Secure and fault tolerant data dissemination in mobile wireless sensor network (original) (raw)
Related papers
Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network
International Journal of Electrical and Computer Engineering (IJECE), 2018
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process. Keyword: HMAC Pair-wise key establishment Security WSN 1. INTRODUCTION A WSN is formed with sensor nodes (SNs) using ad-hoc technology. Due to ad hoc technology, SNs are self-configured and operates the data transfer without any access points as well the computing takes place in a distributed manner. Traditionally, there exist many communication protocols such as Direct Communication (DC), Minimum transmission energy (MTE) protocol like hop-by-hop. The problem found in DC is the remote node from the sink die soon and is reserves in MTE, where nearby node die soon. A hierarchal routing mechanism, where the entire network is divided into groups called clusters, and a local sink in each cluster is elected which is called as a cluster head (CH) or aggregator node. In initial cluster-based protocols, the cluster was static, which provides inconsistency of energy use because of the successive election of the same node as CH. The limitation of the static cluster is overcome in a state of artwork LEACH [1], wherein every communication cycle a new set of the cluster is formed and CH election. Since LEACH, enormous efforts are made by various other researchers towards developing new protocols for routing or communication, the collective information can be found in [2]. The WSNs having exploding usage into different critical applications since its conceptualization on the timeline, and the few to name includes (a) smart farming, (b) structural health monitoring, (c) fire detection in forest, (d) traffic congestion, etc. till Internet of Things (IoT) application so it is not just limited to military applications rather it has become a lifeline. The threats of attacks on this network are distinct philosophical to any network
Journal 4 Research - J4R Journal, 2018
Secure information transmission is a basic issue for Wireless Sensor Networks (WSNs). Clustering is a practical approach to improve the execution of WSNs. In this paper we study about the safe and efficient data transmission in Cluster based Wireless Sensor Networks (CWSNs). Here two Secure and Efficient data Transmission (SET) protocols are proposed namely (SET-IBS) and (SET-IBOOS) by using digital signature schemes. The SET-IBS security depends on the hardness of the discrete logarithm issues. In this paper the feasibility of the SET-IBS and SET-IBOOS protocols is shown with respect to the security requirements and analysis against various attacks. The calculations and simulations are given to represent the effectiveness of the proposed execution over the current secure protocols for CWSNs, as far as security overhead and energy consumption is considered. A WSN system consist of distributed devices using wireless sensor nodes to monitor the physical or the environmental conditions, such as sound, temperature, air, vibration and motion. The individual nodes in WSN are capable of sensing their environment, processing the information locally and sending data to one or more collection points in WSN. In this process efficient data transmission is one of the most important issues in WSN. Many WSN are deployed in extreme physical environments for applications such as military domains, natural or artificial disasters or certain rescue operations with trustless surroundings. Secure and efficient data transmission is thus especially necessary and is demanded in many such practical WSNs. Keywords: Cluster-based Wireless Sensor Networks (CWSNs), Secure and Efficient data Transmission (SET), Identity-Based digital Signature (IBS), Identity-Based Online/Offline digital Signature (IBOOS) _______________________________________________________________________________________________________
Secure and Energy-Efficient Data Collection in Wireless Sensor Networks
International Journal of Distributed Sensor Networks, 2013
Wireless sensor networks (WSNs) are a kind of multihop and self-organizing networks formed by the way of wireless communication and composed by a large number of lowcost microsensor nodes deployed in the monitoring area. The sensor nodes cooperate to perceive and acquire the process and transmit the perceived object information in the network covering within the geographical area and finally send the information to the sink. In the recent decade, with the rapid development of various kinds of key technology in WSNs, they are widely applied to many especial environments, such as, military defense, environment detection, biological health, and disaster-relief work. Due to the limited computing ability, battery capacity, and storage capacity of sensor nodes, energy-efficient data collection became a nonnegligible research issue in WSNs. Also the open architecture in receiving data and transmitting data of WSNs is vulnerable to various security attacks during the data collection process. These two fundamental issues motivate us to have this special issue addressing the recent advances which are mentioned in Table 1 on security and energy-efficient data collection in WSNs. In response to this call for papers, we have received a total of 36 high-quality submissions, and 13 papers have been selected for publication after a rigorous review process due to the space limit. The papers in this special issue are divided into three thematic groups as follows. The first set of the seven papers emphasizes the security technology with a series of key agreement protocol, encryption, authentication, and trust scheme to solve the special security issues. According to the current researches in
Cluster Wireless Sensor Networks for Safe and Efficient Transmission
2015
Wireless Sensor Networks is one of the most rapidly growing and emerging concept in the scientific domain. It is growing because of its low cost and wide applications. WSN is one of communication tools used in many areas such as in civilians and militaries. WSN is a wireless network consisting of a web of sensor nodes whose basic feature is to sense, compute, communicate and power. Storage, bandwidth, communication capability, limited energy is its main resource constraints. Secure data transmission is an important issue for WSNs. Clustering is a way of enhancing the system performance of WSNs. In this paper, by using the concept of IBS and IBOOS scheme, we study SET protocols for CWSNs, called SET-IBS and SET-IBOOS. SET-IBS depends on the Diffie-Hellman problem. SET-IBOOS relies on discrete logarithm problem and the overhead computation for protocol security is reduced, which is crucial for WSNs. Our survey is based on various aspects of wireless sensor networks, discussing various types of WSNs and their applications, different distributed clustering algorithms used in WSNs and the reliability of routing protocols.
