Skip to main content
Erschienen in: Wireless Networks 4/2018

01.07.2017

Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN

verfasst von: S. V. N. Santhosh Kumar, Yogesh Palanichamy

Erschienen in: Wireless Networks | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Dissemination is a service provided for Wireless Sensor Networks to update the deployed sensor nodes online by using over air programming through radio communication. Since the centralized data dissemination approaches suffer from the limitations of single point of failure, lack of scalability and inability to provide better security they have been replaced by the distributed approaches. In distributed data dissemination, the dissemination privileges are delegated by the network owners to the network users to disseminate the data items on their behalf. In the distributed data dissemination, security is a major concern. The adversaries can easily exploit the security vulnerabilities and launch various security attacks that can disrupt data dissemination process. In this paper we propose the novel Secured-Selective Design Relay Inquiry Protocol (S-SELDRIP) which provides the secured optimal routing by means of hop by hop authentication during data dissemination. The feasibility and efficiency of S-SELDRIP scheme have been analyzed by considering possible vulnerabilities during the data dissemination and the extent to which the proposed scheme is able to withstand them. The proposed protocol is tested in NS2 Mannasim framework and results have taken by measuring the various parameters through repeated simulations. Simulation results justify the viability of the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lin, K., & Levis, P. (2008). Data discovery and dissemination with dip. In Proceedings of the 2008 International conference on information processing in sensor networks (IPSN 2008), Washington, DC, USA (pp. 433–444). IEEE Computer Society. Lin, K., & Levis, P. (2008). Data discovery and dissemination with dip. In Proceedings of the 2008 International conference on information processing in sensor networks (IPSN 2008), Washington, DC, USA (pp. 433–444). IEEE Computer Society.
2.
Zurück zum Zitat De, P., Liu, Y., & Das, S. K. (2008). Remo: An energy efficient reprogramming protocol for mobile sensor networks. In Proceedings of the 6th IEEE PerCom (pp. 60–69). De, P., Liu, Y., & Das, S. K. (2008). Remo: An energy efficient reprogramming protocol for mobile sensor networks. In Proceedings of the 6th IEEE PerCom (pp. 60–69).
3.
Zurück zum Zitat Panta, R. K, Khalil, I., & Bagchi, S. (2007). Stream: Low overhead wireless reprogramming for sensor networks. In Proceedings of the 26th IEEE INFOCOM (pp. 928–936). Panta, R. K, Khalil, I., & Bagchi, S. (2007). Stream: Low overhead wireless reprogramming for sensor networks. In Proceedings of the 26th IEEE INFOCOM (pp. 928–936).
4.
Zurück zum Zitat Wang, Q., Zhu, Y., & Cheng, L. (2006). Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network, 20(3), 48–55.CrossRef Wang, Q., Zhu, Y., & Cheng, L. (2006). Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network, 20(3), 48–55.CrossRef
5.
Zurück zum Zitat Dang, T., Bulusu, N., Feng, W., & Park, S. (2009). DHV: Acode consistency maintenance protocol for multi-hop wireless sensor networks. In Proceedings of 6th European conference wireless sensor networks (pp. 327–342). Dang, T., Bulusu, N., Feng, W., & Park, S. (2009). DHV: Acode consistency maintenance protocol for multi-hop wireless sensor networks. In Proceedings of 6th European conference wireless sensor networks (pp. 327–342).
6.
Zurück zum Zitat He, D., Chan, S., Tang, S., & Guizani, M. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 26(4), 1129–1139. He, D., Chan, S., Tang, S., & Guizani, M. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 26(4), 1129–1139.
10.
Zurück zum Zitat He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638–4646.CrossRef He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638–4646.CrossRef
11.
Zurück zum Zitat Wang, L. (2004). MNP: Multihop network reprogramming service for sensor networks. In Proceedings of the 2nd ACM conference on embedded networked sensor systems, USA. Wang, L. (2004). MNP: Multihop network reprogramming service for sensor networks. In Proceedings of the 2nd ACM conference on embedded networked sensor systems, USA.
12.
Zurück zum Zitat Hyun, S., Ning, P., Liu, A., & Du, W. (2008). Seluge: Secure and DoS resistant code dissemination in wireless sensor networks. In Proceedings of 2008, ACM/IEEE IPSN (pp. 445–456). Hyun, S., Ning, P., Liu, A., & Du, W. (2008). Seluge: Secure and DoS resistant code dissemination in wireless sensor networks. In Proceedings of 2008, ACM/IEEE IPSN (pp. 445–456).
13.
Zurück zum Zitat Zhang, R., Zhang, Y. (2011) LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks. In Proceedings of international conference on distributed computing systems (pp. 497–506). IEE Computer Society. Zhang, R., Zhang, Y. (2011) LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks. In Proceedings of international conference on distributed computing systems (pp. 497–506). IEE Computer Society.
