Sunteți pe pagina 1din 9

SECURING ROUTE DISCOVERY IN MAODV FOR

WIRELESS SENSOR NETWORKS

R.Shyamala*, Dr.S.Valli**
* Lecturer, Department of Computer Science and Engineering,
University College of Engineering, Tindivanam.
vasuchaaru@yahoo.com
** Assitant Professor, Department of Computer Science and Engineering,
Anna University, Chennai-25.
valli@annauniv.edu

ABSTRACT
The deployment of sensor networks for security and safety related environments
requires securing communication primitives such as broadcast, multicast and
point to point communication. Recent research shows that multicast provides
high energy saving in IP supported wireless sensor networks (WSN). In this
work, we investigate how to secure route discovery of the Multicast Ad-hoc on
Demand Distance Vector (MAODV) protocol for WSNs. For the ad-hoc
networks ARIADNE, SEAD, ARAN are some of the solutions, which cannot be
directly applied to energy constrained WSNs. Here, we propose a secure route
discovery of MAODV based on TESLA and one-way hash function. We have
simulated our work using NS-2. The performance of the secured MAODV and
the unsecured MAODV is compared.
Keywords MAODV, TESLA, Multicast, packet delivery ratio.

1 INTRODUCTION addressing in sensor nodes in a 4G-environment.


The IETE group has also created,
Wireless sensor networks [1] (WSN) consist LOWPANWG, which addresses IPV6
of a large set of multi-functional, low cost, functionality for Personnel Area Networks
wirelessly networked sensor nodes. These sensor (PAN) including WSNs. The SICS research
nodes have control components and group developed a new microprocessor, a WSN-
communication functionality. Sensor nodes co- oriented operating system called Contiki [7],
operate with each other and are deployed in which describes IP connectivity. The authors
environment monitoring, habitat monitoring, [25] developed a test bed with IP and multicast
healthcare, home automation, traffic control and support in WSNs and concluded that it is feasible
industrial system automation. Recent work [2] to apply source specific multicast to WSNs.
[26][25] shows that rather than broadcast, In sensor networks, adverse nodes can freely
multicast in sensor network saves power. Among join the network, listen to and/or interfere with
various routing protocols [11] MAODV has a network traffic, which leads to network failures.
very good performance. So, it is necessary to design a security
For the application of MAODV, a platform mechanism that can prevent attacks by insiders
that supports IP functionality in WSNs is or outsiders for the tree based routing protocol,
required. Since sensor networks have power namely MAODV.
consumption restriction, it is too complex to
apply the full TCP/IP protocol stack with IPV6 2 RELATED WORK
functionality to them. The authors [8][25]
describe a mechanism, which enables IP

