1 + + m n - 1 )
The function f is a permutation function and both its input and output are vectors which consist of elements in the finite field. Note that the construction of function f is public to all nodes, even including the adversary.
After the pre-coding procedure is completed, the source node applies the generating matrix G to the coded message to generate H packets to transmit along the H outgoing channels of the source node s,
X = G M = [ x 1 , , x H ] T
where G is a H-by-h matrix whose elements are chosen randomly from the finite field.
For the sink node, the received packets can be denoted as Y = [ y 1 , y 2 , , y m ] T = C M , where C is the coding matrix of Y , and the i - t h row of C is the coding vector of packet y i . Then by using Gaussian elimination method, M can be calculated. After that, m 1 , m 2 , , m h can be calculated iteratively according to formula (16):
m 1 = m n - f ( m 1 + + m n - 1 ) m 2 = m 1 - f ( m 1 ) m n - 1 = m n - 2 - f ( m 1 + + m n - 2 ) m n = m n - 1 - f ( m 1 + m 2 + + m n - 1 )
In this way, the sink node can decode all the h packets in one generation.

4. Security Analysis

Since each node is deployed randomly in the district and the adversary is randomly located in the district, then for every single node, the probability of being located in the overhearing zone (being controlled by the adversary) is
p o = S o v e r h e a r S t o t a l
where S t o t a l is the size of the whole district wherein the wireless sensors are deployed, and S o v e r h e a r is range that the adversary can control. Once a node is located in that range, it will be controlled by the adversary. Therefore, in the whole district, the number of nodes which are overheard N o satisfies the binomial distribution
N o B ( N , p o )
Given the average number of hops of each path and the number of paths, define N c o as the number of communication nodes which be overheard by the attacker.
Theorem 1.
The probability of N c o = m for all integers 0 m N l can be denoted as
p ( N c o = m ) = C N N c o ( p c p o ) N c o ( 1 - p c p o ) N - N c o
where p c = N l N is the probability of a node being involved in the communication.
Proof. 
p ( N c o = m ) = k = m N p ( N o = k ) p ( N c o = m | N o = k ) = k = m N C k N c o p c N c o ( 1 - p c ) k - N c o ( 1 - p c ) N - k C N k p o k ( 1 - p o ) N - k = C N N c o ( p c p o ) N c o ( 1 - p c p o ) N - N c o
 ☐
Theorem 2.
Let E o denote the number of channels that being overheard by the attacker, and E v o denote the number of valid channels that being overheard, then for all integers 0 c k H
p ( E v o = c ) = i = c k H p ( E o = i ) p ( E v o = c | E o = i ) = i = c k H p ( E o = i ) ( 1 - e ) c e ( i - c )
And p ( E o = i ) = j = 0 N l p ( N c o = j ) p ( E o = i | N c o = j ) , so Equation (27) can be rewritten as
p ( E v o = c ) = i = c k H j = 0 N l p ( N c o = j ) p ( E o = i | N c o = j ) ( 1 - e ) c e ( i - c )
Let Γ w be the overhearing matrix, referring to as the matrix that consists of the coding vectors of the valid channels being overheard.
Theorem 3.
The attacker cannot get any useful information of the original messages given that R ( Γ w ) < h , where R ( Γ w ) is the rank of matrix Γ w , i.e., Γ w is not a full-rank matrix.
Proof. 
Let X = ( x 1 , x 2 , , x h ) T be the original message that is sent over the network. Then after the pre-coding on the source node, the input message can be written as X = [ x 1 , x 2 , , x h ] , i.e., the source transmits X instead of X . Since a linear random network code is used ,the message on each channel e j can be written as Γ e j X . The message obtained by the attacker is W= Γ w X . Since R ( Γ w ) < h , which means the adversary can obtain at most h - 1 linearly independent equations, which means that it cannot resolve for all the packets in X . Then the attacker cannot solve any packets through formula (16). Hence, we have I ( x i ; B ) = I ( x i ; W ) = 0 and by so we can achieve weak security.  ☐
Let p e be the probability of transmission being insecure, which means
p e = p ( R ( Γ w ) = h )
Then p s = 1 - p e is the probability of transmission being secure.
Theorem 4.
p e = m = 0 k H p ( E v o = m ) p ( R ( Γ w ) = h | E v o = m ) = m = h k H p ( E v o = m ) p ( R ( Γ w ) = h | E v o = m )
Proof. 
When E v o h - 1 , it is obvious that the rank of overhearing matrix Γ w cannot be h since the maximum value of R ( Γ w ) is E v o h - 1 . Hence, for 0 m h - 1 , p ( R ( Γ w ) = h | E v o = m ) = 0 . When h m k H , the probability of R ( C ) = h under the condition of E v o = m is p ( R ( Γ w ) = h | E v o = m ) . In summary, p e = m = h k H p ( E v o = m ) p ( R ( Γ w ) = h | E v o = m ) , then Theorem 4 proved. ☐
Lemma 1.
For h m k H , we have
p ( R ( Γ w = h | E v o = m ) = i = 0 h - 1 ( 1 - q i - m )
where q is the size of the finite field.
Proof. 
Let N m , h ( h ) denote the number of m - b y - h matrices that have a rank of h( m h ). Then form [18], we have
N m , h ( h ) = q m h i = 0 h - 1 ( 1 - q i - h ) ( 1 - q i - m ) ( 1 - q i - h ) = q m h i = 0 h - 1 ( 1 - q i - m )
Hence, we have
p ( R ( Γ w ) = h | E v o = m ) = N m , h ( h ) q m h = i = 0 h - 1 ( 1 - q i - m )
This, we complete the proof of Lemma 1. ☐
Theorem 5.
According to Lemma 1, we have
p e = m = h k H p ( E v o = m ) p ( R ( Γ w ) = h | E v o = m ) = m = h k H p ( E v o = m ) i = 0 h - 1 ( 1 - q i - m )
Hence, the probability of transmission being secure can be written as
p s = 1 - p e = 1 - m = h k H p ( E v o = m ) i = 0 h - 1 ( 1 - q i - m )

