Skip to main content

2019 | OriginalPaper | Buchkapitel

6. Secure Data Transmission in WSN: An Overview

verfasst von : Mohamed Elhoseny, Aboul Ella Hassanien

Erschienen in: Dynamic Wireless Sensor Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Building a secure routing protocol in WSN is not trivial process. Thee are two main types of security attacks against WSNs: active and passive. WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure data transmission schemes designed for data aggregation and transmission over a network, the limited resources and the complex environment make it invisible to be used with WSNs. Furthermore, secure data transmission is a big challenging issue in WSNs especially for the application that uses image as its main data such as military applications. This problem is mainly related to the limited resources and data processing capabilities. This chapter introduces a secure data processing and transmission schema in WSN. The chapter reviewed and critically discussed the most prominent secure clustering routing algorithms that have been developed for WSNs. Then, we explained the guidelines and the steps towards building a simple solution for securing the dynamic cluster network while consuming as little energy as possible and is adapted to a low computing power. Moreover, four phased towards building a secure clustering algorithm for WSN are proposed. These phases are secure cluster head selection, secure cluster formation, secure data aggregation by the cluster head from its cluster nodes, and secure data routing to the base station. Also, the chapter proposes and applies an evaluation criteria for the existing secure clustering algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
3.
Zurück zum Zitat Shehab, A., Elhoseny, M., El Aziz, M. A., & Hassanien, A. E. (2018). Efficient schemes for playout latency reduction in P2P-VoD systems. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9_22. Shehab, A., Elhoseny, M., El Aziz, M. A., & Hassanien, A. E. (2018). Efficient schemes for playout latency reduction in P2P-VoD systems. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9_​22.
4.
Zurück zum Zitat Elhoseny, M., Nabil, A., Hassanien, A. E., & Oliva, D. (2018). Hybrid rough neural network model for signature recognition. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9_14. Elhoseny, M., Nabil, A., Hassanien, A. E., & Oliva, D. (2018). Hybrid rough neural network model for signature recognition. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9_​14.
5.
Zurück zum Zitat Abdeldaim, A. M., Sahlol, A. T., Elhoseny, M., & Hassanien, A. E. (2018). Computer-aided acute lymphoblastic Leukemia diagnosis system based on image analysis. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9. Abdeldaim, A. M., Sahlol, A. T., Elhoseny, M., & Hassanien, A. E. (2018). Computer-aided acute lymphoblastic Leukemia diagnosis system based on image analysis. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9.
6.
Zurück zum Zitat Elhoseny, H., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). A framework for big data analysis in smart cities. In: A. Hassanien, M. Tolba, M. Elhoseny, & M. Mostafa (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018), Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://doi.org/10.1007/978-3-319-74690-6_40.CrossRef Elhoseny, H., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). A framework for big data analysis in smart cities. In: A. Hassanien, M. Tolba, M. Elhoseny, & M. Mostafa (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018), Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-74690-6_​40.CrossRef
7.
Zurück zum Zitat Elhoseny, M., Shehab, A., & Osman, L. (2018). An empirical analysis of user behavior for P2P IPTV workloads. In: A. Hassanien, M. Tolba, M. Elhoseny, & M. Mostafa (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018), Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://doi.org/10.1007/978-3-319-74690-6_25.CrossRef Elhoseny, M., Shehab, A., & Osman, L. (2018). An empirical analysis of user behavior for P2P IPTV workloads. In: A. Hassanien, M. Tolba, M. Elhoseny, & M. Mostafa (Eds.), AMLTA 2018 the international conference on advanced machine learning technologies and applications (AMLTA2018), Advances in Intelligent Systems and Computing, Vol. 723. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-74690-6_​25.CrossRef
9.
Zurück zum Zitat Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_14. Elsayed, W., Elhoseny, M., Riad, A. M., & Hassanien, A. E. (2018). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​14.
10.
Zurück zum Zitat Shehab, A., Ismail, A., Osman, L., Elhoseny, M., & El-Henawy, I. M. (2017). Quantified self using IoT wearable devices. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_77. Shehab, A., Ismail, A., Osman, L., Elhoseny, M., & El-Henawy, I. M. (2017). Quantified self using IoT wearable devices. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​77.
11.
Zurück zum Zitat Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016b). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031. Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. M. (2016b). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024–2031.
12.
Zurück zum Zitat Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016a). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.CrossRef Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016a). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262–275.CrossRef
13.
Zurück zum Zitat Elsayed, W., Elhoseny, M., Riad, A., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In International conference on advanced intelligent systems and informatics, (pp. 151–160). Springer. Elsayed, W., Elhoseny, M., Riad, A., & Hassanien, A. E. (2017). Autonomic self-healing approach to eliminate hardware faults in wireless sensor networks. In International conference on advanced intelligent systems and informatics, (pp. 151–160). Springer.