UbiCC Journal, Volume 4, Number 3, August 2009 775


Recently, several works have addressed The base station has abundant computation
securing unicast routing protocols for ad-hoc resources. The base station has a private/public
networks. ARIADNE [15], Secure Efficient Ad key pair; the public key of the base station is
hoc Distance vector (SEAD) [14], Authenticated known to all the sensor nodes. For our system we
Routing for Ad hoc Networks (ARAN) [18], require a trusted key distribution center (KDC).
Secure Ad hoc On-demand Distance Vector The base station acts as the KDC. It is
(SAODV)[9], and Byzantine-Resilient Secure trustworthy and cannot be compromised. The
Multicast Routing in Multi-hop Wireless sensor nodes communicate using unreliable radio
Networks (BSMR) [6] are the works, which links. The nodes in the sensor network are
secure routing protocol. resource constrained. Each node has a unique ID.
ARIADNE [15] is based on Dynamic The nodes communicate with each other by
Source Routing (DSR); it describes end-to-end multihops. Since we use the TESLA-based
security for ad-hoc network routing. It makes use certificate for secure route discovery, all the
of the message authentication code (MAC) to nodes have loosely synchronized clocks. The
authenticate routing table entries. It requires clock difference between any two nodes does not
clock synchronization in the network since the exceed the error rate (). All the nodes know the
security of DSR is based on TESLA. SEAD [14] value of . The time synchronization is
secures the Destination-Sequenced Distance- maintained by the hardware. The network links
Vector (DSDV) routing protocol and provides are bi-directional.
authentication-using TESLA. It requires a shared We assume that an attacker attempts to
secret key between each pair of nodes. ARAN tamper with some links to reduce routing
[18] uses limited time certificates. So, it requires information to its neighbor. An intruder can jam
a trusted certificate authority. This protocol outgoing packets. An attacker may be a
increases latency and discovers optimal shortest compromised node. If so, it will make use of all
paths. SAODV [9] combines digital signature the cryptographic keys and it may cooperate with
and hash chain and gives a secure Ad hoc On- other attackers. We make no assumption on the
demand Distance Vector (AODV). It splits the number of intruders, their location and their radio
message into mutable and non-mutable fields. range.
Cryptographic signatures are used to authenticate
non-mutable fields. A One-way hash chain is 3.1 Tesla
created for every route discovery process to Perring et al [23] present an efficient source
secure a hop count field, a mutable field of the authentication technique called TESLA. It uses
AODV message. This protocol requires a key pure symmetric cryptographic function and
management mechanism. In any on-demand ensures asymmetric property. TESLA divides
routing protocol, route discovery plays an time into n equal intervals. Each n is assigned
important role. So, we consider how to secure a corresponding key Kn. The sender appends
route discovery with minimal cryptographic MAC to the data generated at time interval n,
primitives, such as hash function and symmetric using the secret key Kn. The receiver simply
encryption for wireless sensor networks. buffers the packets. After some d time slot, the
The rest of the paper is organized as follows; sender discloses the corresponding key seed Sn.
section 3 describes the network model and Using a public one way function F, the key Kn
system assumption used in the implementation. can be derived from Sn.
Section 4 describes how to secure route To create a key seed chain the sender
discovery of MAODV. Simulation results are chooses a terminal seed St and generates St-1
given in section 5 and section 6 concludes the using a one-way function F. Thus, F (St) St-1,
paper and suggests future work. F(St-1) St-2, F(St-2) St-3, F(St-3) . S0. For
key generation the key seed chain is used in the
3 NETWORK MODEL AND SYSTEM reverse order (i.e. it starts from S0). Therefore,
ASSUMPTION F (Sn) Kn . Once the user receives a TESLA
seed Sn , he guarantees the authenticity by
We assume that a network has a central base checking F(Sn ) Sn-1. The authenticating key Kn
station and sensor nodes are densely deployed. is generated using the one way hash function F.

UbiCC Journal, Volume 4, Number 3, August 2009 776


In our approach, TESLA is used in creating The given group certificate and node
group membership and node membership certificate are the elements of the authentication
certificate, which supports source authentication frame work;
in the MAODV secure route discovery. 4.1 Group Certificate
Every group member has the privilege to
4 SECURE MAODV initiate a route request to join a multicast tree. It
has a Group Membership Certificate, which
The Multicast Ad-hoc On Demand Distance justifies that it belongs to a particular multicast
Vector (MAODV) routing protocol [27] group. To reduce the communication overhead
constructs a shared multicast tree, which
connects the group members. In addition, the Group Group Life SIGN Group Public
MAODV helps the group members to get ID Private Key Time Key(.)
connected to the multicast tree through the 2 Bytes 2 Bytes 2 Byte 2 Byte
forwarding nodes. Members can join or leave the
group at any time. One of the group members is Figure 1: Group Membership Certificate
the Group Leader. It initiates a route request at
first and initializes the group sequence to one. in WSNs, we assume that a node can belong to
The Group Leader is responsible for maintaining only one group. The format of the group
the multicast sequence number. At regular membership certificate [28] is shown in Fig. 1. It
intervals it generates Group Hello (GH) contains the group ID, Group Private Key,
messages across the network to maintain the Lifetime of the certificate and the Group Public
multicast sequence number. The multicast Key used for signing the certificate.
sequence number is used to check the freshness
of the multicast group. 4.2 Node Certificate
The Wireless Sensor Network [2] is All the sensor nodes, whether a group
deployed in a hostile environment. The member or non-group member in the network
communication and deployment mode of WSNs have a certificate called the node certificate. This
makes it insecure. Sensor networks consist of certificate is issued by a trusted certificate
resource constrained devices, implementing a authority (CA). In WSNs, the base station acts as
security mechanism. Thus, our proposed a certification authority. The format of the node
authentication framework has the following certificate is shown in Fig 2. Only nodes
objectives possessing node certificates are eligible to
An unauthorized node should not be able to participate in routing. The base station
participate in the MAODV routing. pre-distributes the node certificate off line to all
Non-Group member node should not be able the sensor nodes in the network, before
to act as a group member. deployment. All the nodes know the public key
Non-tree node should not be able to of the Certificate Authority (CA). Thus, there is
impersonate a tree node. no need to contact the CA for verification of a
To achieve the above goals, this work node.
proposes an authentication mechanism in which
the sensor nodes and base station need to have Node Node Life SIGN Nodes

necessary credentials to participate in the ID Private Key Time (.)