5. Power Consumption Analysis

Figure 6 shows the power consumption of different components in WSNs, which is proposed by Estrin [19]. It indicates that compared with the energy consumed by data transmitting and receiving, the energy consumed by other components, including sensing, computing and sleeping can be negligible. Meanwhile, the energy consumption of idling is always allocated by the nodes to avoid collisions and does not affect the energy analysis in network layer since avoiding collisions is a function in MAC layer [20]. Therefore, in this article, the total energy consumption of one transmission can be written as
E = E T X + E R X
Specifically, in one transmission, the energy consumption of transmitting and receiving can be written as
E T X ( B , d ) = E T X E l e c * B + E a m p * B * d γ
E R X ( B , d ) = E R X E l e c * B
where B is the number of bits of data, E T X E l e c and E R X E l e c are the energy consumption of transmitting and receiving a bit of data respectively. In addition, E a m p is the amplification factor of the amplifier, d is the distance between transmitting node and receiving node, γ is the path-loss factor. Therefore, when a source node needs to transmit a packet of B bits to a sink node through a path of k hops, the total energy consumption is
E B , d , k = E T X ( B , d ) * k + E R X ( B , d ) * k = k * B * ( E T X E l e c + E R X E l e c ) + k * E a m p * B * d γ
In multipath routing scheme without network coding, to achieve a desired successful delivery ratio of R, the number of paths should be employed is
P = log ( 1 - R ) log ( 1 - ( 1 - e ) k )
Therefore, to transmit N p packets successfully from the source to the node, the number of packets that source node needs to transmit totally is
N t o t a l 1 = N p * log ( 1 - R ) log ( 1 - ( 1 - e ) k )
Hence, the total energy consumption is
E h , d , k 1 = k * N p * log ( 1 - R ) log ( 1 - ( 1 - e ) k ) * b * ( E T X E l e c + E R X E l e c ) + k * E a m p * N p * log ( 1 - R ) log ( 1 - ( 1 - e ) k ) * b * d γ
where b is the number of bits per packet. On the other hand, in the network coding based multipath routing scheme, to achieve a desired successful delivery ratio of R with multicast capacity of h, the number of path needs to be employed H can be calculated by Algorithm 1. Then to transmit N p packets successfully from the source to the node, the number of packets that source node needs to transmit totally is
N t o t a l 2 = N p * H h ;
Hence, the total energy consumption is
E h , d , k 2 = k * N p * H h * b * ( E T X E l e c + E R X E l e c ) + k * E a m p * N p * H h * b * d γ

6. Simulations Results

6.1. Simulations of Security

Basing on the analysis in Section 4, the simulations on the probability of transmission being secure are conducted with different network parameters, including h, e, k, p o , etc. Here the simulation results are presented in Figure 7, Figure 8, Figure 9 and Figure 10.
It can be concluded from Figure 7 that with the increase of multicast capacity h, the probability of transmission being secure p s increases slightly. However, With the increase of number of hops k, the probability of transmission being secure decreases rapidly. If the desired probability of transmission being secure is p S 0 . 99 , the number of hops needs to be limited with k 4 .
From Figure 8, it can be concluded that the attacking capability of adversary has a relatively significant impact on the probability of transmission being secure, and the larger the number of hops is, the greater the impact is.
From Figure 9 and Figure 10, a conclusion can be drawn that the probability of transmission being secure is irrelevant with the number of nodes or the size of finite field.