17.
21.
Zurück zum Zitat Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. (2014). Extending self-organizing network availability using genetic algorithm. In International conference on computing, communication and networking technologies (ICCCNT), (pp. 1–6). IEEE. Elhoseny, M., Yuan, X., El-Minir, H. K., & Riad, A. (2014). Extending self-organizing network availability using genetic algorithm. In International conference on computing, communication and networking technologies (ICCCNT), (pp. 1–6). IEEE.
22.
Zurück zum Zitat Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, 19(12), 2194–2197.CrossRef Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H., & Riad, A. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, 19(12), 2194–2197.CrossRef
23.
Zurück zum Zitat El Aziz, M. A., Hemdan, A. M., Ewees, A. A., Elhoseny, M., Shehab, A., Hassanien, A. E., & Xiong, S. (2017). Prediction of biochar yield using adaptive neuro-fuzzy inference system with particle swarm optimization. In 2017 IEEE PES PowerAfrica conference, June 27–30, Accra-Ghana, pp. 115–120. IEEE. https://doi.org/10.1109/PowerAfrica.2017.7991209. El Aziz, M. A., Hemdan, A. M., Ewees, A. A., Elhoseny, M., Shehab, A., Hassanien, A. E., & Xiong, S. (2017). Prediction of biochar yield using adaptive neuro-fuzzy inference system with particle swarm optimization. In 2017 IEEE PES PowerAfrica conference, June 27–30, Accra-Ghana, pp. 115–120. IEEE. https://​doi.​org/​10.​1109/​PowerAfrica.​2017.​7991209.
24.
Zurück zum Zitat Ewees, A. A., El Aziz, M. A., & Elhoseny, M. (2017). Social-spider optimization algorithm for improving ANFIS to predict biochar yield. In 8th International conference on computing, communication and networking technologies (8ICCCNT), July 3–5. Delhi-India: IEEE. Ewees, A. A., El Aziz, M. A., & Elhoseny, M. (2017). Social-spider optimization algorithm for improving ANFIS to predict biochar yield. In 8th International conference on computing, communication and networking technologies (8ICCCNT), July 3–5. Delhi-India: IEEE.
25.
Zurück zum Zitat Metawa, N., Elhoseny, M., Hassan, M. K., & Hassanien, A. E. (2016). Loan portfolio optimization using genetic algorithm: A case of credit constraints. In Proceedings of 12th International Computer Engineering Conference (ICENCO), (pp. 59–64). IEEE. https://doi.org/10.1109/ICENCO.2016.7856446. Metawa, N., Elhoseny, M., Hassan, M. K., & Hassanien, A. E. (2016). Loan portfolio optimization using genetic algorithm: A case of credit constraints. In Proceedings of 12th International Computer Engineering Conference (ICENCO), (pp. 59–64). IEEE. https://​doi.​org/​10.​1109/​ICENCO.​2016.​7856446.
26.
Zurück zum Zitat Elhoseny, M., Farouk, A., Zhou, N., Wang, M., Abdalla, S., & Batle, J. (2017a). Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications, 1–21. Elhoseny, M., Farouk, A., Zhou, N., Wang, M., Abdalla, S., & Batle, J. (2017a). Dynamic multi-hop clustering in a wireless sensor network: Performance improvement. Wireless Personal Communications, 1–21.
27.
Zurück zum Zitat Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017b). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4.CrossRef Elhoseny, M., Tharwat, A., Farouk, A., & Hassanien, A. E. (2017b). K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sensors Letters, 1(4), 1–4.CrossRef
29.
Zurück zum Zitat Elhoseny, M., Farouk, A., Batle, J., Shehab, A., & Hassanien, A. E. (2017). Secure image processing and transmission schema in cluster-based wireless sensor network. In Handbook of research on machine learning innovations and trends, Chapter 45, pp. 1022–1040, IGI Global. https://doi.org/10.4018/978-1-5225-2229-4.ch045. Elhoseny, M., Farouk, A., Batle, J., Shehab, A., & Hassanien, A. E. (2017). Secure image processing and transmission schema in cluster-based wireless sensor network. In Handbook of research on machine learning innovations and trends, Chapter 45, pp. 1022–1040, IGI Global. https://​doi.​org/​10.​4018/​978-1-5225-2229-4.​ch045.
30.
Zurück zum Zitat Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., & Riad, A. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8), 1243–1252. Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., & Riad, A. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8), 1243–1252.
31.
