| Literature DB >> 22163854 |
Islam T Almalkawi1, Manel Guerrero Zapata, Jamal N Al-Karaki.
Abstract
The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.Entities:
Keywords: WMSN; WSN; cluster-based routing; multimedia delivery; multipath; routing protocol; security; wireless multimedia sensor networks
Mesh:
Year: 2011 PMID: 22163854 PMCID: PMC3231315 DOI: 10.3390/s110404401
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Single-tier Clustered Architecture.
Figure 2.A Simple Example of Cluster-Based Multipath Network.
Figure 3.Pseudo-code of the Main Part of the Routing Protocol.
Figure 4.Examples of Path loop and Path Cycle.
Figure 5.A Simple Example of Two-level Scheduling.
Figure 6.A Cluster Time Intervals for Scheduling Process.
Security Notations used in Security Formulas.
| Symmetric key shared between node i and j. | |
| Message authentication code of M using key K. | |
| Encryption of M using key K. | |
| Identification number of node i. | |
| Concatenation of M1 and M2 |
Simulation Parameters.
| 1000s | |
| 500x500m2 | |
| 50 – 200 | |
| LL | |
| IEEE802.11 | |
| Queue/DropTail/PriQueue | |
| 10 | |
| Antenna/OmniAntenna | |
| Phy/WirelessPhy | |
| Channel/WirelessChannel | |
| EnergyModel | |
| 2MB |
Figure 7.End-to-End Delay of Our Protocol Compared with Other Protocols.
Figure 8.Throughput of Our Protocol Compared with Other Protocols.
Figure 9.PDR of Our Protocol Compared with Other Protocols.
Figure 10.Energy Consumption of Our Protocol Compared with Other Protocols.
Figure 11.Density of Cluster Heads vs Network Size.