14.
Zurück zum Zitat Naik, V., Arora, A., Sinha, P., & Zhang, H. (2005). Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In Proceedings of the 26th IEEE international real-time systems symposium (RTSS). Naik, V., Arora, A., Sinha, P., & Zhang, H. (2005). Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In Proceedings of the 26th IEEE international real-time systems symposium (RTSS).
15.
Zurück zum Zitat Hui, J. W., Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on embedded networked sensor systems (Sensys 04), New York, NY, USA, ACM (pp. 81–94). Hui, J. W., Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on embedded networked sensor systems (Sensys 04), New York, NY, USA, ACM (pp. 81–94).
16.
Zurück zum Zitat Levis, P., Patel, N., Culler, D., & Shenker, S. (2004). Trickle: A self-regulating algorithm for code maintenance and propagation in wirelesssensor networks. In Proceedings of 1st conference symposium network systems design implementation (pp. 15–28). Levis, P., Patel, N., Culler, D., & Shenker, S. (2004). Trickle: A self-regulating algorithm for code maintenance and propagation in wirelesssensor networks. In Proceedings of 1st conference symposium network systems design implementation (pp. 15–28).
17.
Zurück zum Zitat Huang, L., & Setia, S. (2008). CORD: Energy-efficient reliable bulk data dissemination in sensor networks. In Proceedings of INFOCOM. Huang, L., & Setia, S. (2008). CORD: Energy-efficient reliable bulk data dissemination in sensor networks. In Proceedings of INFOCOM.
18.
Zurück zum Zitat Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Distributed fine-grained accesscontrol in wireless sensor networks. In Proceedings of IEEE IPDPS (pp. 352–362). Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Distributed fine-grained accesscontrol in wireless sensor networks. In Proceedings of IEEE IPDPS (pp. 352–362).
19.
Zurück zum Zitat He, D., Bu, J., Zhu, S., Chan, S., & Chen, C. (2011). Distributed access controlwith privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications, 10(10), 3472–3481.CrossRef He, D., Bu, J., Zhu, S., Chan, S., & Chen, C. (2011). Distributed access controlwith privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications, 10(10), 3472–3481.CrossRef
20.
Zurück zum Zitat Zhu, S. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy. Zhu, S. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy.
21.
Zurück zum Zitat Lee, H. W. (2007). A method to control the probability of attempts to verify a report in Statistical En-Route FilteringNetworks. In 15th IEEE international conference on networks. Lee, H. W. (2007). A method to control the probability of attempts to verify a report in Statistical En-Route FilteringNetworks. In 15th IEEE international conference on networks.
22.
Zurück zum Zitat Hu, Y. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks. Hu, Y. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks.
23.
Zurück zum Zitat Li, J., & Ren, J. (2014). Hop by Hop message authentication and source privacy inn WSN. IEE Transcations on Parallel and Distributed Systems, 25, 1223–1232.CrossRef Li, J., & Ren, J. (2014). Hop by Hop message authentication and source privacy inn WSN. IEE Transcations on Parallel and Distributed Systems, 25, 1223–1232.CrossRef
24.
Zurück zum Zitat Hur, J. (2011). Fine-grained data access control for distributed sensor networks. Wireless Networks, 17(5), 1235–1249.CrossRef Hur, J. (2011). Fine-grained data access control for distributed sensor networks. Wireless Networks, 17(5), 1235–1249.CrossRef
25.
Zurück zum Zitat He, D. (2015). Accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 14(1), 387–398. He, D. (2015). Accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 14(1), 387–398.
26.
Zurück zum Zitat Santhosh Kumar, S. V. N., & Yogesh, P. (2016). Privacy preserving with enhanced access control for distributed data dissemination in WSN. Asian Journal of Research in Social Sciences and Humanities, 6(12), 561–577.CrossRef Santhosh Kumar, S. V. N., & Yogesh, P. (2016). Privacy preserving with enhanced access control for distributed data dissemination in WSN. Asian Journal of Research in Social Sciences and Humanities, 6(12), 561–577.CrossRef
27.
Zurück zum Zitat Golden Julie, E., & Tamilselvi, S. (2016). CDS-fuzzy opportunistic routing protocol for WSN. Wireless Personal Communication, 90, 903–922.CrossRef Golden Julie, E., & Tamilselvi, S. (2016). CDS-fuzzy opportunistic routing protocol for WSN. Wireless Personal Communication, 90, 903–922.CrossRef
Metadaten
Titel
Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN
verfasst von
S. V. N. Santhosh Kumar
Yogesh Palanichamy
Publikationsdatum
01.07.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2018
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1549-3

Weitere Artikel der Ausgabe 4/2018

Wireless Networks 4/2018 Zur Ausgabe

Neuer Inhalt