Skip to main content
Top

2019 | OriginalPaper | Chapter

Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks

Authors : Tanmoy Maitra, Subhabrata Barman, Debasis Giri

Published in: Information Technology and Applied Mathematics

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To get inexpensive resolution of real-world problems such as weather forecasting, measurement of underground water label, traffic monitoring, activity of enemies, animals counting in forest, and so on, wireless sensor networks (WSNs) are widely used. Energy-efficient routing protocol is needed to provide the longevity of network lifetime by reducing power consumption of sensor nodes as well as whole networks. Besides, authenticity of sensor nodes and privacy of sensed data are needed in routing protocol for WSNs to provide secure communications, i.e., sensor-to-sensor as well as sensors-to-base station. Clustering technique provides an energy-efficient topology control approach. A minimum connected dominating set (MCDS) can be discovered by applying clustering technique which reduces power consumption in inter-cluster network routing. Cluster head and route selection can be used to provide an energy-efficient outer-cluster routing in WSNs. Identity-based scheme can be used to provide a secure secret message passing mechanism in WSNs. This paper has ng in wireless sensor network framework (E2SDRSNF) which consists of three proposed components. The proposed Algorithm 1 creates a MCDS which is used to build virtual backbone for energy-efficient inter-cluster routing. Data flows through the discovered virtual backbone nodes to base station via cluster heads which is discovered by applying proposed Algorithm 2. The proposed signcryption technique is used for secure communication in WSNs. The analysis of the proposed framework shows that it can save 2720 nJ/bit/m\(^2\) energy than LEACH protocol for one communication (transmission/receiving) along with the security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bagchi, A.: Sparse power-efficient topologies for wireless ad hoc sensor networks. In: IEEE International Symposium on Parallel Distributed Processing (IPDPS), pp. 1–10, April 2010 Bagchi, A.: Sparse power-efficient topologies for wireless ad hoc sensor networks. In: IEEE International Symposium on Parallel Distributed Processing (IPDPS), pp. 1–10, April 2010
2.
go back to reference Maitra, T., Roy, S.: A comparative study on popular MAC protocols for mixed wireless sensor networks: from implementation viewpoint. Comput. Sci. Rev. 22(C), 107–134 (2016)MathSciNetCrossRef Maitra, T., Roy, S.: A comparative study on popular MAC protocols for mixed wireless sensor networks: from implementation viewpoint. Comput. Sci. Rev. 22(C), 107–134 (2016)MathSciNetCrossRef
3.
go back to reference Jia, L., Rajaraman, R., Suel, T.: An efficient distributed algorithm for constructing small dominating sets. Distrib. Comput. 15(4), 193–205 (2002)CrossRef Jia, L., Rajaraman, R., Suel, T.: An efficient distributed algorithm for constructing small dominating sets. Distrib. Comput. 15(4), 193–205 (2002)CrossRef
4.
go back to reference Luby, M.: A simple parallel algorithm for the maximal independent set problem. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp. 1–10, New York, NY, USA (1985) Luby, M.: A simple parallel algorithm for the maximal independent set problem. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp. 1–10, New York, NY, USA (1985)
5.
go back to reference Parthiban, N., Rajasingh, I., Rajan, R.S.: Minimum connected dominating set for certain circulant networks. Procedia Comput. Sci. 57(C), 587–591 (2015)CrossRef Parthiban, N., Rajasingh, I., Rajan, R.S.: Minimum connected dominating set for certain circulant networks. Procedia Comput. Sci. 57(C), 587–591 (2015)CrossRef
6.
go back to reference Gao, J., Guibas, L., Hershberger, J., Zhang, L., Zhu, A.: Discrete mobile centers. In: Proceedings of the Seventeenth Annual Symposium on Computational Geometry, SCG ’01, pp. 188–196, New York, NY, USA (2001) Gao, J., Guibas, L., Hershberger, J., Zhang, L., Zhu, A.: Discrete mobile centers. In: Proceedings of the Seventeenth Annual Symposium on Computational Geometry, SCG ’01, pp. 188–196, New York, NY, USA (2001)
7.
go back to reference Guha, S., Khuller, S.: Approximation algorithms for connected dominating sets. Algorithmica 20(4), 374–387 (1998)MathSciNetCrossRef Guha, S., Khuller, S.: Approximation algorithms for connected dominating sets. Algorithmica 20(4), 374–387 (1998)MathSciNetCrossRef
8.