Public Key

MAODV protocol. All the four types of nodes 2 Bytes 2 Bytes 2 Byte 2 Byte
are used in the implementation. The nodes can be
Figure 2: Node Membership Certificate
A Group Member
4.3 Group Leader
A Group Leader from one among the Group
The Group Leader broadcasts the Group
Members. Hello (GH) packets to all the valid group
A Multicast Tree Member members. The previous credentials of the group
A Non-tree Member leader are used to authenticate the GH messages.

UbiCC Journal, Volume 4, Number 3, August 2009 777


Join Request ID destination Group Source Node Start SIGN source private
Req ID group Membership Cert Certificate Time (ts) key (.)

Figure 3: Route Request Packet

Route Request ID ID Group Destination SIGN destination E Source private key


Repl ID group source sequence Node certificate private key () ( Dest ID, Tree
y node number key)

Figure 4: Route Reply Packet

Request In Hop Out Hop Life time


ID Node Node
k
Figure 5: Request table

4.4 Multicast tree Member


When a non-member joins the Multicast
tree, a shared tree is constructed if it is needed. J2
The Group Leader is the root of the Multicast 1

tree. It generates and securely distributes the tree


key to the entire Multicast tree members. A node J1
that has the valid tree key will reply the route
request. i
4.5 Secure Route Discovery
Secure route discovery has two stages. At
first, a source node broadcasts the route request Network link
and then it receives a route reply. The format of
the RREQ Message is given in Fig 3. RREQ has Reply route
seven fields;
RREQ: (Join Req , Request ID, ID destination group , Multicast tree node
Group Cert, Source Node Certificate, Start
Time, SIGN source private key (.) )
The request ID is used to check the freshness of Forwarding node
the request. The entire packet is signed using the
source private key. A node initiates the Route Node wanting to join the Multicast
Request Message [RREQ] in two situations; tree node
Case i - If a group member i wants to join a
multicast group, then it prepares the RREQ Figure 6: Secure Route Discovery in MAODV
packet and broadcasts it to all its one hop
neighbors. If the receiver is a multicast tree node, maintain a dynamic request table. The format of
then it applies validation of the source algorithm the request table is shown in Fig 5.
and sends a reply to the sender by checking its
routing table. The routing table contains the Case ii - if a group member i wants to send
control information of the destination. If the data to a destination group by creating the
receiver is a non-multicast tree node, then it multicast tree with valid group members of that
forwards the request by replacing the outer session, then it prepares the RREQ and replaces
signature with its own signature and forwards the the Join Request field by creating a multicast tree
request to the neighbors. The nodes of the tree field and the rest of the process is the same as in
Fig 7.