Data dissemination is the process by which queries of data are routed in the sensor network. The data collection by sensor nodes has to be communicated to the base station or to any other node interested in the data. Data discovery and dissemination protocol for WSNs is responsible for updating configuration parameters of and distributing management commands, to, the sensor nodes. All existing data discovery and dissemination protocol suffer from two drawbacks. First, they are based on the centralized approach; in centralized approach only the base station can distribute data items, such an approach is not suitable for emergent multi-owner-multiuser wireless sensor networks. Second, those protocols were not designed with security in mind and hence adversaries can easily launch attacks to harm the network. This paper proposes the first secure and distributed data discovery and dissemination protocol called DiDrip. It allows the network owners to authorize multiple network users with different privileges to simultaneously and directly disseminate data items in to the sensor nodes based on the design objective we propose DiDrip. This is the first distributed data discovery and dissemination protocol, which allows network owners and authorized users to disseminate data items into WSNs without relying on the base station. Here implements the multi hop data transmission in the network while transmitting data prioritization given to the data. There are three types of data packets low, medium and high by using dynamic algorithm and improves the quality of service.
A secure and energy saving protocol for wireless sensor networks
Bulletin of Electrical Engineering and Informatics, 2021
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery lifetime and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network lifetime and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography's concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goalsauthentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network lifetime compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Secured Data Transmission in Wireless Sensor Networks
Security is one crucial requirement in Wireless Sensor network. To overcome this issue, security protocol called Didrip was developed for flat based network which allows for distributed data discovery and dissemination. But in terms of clustering approach which is most efficient one in terms of energy conservation, there are lot of security vulnerability i.e checking the cluster head for vulnerability to the network. In addition sensor nodes joining the cluster head during user joining phase is also not secure as the nodes can be vulnerable too. These two are most vulnerable security issues which are not addressed in existing security protocol of WSN including the one mentioned which is Didrip. The above said problems for clustering approach in WSN are overcome with a Cluster-based Certificate Authority(CA) scheme which is combination of voting and Non-voting schemes towards detecting malicious node. We also use digital signature to sign all the nodes present in the network. These are simulated using standard network simulator ns-2 and results analysed in terms of packet delivery, network life time and energy efficiency.
Secure Energy Efficient Data Transmission over WSNs
2017
As wireless sensor network proposes a new low-energy adaptive clustering hierarchy (LEACH) protocol for wireless sensor networks that use a distributed cluster formation based on affinity propagation (AP). By using Distributed cluster formation generate Cluster. The proposed LEACH protocol (LEACH-AP) enables a fully distributed control and resolves practical limitations of conventional LEACH-based protocols by simplifying network functionalities. The results show that the proposed protocol outperforms existing LEACH-based protocols considerably in terms of network lifetime, energy dissipation rate, and total number of transferred bits. The main idea is to formulate the WSN setup into median-based clustering, which guarantees the center of a cluster to be a member of the cluster, and to learn the optimal cluster number adaptively according to network topology. In this system we are using K-means algorithm for cluster formation. Wireless sensor networks (WSNs) are subject to energy ma...
Wireless Sensor Networks (WSN) are emerging asboth an important new tier in the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geographic area for some specific purposes like target tracking, surveillance, environmental monitoring etc.