6.2. Simulations of Energy Consumption

In Section 5, the analysis of energy consumption of the network coding based multipath routing scheme and the multipath routing scheme without network coding is conducted. Basing on that, simulations on energy consumption are performed and the results are presented in Figure 11.
As Figure 11 shows, it is clear that the network coding based scheme has a better energy efficiency and the more packets transmitted, the more energy consumption can be reduced.

7. Conclusions

In this article, a weakly secure network coding based multipath routing scheme is proposed. Based on that, the analysis on security and power consumption is conducted. Accordingly, the simulations on the probability of transmission being secure and power consumption are performed and the comparison of power consumption between two different schemes is performed as well. According to the analysis and simulation results, some conclusions can be drawn and are listed as follows:
  • As the number of hops of each path in the network increases, the probability of transmission being secure decreases rapidly, especially under the condition of low communication capacity. For example, when the the capacity is h = 3 and p o = 0 . 1 , with k being 2, 3, 4, and 5, the probability of transmission being secure is 0.9851, 0.7586, 0.2277, and 0.0020 correspondingly. Toward this end, if the desired probability of transmission being secure is p s 0 . 99 , the number of hops should be limited with k 4 . To do this, it is necessary to deploy nodes with larger communication distance,especially when the nodes are deployed in a rather vast area.
  • When the number of hops k 3 , with the increase of multicast capacity h, the probability of transmission being secure increases and approaches 1 gradually. When k = 2 , with the increase of multicast capacity h, the probability of transmission being secure almost keeps unchanged and satisfies p s 1 .
  • When the number of hops k 3 , the overhearing ability, which can be reflected by the figure of p o , has a relatively significant impact on the probability of transmission being secure. However, when k = 2 , the probability of transmission being secure almost keeps unchanged and is approximately equal to 1.
  • Compared with the multipath routing scheme without network coding, the network coding based scheme in this article has a better energy efficiency. According to the simulation results, when 1000 packets are transmitted and the multicast capacity is h = 10 , the power consumption of network coding based multipath routing scheme is 36 . 67 % less than the scheme without network coding.

Acknowledgments

This work has been supported by the National High Technology Research and Development Program of China (863 Program).