go back to reference Ortiz, C., Villanueva, M.: Maximal independent sets in caterpillar graphs. Discret. Appl. Math. 160(3), 259–266 (2012)MathSciNetCrossRef Ortiz, C., Villanueva, M.: Maximal independent sets in caterpillar graphs. Discret. Appl. Math. 160(3), 259–266 (2012)MathSciNetCrossRef
9.
go back to reference Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, Washington, DC, USA (2000) Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, Washington, DC, USA (2000)
10.
go back to reference Lindsey, S., Raghavendra, C.S.: PEGASIS: power-efficient gathering in sensor information systems. In: Proceedings of the IEEE Aerospace Conference, vol. 3 (2002) Lindsey, S., Raghavendra, C.S.: PEGASIS: power-efficient gathering in sensor information systems. In: Proceedings of the IEEE Aerospace Conference, vol. 3 (2002)
11.
go back to reference Kalpakis, K., Dasgupta, K., Namjoshi, P.: Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks. Comput. Netw. 42(6), 697–716 (2003)CrossRef Kalpakis, K., Dasgupta, K., Namjoshi, P.: Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks. Comput. Netw. 42(6), 697–716 (2003)CrossRef
12.
go back to reference Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) << cost(signature) + cost(encryption), pp. 165–179. Springer, Berlin, Heidelberg (1997)CrossRef Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) << cost(signature) + cost(encryption), pp. 165–179. Springer, Berlin, Heidelberg (1997)CrossRef
13.
go back to reference Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing, pp. 213–229. Springer, Berlin, Heidelberg (2001)CrossRef Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing, pp. 213–229. Springer, Berlin, Heidelberg (2001)CrossRef
14.
go back to reference Chen, L., Lee, J.M.: Improved identity-based signcryption. In: Proceedings of the 8th International Conference on Theory and Practice in Public Key Cryptography, pp. 362–379. Springer (2005)CrossRef Chen, L., Lee, J.M.: Improved identity-based signcryption. In: Proceedings of the 8th International Conference on Theory and Practice in Public Key Cryptography, pp. 362–379. Springer (2005)CrossRef
15.
go back to reference Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417–426. ACM (2008) Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417–426. ACM (2008)
16.
go back to reference Selvi, S.S.D., Vivek, S.S., Rangan, P.C.: Identity Based Online/Offline Encryption and Signcryption Schemes Revisited, pp. 111–127. Springer, Berlin, Heidelberg (2011)CrossRef Selvi, S.S.D., Vivek, S.S., Rangan, P.C.: Identity Based Online/Offline Encryption and Signcryption Schemes Revisited, pp. 111–127. Springer, Berlin, Heidelberg (2011)CrossRef
17.
go back to reference Wu, T.-Y., Tsai, T.T., Tseng, Y.M.: Revocable ID-based signature scheme with batch verifications. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 49–54 (2012) Wu, T.-Y., Tsai, T.T., Tseng, Y.M.: Revocable ID-based signature scheme with batch verifications. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 49–54 (2012)
18.
go back to reference Lee, W., Seo, J.W., Lee, P.J.: Identity-Based Signcryption from Identity-Based Cryptography, pp. 70–83. Springer, Berlin, Heidelberg (2012)CrossRef Lee, W., Seo, J.W., Lee, P.J.: Identity-Based Signcryption from Identity-Based Cryptography, pp. 70–83. Springer, Berlin, Heidelberg (2012)CrossRef
19.
go back to reference Halgamuge, M.N., Zukerman, M., Ramamohanarao, K., Vu, H.L.: An estimation of sensor energy consumption. Prog. Electromagnet. Res. B 12, 259–295 (2009)CrossRef Halgamuge, M.N., Zukerman, M., Ramamohanarao, K., Vu, H.L.: An estimation of sensor energy consumption. Prog. Electromagnet. Res. B 12, 259–295 (2009)CrossRef
20.
go back to reference Maitra, T., Giri, D.: An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst. 38(12) (2014) Maitra, T., Giri, D.: An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst. 38(12) (2014)
21.
go back to reference Giri, D., Sherratt, R.S., Maitra, T.: A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 62(3), 283–291 (2016)CrossRef Giri, D., Sherratt, R.S., Maitra, T.: A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 62(3), 283–291 (2016)CrossRef
22.
go back to reference Amin, R., Maitra, T., Giri, D., Srivastava, P.D.: Cryptanalysis and improvement of an RSA based remote user authentication scheme using smart card. Wire. Pers. Commun. 96(3), 4629–4659 (2017)CrossRef Amin, R., Maitra, T., Giri, D., Srivastava, P.D.: Cryptanalysis and improvement of an RSA based remote user authentication scheme using smart card. Wire. Pers. Commun. 96(3), 4629–4659 (2017)CrossRef
Metadata
Title
Cluster-Based Energy-Efficient Secure Routing in Wireless Sensor Networks
Authors
Tanmoy Maitra
Subhabrata Barman
Debasis Giri
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7590-2_2

Premium Partner