Zurück zum Zitat Yuan, X., Elhoseny, M., El-Minir, H., & Riad, A. (2017). A genetic algorithm-based, dynamic clustering method towards improved WSN longevity. Journal of Network and Systems Management, 25(1), 21–46.CrossRef Yuan, X., Elhoseny, M., El-Minir, H., & Riad, A. (2017). A genetic algorithm-based, dynamic clustering method towards improved WSN longevity. Journal of Network and Systems Management, 25(1), 21–46.CrossRef
32.
Zurück zum Zitat Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201.CrossRef Guo, W., & Zhang, W. (2014). A survey on intelligent routing protocols in wireless sensor networks. Journal of Network and Computer Applications, 38, 185–201.CrossRef
33.
Zurück zum Zitat Ahmed, G., Khan, N. M., & Ramer, R. (2008). Cluster head selection using evolutionary computing in wireless sensor networks. In Progress in electromagnetics research symposium, (pp. 883–886). Ahmed, G., Khan, N. M., & Ramer, R. (2008). Cluster head selection using evolutionary computing in wireless sensor networks. In Progress in electromagnetics research symposium, (pp. 883–886).
34.
Zurück zum Zitat Asim, M., & Mathur, V. (2013). Genetic algorithm based dynamic approach for routing protocols in mobile ad hoc networks. Journal of Academia and Industrial Research, 2(7), 437–441. Asim, M., & Mathur, V. (2013). Genetic algorithm based dynamic approach for routing protocols in mobile ad hoc networks. Journal of Academia and Industrial Research, 2(7), 437–441.
35.
Zurück zum Zitat Bhaskar, N., Subhabrata, B., & Soumen, P. (2010). Genetic algorithm based optimization of clustering in ad-hoc networks. International Journal of Computer Science and Information Security, 7(1), 165–169. Bhaskar, N., Subhabrata, B., & Soumen, P. (2010). Genetic algorithm based optimization of clustering in ad-hoc networks. International Journal of Computer Science and Information Security, 7(1), 165–169.
36.
Zurück zum Zitat Karimi, A., Abedini, S., Zarafshan, F., & Al-Haddad, S. (2013). Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network. Journal of Basic and Applied Scientific Research, 3(4), 694–703. Karimi, A., Abedini, S., Zarafshan, F., & Al-Haddad, S. (2013). Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network. Journal of Basic and Applied Scientific Research, 3(4), 694–703.
38.
Zurück zum Zitat Rana, K., & Zaveri, M. (2013). Synthesized cluster head selection and routing for two tier wireless sensor network. Journal of Computer Networks and Communications, 13(3). Rana, K., & Zaveri, M. (2013). Synthesized cluster head selection and routing for two tier wireless sensor network. Journal of Computer Networks and Communications, 13(3).
41.
Zurück zum Zitat Farouk, A., Batle, J., Elhoseny, M., Naseri, M., Lone, M., Fedorov, A., Alkhambashi, M., Ahmed, S. H., & Abdel-Aty, M. (2018). Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Frontiers of Physics, 13, 130306. Springer. https://doi.org/10.1007/s11467-017-0717-3. Farouk, A., Batle, J., Elhoseny, M., Naseri, M., Lone, M., Fedorov, A., Alkhambashi, M., Ahmed, S. H., & Abdel-Aty, M. (2018). Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Frontiers of Physics, 13, 130306. Springer. https://​doi.​org/​10.​1007/​s11467-017-0717-3.
42.
Zurück zum Zitat Elhoseny, M., Elkhateb, A., Sahlol, A., & Hassanien, A. E. (2018). Multimodal biometric personal identification and verification. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://doi.org/10.1007/978-3-319-63754-9_12. Elhoseny, M., Elkhateb, A., Sahlol, A., & Hassanien, A. E. (2018). Multimodal biometric personal identification and verification. In A. Hassanien, & D. Oliva (Eds.), Advances in soft computing and machine learning in image processing. Studies in computational intelligence, Vol. 730. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-63754-9_​12.
43.
Zurück zum Zitat Elhoseny, M., Essa, E., Elkhateb, A., Hassanien, A. E., & Hamad A. (2018). Cascade multimodal biometric system using fingerprint and Iris patterns. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_55. Elhoseny, M., Essa, E., Elkhateb, A., Hassanien, A. E., & Hamad A. (2018). Cascade multimodal biometric system using fingerprint and Iris patterns. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​55.
47.
Zurück zum Zitat Attea, B. A., & Khalil, E. A. (2012). A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks. Applied Soft Computing, 12(7), 1950–1957.CrossRef Attea, B. A., & Khalil, E. A. (2012). A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks. Applied Soft Computing, 12(7), 1950–1957.CrossRef
48.