Author Contributions

Xiang Liu conceived the idea of probabilistically weakly secure network coding scheme and conducted the derivations and proofs. Xiang Liu and Jie Huang designed the simulations. Xiang Gao performed the simulations and analyzed the data. Xiang Liu and Jie Huang wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shaikh, R. A.; Lee, S.; Song, Y. J.; Zhung, Y. Securing distributed wireless sensor networks: Issues and guidelines. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 5–7 June 2006; pp. 226–231. [Google Scholar]
  2. Gaware, A.; Dhonde, S.B. A survey on security attacks in wireless seneor networks. In Proceedings of the International conference on Computing for Sustainable Global Development, New Delhi, India, 16–18 March 2016; pp. 536–539. [Google Scholar]
  3. Abd El Dayem, Sanaa. S.; Rizk, M.R.M. Security for wireless seneor network. In Proceedings of the International Conference on Information Communication and Management, Hertfordshire, UK, 29–31 October 2016; pp. 173–177. [Google Scholar]
  4. Sharma, S. Wireless sensor network and security. In Proceedings of the International Conference on Computing for Sustainable Global Development, New Delhi, India, 16–18 March 2016; pp. 3301–3304. [Google Scholar]
  5. Praveena, A.; Smys, S. Efficient cryptographic approach for data security in wireless sensor networks using MES V-U. In Proceedings of the International Conference on Intelligent Systems and Control, Coimbatore, TN, India, 7–8 January 2016; pp. 1–6. [Google Scholar]
  6. Zhang, M.; Liu, Y. A New Approach to security Analysis of Wireless Sensor Networks for Smart Home Systems. In Proceedings of the International Conference on Intelligent Networking and Collaborative Systems, Ostrava, Czech Republic, 7–9 September 2016; pp. 318–323. [Google Scholar]
  7. Perrig, A.; Szewczyk, R.; Wen, V.; Culler, D.; Tygar, J.D. SPINS: Security Protocols for Sensor Networks. ACM Wirel. Netw. 2002, 8, 521–534. [Google Scholar] [CrossRef]
  8. Eschenauer, L; Gligor, V.D. A Key-Management Scheme for Distributed Sensor Networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 41–47. [Google Scholar]
  9. Cai, N.; Yeung, R.W. Secure Network Coding. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002. [Google Scholar]
  10. Shannon, C.E. Communication theory of secrecy system. Bell Syst. Technol. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  11. Ozarow, L.H.; Wyner, A.D. Wire-tap channel II. AT&T Bell Labs Technol. J. 1984, 63, 2135–2157. [Google Scholar]
  12. Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the International Workshop on Managing Requirements Knowledge, New York, NY, USA, 4–7 June 1979; pp. 313–317. [Google Scholar]
  13. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  14. Bhattad, K.; Narayanan, K.R. Weakly secure network coding. In Proceedings of the 1st Workshop on Network Coding, Theory and Applications, Riva del Garda, Italy, 7 April 2005. [Google Scholar]
  15. Yang, Y.; Zhong, C.; Sun, Y.; Yang, J. Network coding based reliable disjoint and braided multipath routing for sensor networks. J. Netw. Comput. Appl. 2010, 33, 422–432. [Google Scholar] [CrossRef]
  16. Li, S.-S.; Zhu, P.-D.; Liao, X.-K.; Cheng, W.-F.; Peng, S.-L. Energy efficient multipath routing using network coding for sensor networks. Proceeding of the ADHOC-NOW’06, Ottawa, ON, Canada, 17–19 August 2006; pp. 114–127. [Google Scholar]
  17. Wei, Y.; Yu, Z.; Guan, Y. Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks. In Proceedings of the IEEE International Symposium on Network Coding, Toronto, ON, Canada, 9–11 June 2010; pp. 1–6. [Google Scholar]
  18. Laksov, D.; Thorup, A. Counting matrices with coordinates in finite fields and of fixed rank. Math. Scand. 1994, 74, 19–33. [Google Scholar] [CrossRef]
  19. Estrin, D. Wireless sensor networks tutorial part IV: Sensor network protocols. In Proceedings of the 8th Annual International Conferece on Mobile Computing and Networking, Altlanta, GA, USA, 23–28 September 2002; pp. 23–28. [Google Scholar]
  20. Wang, L.; Yang, Y.; Zhao, W. Network coding-based multipath routing for energy efficiency in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 115. [Google Scholar] [CrossRef]
Figure 1. Relationship between number of paths and SDR.
Figure 1. Relationship between number of paths and SDR.
Sensors 17 01133 g001
Figure 2. Relationship between number of paths and multi-cast capacity.
Figure 2. Relationship between number of paths and multi-cast capacity.
Sensors 17 01133 g002
Figure 3. Relationship between number of paths and error probability.
Figure 3. Relationship between number of paths and error probability.
Sensors 17 01133 g003
Figure 4. The least number of communication nodes.
Figure 4. The least number of communication nodes.
Sensors 17 01133 g004
Figure 5. Packet Format.
Figure 5. Packet Format.
Sensors 17 01133 g005
Figure 6. Power consumption of different components in wireless sensor nodes.
Figure 6. Power consumption of different components in wireless sensor nodes.
Sensors 17 01133 g006
Figure 7. This is a figure that shows the relationship between the probability of transmission being secure and the multicast capacity with different p o . (a) relationship between the probability of transmission being secure and capacity with p o = 0 . 1 ; (b) relationship between the probability of transmission being secure and capacity with p o = 0 . 05 .
Figure 7. This is a figure that shows the relationship between the probability of transmission being secure and the multicast capacity with different p o . (a) relationship between the probability of transmission being secure and capacity with p o = 0 . 1 ; (b) relationship between the probability of transmission being secure and capacity with p o = 0 . 05 .
Sensors 17 01133 g007
Figure 8. Relationship between the probability of transmission being secure p s and p o with multicast capacity is h = 10 .
Figure 8. Relationship between the probability of transmission being secure p s and p o with multicast capacity is h = 10 .
Sensors 17 01133 g008
Figure 9. Relationship between the probability of transmission being secure p s and number of nodes with multicast capacity is h = 10 and and p o = 0 . 05 .
Figure 9. Relationship between the probability of transmission being secure p s and number of nodes with multicast capacity is h = 10 and and p o = 0 . 05 .
Sensors 17 01133 g009
Figure 10. Relationship between the probability of transmission being secure p s and the size of the finite field with multicast capacity is h = 10 and p o = 0 . 05 .
Figure 10. Relationship between the probability of transmission being secure p s and the size of the finite field with multicast capacity is h = 10 and p o = 0 . 05 .
Sensors 17 01133 g010
Figure 11. Energy consumed for transmitting N p = 100 : 100 : 1000 packets with different path length.
Figure 11. Energy consumed for transmitting N p = 100 : 100 : 1000 packets with different path length.
Sensors 17 01133 g011

Share and Cite

MDPI and ACS Style

Liu, X.; Huang, J.; Gao, X. A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs. Sensors 2017, 17, 1133. https://doi.org/10.3390/s17051133

AMA Style

Liu X, Huang J, Gao X. A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs. Sensors. 2017; 17(5):1133. https://doi.org/10.3390/s17051133

Chicago/Turabian Style

Liu, Xiang, Jie Huang, and Xiang Gao. 2017. "A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs" Sensors 17, no. 5: 1133. https://doi.org/10.3390/s17051133

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop