Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2020

23.12.2019

Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks

verfasst von: P. Brindha, A. Senthilkumar

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The development of smart cities and their fast-paced deployment leads to the creation of massive amount of data at exceptional rates. Due to the data gathering and tracking nature of wireless sensor networks (WSN), it finds applications in various domains. Presently, security is considered as an important design issue of developing multipath routing protocols in WSN. The existing routing techniques either concentrate on energy efficiency or security issues with maximum resource utilization. This paper focuses on the idea of incorporating encryption algorithms on multihop routing mechanism in WSN. Here, routing takes place by the Augmented Tree Based Routing (ATR) which is a tree-based multipath routing method. To attain higher level of security, two encryption algorithms namely lightweight encryption algorithm (LEA) and two phase hybrid cryptography algorithm (THCA) are employed based on the data dependability. The encryption algorithms are utilized based on data dependability where general data is encrypted by LEA and other confidential data are encrypted by THCA. i.e. the LEA is used to send proactive data and the important reactive data is encrypted by THCA. For routing purposes, Augmented Tree Based Routing (ATR) is used. From experimentation, it is evident that the presented method exhibits enhanced performance by means of throughput, control overhead and network lifetime even though there exist some misbehaving nodes in the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen CP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf Sci 275:314–347CrossRef Chen CP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf Sci 275:314–347CrossRef
2.
Zurück zum Zitat Pathan ASK e (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press Pathan ASK e (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press
3.
Zurück zum Zitat Yasin D, Saghar K, Younis S (2016, January) Formal modeling and verification of rumor routing protocol. In 2016 13th international Bhurban conference on applied sciences and technology (IBCAST) (pp. 318–323). IEEE Yasin D, Saghar K, Younis S (2016, January) Formal modeling and verification of rumor routing protocol. In 2016 13th international Bhurban conference on applied sciences and technology (IBCAST) (pp. 318–323). IEEE
4.
Zurück zum Zitat Ali A, Ming Y, Chakraborty S, Iram S (2017) A comprehensive survey on real-time applications of WSN. Future internet 9(4):77CrossRef Ali A, Ming Y, Chakraborty S, Iram S (2017) A comprehensive survey on real-time applications of WSN. Future internet 9(4):77CrossRef
5.
Zurück zum Zitat Pathan ASK ed. (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC Press Pathan ASK ed. (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC Press
6.
Zurück zum Zitat Hasan MZ, Al-Rizzo H, Al-Turjman F (2017) A survey on multipath routing protocols for QoS assurances in real-time wireless multimedia sensor networks. IEEE COMMUN SURV TUT19(3):1424–1456 Hasan MZ, Al-Rizzo H, Al-Turjman F (2017) A survey on multipath routing protocols for QoS assurances in real-time wireless multimedia sensor networks. IEEE COMMUN SURV TUT19(3):1424–1456
7.
Zurück zum Zitat Kohno E, Okazaki T, Takeuchi M, Ohta T, Kakuda Y, Aida M (2012) Improvement of assurance including security for wireless sensor networks using dispersed data transmission. J Comput Syst Sci 78:1703–1715MathSciNetCrossRef Kohno E, Okazaki T, Takeuchi M, Ohta T, Kakuda Y, Aida M (2012) Improvement of assurance including security for wireless sensor networks using dispersed data transmission. J Comput Syst Sci 78:1703–1715MathSciNetCrossRef
8.
Zurück zum Zitat Nasser N, Chen Y (2007) SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput Commun 30(11–12):2401–2412CrossRef Nasser N, Chen Y (2007) SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput Commun 30(11–12):2401–2412CrossRef
9.
Zurück zum Zitat Jing C, Ruiying D, Qian W, Shixiong Y (2013) Secure routing based on network coding in wireless sensor networks. In: Proceedings of the 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom); p. 5864 Jing C, Ruiying D, Qian W, Shixiong Y (2013) Secure routing based on network coding in wireless sensor networks. In: Proceedings of the 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom); p. 5864
10.
Zurück zum Zitat Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRef Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330CrossRef
11.
Zurück zum Zitat Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: a survey. IEEE COMMUN SURV TUT 10:6–28 Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: a survey. IEEE COMMUN SURV TUT 10:6–28
12.
Zurück zum Zitat Khalil I, Bagchi S, Rotaru CN, Shroff NB (2010) UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw 8:148–164CrossRef Khalil I, Bagchi S, Rotaru CN, Shroff NB (2010) UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw 8:148–164CrossRef
13.
Zurück zum Zitat Brandl M, Kellner KH, Posnicek T, Kos A, Mayerhofer C, Fabian C (2009) An efficient source initiated on-demand data forwarding scheme for wireless sensor networks. In: Proceedings of the 7th international conference on information, communications and signal processing (ICICS 2009). Macau Fisherman's Wharf, Macau. p. 17 Brandl M, Kellner KH, Posnicek T, Kos A, Mayerhofer C, Fabian C (2009) An efficient source initiated on-demand data forwarding scheme for wireless sensor networks. In: Proceedings of the 7th international conference on information, communications and signal processing (ICICS 2009). Macau Fisherman's Wharf, Macau. p. 17
14.
Zurück zum Zitat Intanagonwiwat C, Govindan R, Estrin D, (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proceedings of ACM Mobicom, Boston, MA Intanagonwiwat C, Govindan R, Estrin D, (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proceedings of ACM Mobicom, Boston, MA
15.
17.
Zurück zum Zitat Uma Maheswari P, Manickam P, Kumar KS, Maseleno A, Shankar K (2019. In Press) Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for Named Data Networking (NDN). J. Intell. Fuzzy Syst. https://doi.org/10.3233/JIFS-179086 Uma Maheswari P, Manickam P, Kumar KS, Maseleno A, Shankar K (2019. In Press) Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for Named Data Networking (NDN). J. Intell. Fuzzy Syst. https://​doi.​org/​10.​3233/​JIFS-179086
19.
Zurück zum Zitat Gupta D, Khanna A, SK L, Shankar K, Furtado V, Rodrigues JJPC (2018) Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3524 Gupta D, Khanna A, SK L, Shankar K, Furtado V, Rodrigues JJPC (2018) Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Trans Emerg Telecommun Technol. https://​doi.​org/​10.​1002/​ett.​3524
20.
Zurück zum Zitat Akkaya K, Younis M (2005) A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks Journal 3(3):325–349CrossRef Akkaya K, Younis M (2005) A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks Journal 3(3):325–349CrossRef
21.
Zurück zum Zitat A. Hac, Wireless sensor network designs, Wiley, 2003, ISBN 0-470- 86736-1 A. Hac, Wireless sensor network designs, Wiley, 2003, ISBN 0-470- 86736-1
22.
Zurück zum Zitat Perrig A, Szewczyk R, Wen V, Culler D, Tygar J, (2001) SPINS: security protocols for sensor networks, in: Proceedings of Mobile networking and computing 2001, Rome, Italy Perrig A, Szewczyk R, Wen V, Culler D, Tygar J, (2001) SPINS: security protocols for sensor networks, in: Proceedings of Mobile networking and computing 2001, Rome, Italy
23.
Zurück zum Zitat Biswas K, Muthukkumarasamy V, Sithirasenan E, Singh K (2014) A simple lightweight encryption scheme for wireless sensor networks. In: International conference on distributed computing and networking. Springer, Berlin, Heidelberg, pp 499–504CrossRef Biswas K, Muthukkumarasamy V, Sithirasenan E, Singh K (2014) A simple lightweight encryption scheme for wireless sensor networks. In: International conference on distributed computing and networking. Springer, Berlin, Heidelberg, pp 499–504CrossRef
24.
Zurück zum Zitat Rizk R, Alkady Y (2015) Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology 2(3):296–313CrossRef Rizk R, Alkady Y (2015) Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology 2(3):296–313CrossRef
Metadaten
Titel
Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks
verfasst von
P. Brindha
A. Senthilkumar
Publikationsdatum
23.12.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00813-4

Weitere Artikel der Ausgabe 4/2020

Peer-to-Peer Networking and Applications 4/2020 Zur Ausgabe