UbiCC Journal, Volume 4, Number 3, August 2009 778


RREQ : (Create Tree Request, Request ID, ID senders ID as in-hop ID in its request table. The
destination group , Group Cert, Source Node Certificate, node j1 appends its certificate to the RREQ and
Start Time, SIGN source private key (.) ). broadcasts it. Suppose a forwarding node j2gets
If a node i does not receive a RREP message the RREQ packet from node j1then it checks
then it rebroadcasts the request m times. Then, the outer signature, inner signature and
the node i declares itself as the group leader by updates the request table. The node j2 adds its
sending Group Hello Packets to all the group certificate by replacing the certificate of node
members. j1 and broadcasts the RREQ. If a multicast tree
member k receives the RREQ then it removes
4.6 Working of Secure Route Discovery the outer and inner signature. The node k
If a node i wants to join a multicast tree, checks the routing table and sends the RREP
the node will broadcast the route request packet packet. The format of the RREP is shown in
to all its one hop neighbors. The non-group Fig 4. The working of secure route discovery is
member forwarding the RREQ is the forwarding given in Fig 7.
node. The RREQ has two signatures. The
signature of the source node certificate is called
the inner signature. The entire RREQ packet is i * : [ RREQ ] ; // node i broadcasts RREQ.
signed by the forwarding node and it is called the j 1 : [ RREQ ] ; // node j receives the
outer signature. RREQ.
// it checks inner signature and appends
Algorithm: Validation of the Source Node // the forwarding Node Certificate.
// tr denotes the time when the RREQ is received j1 * : [ RREQ , Node Certificate of j1 ];
// ts denotes the issue time of the RREQ j2 : [ RREQ , Node Certificate of j1 ];
// D- propagation delay // validates & replaces certificate of node
1. Assume node k receives a RREQ at tr . j1.
2. if ts +D<tr then j2 * : [ RREQ , Node Certificate of j2 ];
3. Discard the RREQ k : Executes validation of the source node
4. else algorithm and sends RREP packet.
k j2 : [ RREP ]
5. if ( forwarding node is a trusted node) then j2 : [ RREP ];increments the hop count;
6. Buffer the RREQ packet and store j2 j1 : [ RREP , Node Certificate j2 ] ;
forward node ID in request table. j1 : [ RREP , Node Certificate j1 ] ;
7. Wait (for group authenticating key to be j1 i : [ RREP , Node Certificate ji ] ;
disclosed.) i : // validates inner signature. Checks the
8. if (source node i has a valid group //group sequence no. updates multicast
member certificate) then // tree table, and request table
9. Send the RREP packet with the following
details; Figure 7: RREQ initiated by node i and its
10. Append the tree key and reply node ID subsequent actions to establish a secure route.
11. Encrypt with the source node public key. 5 NETWORK PERFORMANCE
12. else
13. Discard the RREQ The network simulator NS-2
14. end if (http://www.isi.edu/nanam/ns/) has been used in
15. else evaluating the performance of the secure route
16. Report the unauthorized node to CA. discovery. Figure 8 shows the topology of the
simulation. Table 1 gives the simulation
17. endif parameters and Table 2 gives the default
18. endif MAODV parameters.
The simulated scenario consists of a network
If a forwarding node j1 gets the RREQ, with 30 nodes and two multicast groups A and B
then its checks the inner signature and stores the with 10 members each. All the group members

UbiCC Journal, Volume 4, Number 3, August 2009 779


join the multicast group at the beginning of the and these values are compared with the MAODV
simulation leading to the construction of the values [25].

Table 2: Default MAODV Parameters

Parameters Values
Number of Allowed Hello Loss 3
Group Hello Interval 5 secs
Hello Interval 1 secs
Lifetime of Route Table Entries 3 secs
Max. No. of RREQ Retransmissions 3
Max Time to Wait for a RREP 5 secs

5.1 Performance Metrics


The packet delivery ratio, packet overhead,
average delay and average energy in the network
are used as the metrics for evaluating the
performance.
a) Packet Delivery Ratio (PDR) is defined as the
ratio of the total number of data packets received
by the multicast group members to the product of
Figure 8 : Topology of the Simulated Wireless the number of data packets sent and the number
Sensor network of group members.
The analysis shows that PDR is 40% high
multicast tree. The field ID is used in identifying for secure MAODV, because RREQ message
the nodes. The sensor with ID zero is the base collision takes place while broadcasting. The
station, which is responsible for the distribution certificate of the sender is appended along with
of certificates. The base station plays the role of the message. So, the packet size increases.
the central TESLA certificate authority (CA). b) Average delay in the network: In the
Table 2 lists the default values of the MAODV simulated environment group A is distributed
parameters used in the simulation. The node and and group B is densely packed. So, the average
group certificates in our simulation use a 512 bit delay in the network is 15 % more for group A
public key and 16-byte signature as in [15]. when compared to group B. In real time scenario
the WSNs are densely packed and hence cause
Table 1: Simulation Environment Parameters less delay.

Parameters Values
Number of Nodes 30 1

Pause Time 50 sec 0.95 S- MAODV


Simulation Grid Size 500mX500m 0.9 MAODV
Radio Transmission Range 50 m 0.85
Packet_Send x 103

Transmitting power 0.175 mW 0.8

V Receiving power 0.145 mW 0.75

Sensing power 0.00000175 mW 0.7

V Idle power 0.0 mW 0.65

0.6
Initial energy 5.0 Joule
0.55

0.5
Each simulation was run for 100 seconds. 0.45
After 30 seconds, one group member (node 6) 50 100 150 200 250

joins the group securely. For each set of Time (ms)

experiments, 50 runs were performed. The Figure 8: Packet delivery ratio of Secure
average values are used in plotting the graphs MAODV and MAODV.

UbiCC Journal, Volume 4, Number 3, August 2009 780


1.2

500 1.1

1
450 S- MAODV group A group B
0.9
400 MAODV

3
0.8

Average Energy x 10
350 0.7
Average Energy

300 0.6

250 0.5

0.4
200
0.3
150
0.2
100
0.1

50 0
50 100 150 200 250
0
Tim e (m s)
50 100 150 200 250
Time (ms)

Figure 11: Average delay for member join in


Figure 9: Energy analysis of Secure MAODV group A and B.
and MAODV.
6 CONCLUSION
c) Energy Analysis: The average energy of the
network is calculated as the sum of the energy of In this work, we have reduced the group
the sensor nodes divided by the number of nodes. membership and node membership certificate.
The simulation shows that the average energy We have introduced a request table, which stores
drops to 20% with an increase of 30 numbers of the next hop and previous hop IDs. We have also
nodes. reduced authentication overhead. All these
features are well-suited for low-power devices
such as sensor networks.
450
S- MAODV
In this work, we have applied a TESLA-
400 MAODV
based certificate to secure MAODV for low
350
power Wireless sensor networks. It is proven that
we can apply Secure MAODV, which has a
300
10 3 negligible impact on MAODV performance
250
gy x
Ener during the normal operation of the protocol.
200
age
Aver

150 Future Enhancement


100 The simulation study shows that the
50
TESLA-based Certificate with MAODV is
0 possible with wireless sensor networks. Further,
50 100 150 200 250
if we create a cluster-based multicast, the
Time (ms) performance will greatly improve. The tradeoff
between delay and overhead is a critical issue for
further study.
Figure 10: Average delay of Secure MAODV
and MAODV. REFERENCES

The disadvantage is that, it requires clock [1] I. Akyildiz W. Su, Y. Sankarasubramaniam


synchronization and the existence of a and E. Cayirci: A Survey on Sensor
private/public key pair between base station and Networks, IEEE Communications
sensor nodes. To authenticate the TESLA key for Magazine, Vol. 40, No. 8, pp. 102-116,
each node, a one-way hash chain has to be (2002).
maintained. TESLA keys are distributed to the [2] I. Akyildiz and I. Kasimoglu: Wireless
participating nodes via the offline key sensor and actor networks: research
distribution center.

UbiCC Journal, Volume 4, Number 3, August 2009 781


challenges Ad Hoc Networks , Vol 2(4): [14] Y.-C. Hu, D. B. Johnson, and A. Perrig,
pp. 351-367, (2004). SEAD: Secure efficient distance vector
[3] Chenyang Lu, Guoliang Xing, Octav routing for mobile wireless ad hoc
Chipara, Chien-Liang Fok, Sangeeta networks, in Proceedings of the 4th IEEE
Bhattacharya : A Spatiotemporal Query Workshop on Mobile Computing Systems
Service for Mobile Users in Sensor and Applications (WMCSA 2002), pp. 3
Networks, pp. 381-390, 25th IEEE 13(2002).
International Conference on Distributed [15] Hu, Y., Perrig, A., and Johnson, D. B. 2005.
Computing Systems (ICDCS'05), pp. 381- Ariadne: a secure on-demand routing
390(2005) protocol for ad hoc networks. Wirel. Netw.
[4] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, Vol 11, No 1-2 pp 21-38 (2005).
V., and Culler, D. E: SPINS: security [16] S. Basagni, K. Herrin, E. Rosti, and D.
protocols for sensor networks. Wirel. Netw. Bruschi, Secure pebblenets, in ACM
8, 5 (Sep. 2002), pp 521-534 (2002). International Symposium on Mobile Ad Hoc
[5] Lidong Zhou; Haas, Z.J: Securing ad hoc Networking and Computing, pp. 156
networks, Network, IEEE, Vol 13, Issue 6, 163(2001)
pp 24 30(1999). [17] P. Papadimitratos and Z. Haas, Secure
[6] F. Stajano and R. J. Anderson, The routing for mobile ad hoc networks, in SCS
resurrecting duckling: Security issues for ad- Communication Networks and Distributed
hoc wireless networks, in Seventh Systems Modeling and Simulation
International Security Protocols Workshop, Conference (CNDS 2002), (2002).
Vol 19,No 21, pp. 172194 (1999). [18] Sanzgiri, K., Dahill, B., Levine, B. N.,
[7] Contiki Operating System, Shields, C., and Belding-Royer, E. M.: A
http://www.sics.se/~adam/contiki/, (2005). Secure Routing Protocol for Ad Hoc
[8] A. Dunkels, T. Voigt and J. Alonso. Making Networks. In Proceedings of the 10th IEEE
TCP/IP Viable for Wireless Sensor international Conference on Network
Networks. In Proceedings of the First Protocols, pp 78-89(2002).
European Workshop on Wireless Sensor [19] S. Buchegger and J.-Y. L. Boudec, Nodes
Networks (EWSN'04), work-in-progress bearing grudges: Towards routing security,
session, Berlin, Germany, pp. (2004). fairness, and robustness in mobile ad hoc
[9] Zapata, M. G.: Secure ad hoc on-demand networks, in Proceedings of the Tenth
distance vector routing. SIGMOBILE Mob. Euromicro Workshop on Parallel,
Comput. Commun. Rev. 6, 3 pp 106-107 Distributed and Network-based Processing.
(Jun. 2002). Canary Islands, Spain: IEEE Computer
[10] H. Luo, P. Zefros, J. Kong, S. Lu, and L. Society, pp. 403410(2002)
Zhang, Self-securing ad hoc wireless [20] Zhu Yufang, Kunz T.: MAODV
networks, in Seventh IEEE Symposium on Implementation for NS-2.26 (SCE-04-01).
Computers and Communications (ISCC Ottawa:Department of Systems and
02), (2002). Computing Engineering . Carleton
[11] S. Bhattacharyya, "An Overview of Source- University, (2004).
Specific Multicast", RFC3569, (2003). [21] NS-2: http://www.isi.edu/nsnam/ns/
[12] B. Dahill, B. N. Levine, E. Royer, and C. [22] SensorSim: NRL's Sensor Network
Shields, A secure routing protocol for ad- Extension to NS-2, Naval Research
hoc networks, Electrical Engineering and Laboratory.
Computer Science, University of Michigan, [23] A. Perrig, R. Canetti, J. Tygar, and D.
Tech. Rep. UM-CS-2001-037, August 2001. Song, The TESLA Broadcast
[13] J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, Authentication Protocol, RSA CryptoBytes,
and S. Lu, Adaptive security for multi-layer 5, 2002.
ad-hoc networks, Special Issue of Wireless [24] YANG Mingxi, LI Layuan, FANG Yiwei.
Communications and Mobile Computing, Securing Multicast Route Discovery for
Wiley Interscience Press,( 2002). Mobile Ad Hoc Networks, Journal of
natural science,Vol.12, 189-192(2007).

