Cargando…
A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes
It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4721703/ https://www.ncbi.nlm.nih.gov/pubmed/26633405 http://dx.doi.org/10.3390/s151229782 |
_version_ | 1782411262112563200 |
---|---|
author | Zhang, Ying Chen, Wei Liang, Jixing Zheng, Bingxin Jiang, Shengming |
author_facet | Zhang, Ying Chen, Wei Liang, Jixing Zheng, Bingxin Jiang, Shengming |
author_sort | Zhang, Ying |
collection | PubMed |
description | It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network. |
format | Online Article Text |
id | pubmed-4721703 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-47217032016-01-26 A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes Zhang, Ying Chen, Wei Liang, Jixing Zheng, Bingxin Jiang, Shengming Sensors (Basel) Article It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network. MDPI 2015-12-01 /pmc/articles/PMC4721703/ /pubmed/26633405 http://dx.doi.org/10.3390/s151229782 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zhang, Ying Chen, Wei Liang, Jixing Zheng, Bingxin Jiang, Shengming A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes |
title | A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes |
title_full | A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes |
title_fullStr | A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes |
title_full_unstemmed | A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes |
title_short | A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes |
title_sort | network topology control and identity authentication protocol with support for movable sensor nodes |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4721703/ https://www.ncbi.nlm.nih.gov/pubmed/26633405 http://dx.doi.org/10.3390/s151229782 |
work_keys_str_mv | AT zhangying anetworktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT chenwei anetworktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT liangjixing anetworktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT zhengbingxin anetworktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT jiangshengming anetworktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT zhangying networktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT chenwei networktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT liangjixing networktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT zhengbingxin networktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes AT jiangshengming networktopologycontrolandidentityauthenticationprotocolwithsupportformovablesensornodes |