UbiCC Journal, Volume 4, Number 3, August 2009 782


[25] Jorge S Silva, Tiago Camilo, Pedro Pinto,
Ricardo Ruivo, Andr Rodrigues, Filipa
Gaudncio, Fernando Boavida. Multicast
and IP Multicast support in Wireless Sensor
Networks, JOURNAL OF NETWORKS,
VOL. 3, NO. 3, pp. 19-26(2008).
[26] Camilo, T., S Silva, J.,Boavida, F., IPv6
in Wireless Sensor Networks, a New
Challenges, First International Workshop
on Convergence of Heterogeneous Wireless
Networks, Julho 2005.
[27] E. M. Royer and C. E. Perkins. Multicast
operation of the ad-hoc on-demand distance
vector routing protocol. In Fifth Annual
ACM/IEEE International Conference on
Mobile Computing and Networking,
Mobicom 99, pp. 207218 (1999).
[28] Bohge, M. and Trappe, W.: An
authentication framework for hierarchical ad
hoc sensor networks. In Proceedings of the
2nd ACM Workshop on Wireless Security,
pp ,79 87(2003).
[29] David A. Maltz, Josh Broch, Jorjeta
Jetcheva, and David B. Johnson. The Effects
of On-Demand Behavior in Routing
Protocols for Multi-Hop Wireless Ad Hoc
Networks. IEEE Journal on Selected Areas
in Communications, Vol. 17(8), pp. 1439
1453(1999).
[30] R. Szewczyk, E. Osterweil, J. Polastre, M.
Hamilton, A. Mainwaring, and D. Estrin.
Habitat monitoring with sensor networks.
Communications of the ACM, Special Issue:
Wireless sensor networks, Vol. 47(6), pp.
3440(2004).
[31] Lorincz, K., Malan, D. J., Fulford-Jones, T.
R., Nawoj, A., Clavel, A., Shnayder, V.,
Mainland, G., Welsh, M., and Moulton, S. :
Sensor Networks for Emergency Response:
Challenges and Opportunities. IEEE
Pervasive Computing,Vol 3, No 4, pp 16-
23(2004).

UbiCC Journal, Volume 4, Number 3, August 2009 783

S-ar putea să vă placă și