Zurück zum Zitat Bayrakl, S., & Erdogan, S. (2012). Genetic algorithm based energy efficient clusters in wireless sensor networks. Procedia Computer Science, 10, 247–254.CrossRef Bayrakl, S., & Erdogan, S. (2012). Genetic algorithm based energy efficient clusters in wireless sensor networks. Procedia Computer Science, 10, 247–254.CrossRef
49.
Zurück zum Zitat Wu, Y., & Liu, W. (2013). Routing protocol based on genetic algorithm for energy harvesting-wireless sensor networks. IET Wireless Sensor Systems, 3(2), 112–118.CrossRef Wu, Y., & Liu, W. (2013). Routing protocol based on genetic algorithm for energy harvesting-wireless sensor networks. IET Wireless Sensor Systems, 3(2), 112–118.CrossRef
50.
Zurück zum Zitat Hussain, S., Matin, A., & Islam, O. (2007). Genetic algorithm for energy efficient clusters in wireless sensor networks. In International conference on information technology. Hussain, S., Matin, A., & Islam, O. (2007). Genetic algorithm for energy efficient clusters in wireless sensor networks. In International conference on information technology.
51.
Zurück zum Zitat Butun, I., Morgera, S., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1),CrossRef Butun, I., Morgera, S., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1),CrossRef
52.
Zurück zum Zitat Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks and security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1). Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks and security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1).
53.
Zurück zum Zitat Patel, M., & Aggarwal, A. (2013). Security attacks in wireless sensor networks: A survey. In International conference on intelligent systems and signal processing, (pp. 329–333). Patel, M., & Aggarwal, A. (2013). Security attacks in wireless sensor networks: A survey. In International conference on intelligent systems and signal processing, (pp. 329–333).
54.
Zurück zum Zitat Fuchsberger, A. (2005). Intrusion detection systems and intrusion prevention systems. Elsevier Journal Information Security, 10(3), 134–139. Fuchsberger, A. (2005). Intrusion detection systems and intrusion prevention systems. Elsevier Journal Information Security, 10(3), 134–139.
55.
Zurück zum Zitat Devi, C. D., & Santhi, B. (2013). Study on security protocols in wireless sensor networks. International Journal of Engineering and Technology, 5(5), 200–207. Devi, C. D., & Santhi, B. (2013). Study on security protocols in wireless sensor networks. International Journal of Engineering and Technology, 5(5), 200–207.
56.
Zurück zum Zitat Semary, A., & Abdel-Azim, M. (2013). New trends in secure routing protocols for wireless sensor networks. International Journal of Distributed Sensor Networks. Semary, A., & Abdel-Azim, M. (2013). New trends in secure routing protocols for wireless sensor networks. International Journal of Distributed Sensor Networks.
57.
Zurück zum Zitat Zhang, M., Kermani, M., Raghunathan, A., & Jha, N. (2013). Energy-efficient and secure sensor data transmission using encompression. In International conference on VLSI design and the 12th international conference on embedded systems. Zhang, M., Kermani, M., Raghunathan, A., & Jha, N. (2013). Energy-efficient and secure sensor data transmission using encompression. In International conference on VLSI design and the 12th international conference on embedded systems.
58.
Zurück zum Zitat Singh, M., & Hussain, M. (2010). A top-down hierarchical multi-hop secure routing protocol for wireless sensor networks. International Journal of Ad hoc and Sensor and Ubiquitous Computing, 1(2). Singh, M., & Hussain, M. (2010). A top-down hierarchical multi-hop secure routing protocol for wireless sensor networks. International Journal of Ad hoc and Sensor and Ubiquitous Computing, 1(2).
59.
Zurück zum Zitat Sandeep, E., Kusuma, S., & Kumar, B. (2014). A random key distribution based artificial immune system for security in wireless sensor networks. In IEEE international students’ conference on electronics, electrical and computer science. Sandeep, E., Kusuma, S., & Kumar, B. (2014). A random key distribution based artificial immune system for security in wireless sensor networks. In IEEE international students’ conference on electronics, electrical and computer science.
60.
Zurück zum Zitat Grgic, K., Zagar, D., & Krizanovic, V. (2013). Security in IPv6-based wireless sensor network precision agriculture example. In International conference on telecommunications, (pp. 79–86). Grgic, K., Zagar, D., & Krizanovic, V. (2013). Security in IPv6-based wireless sensor network precision agriculture example. In International conference on telecommunications, (pp. 79–86).
61.
Zurück zum Zitat Oliveira, L., Ferreira, A., Vilaca, M., Wong, H., Bern, M., Dahab, R., et al. (2007). Secleach-on the security of clustered sensor networks. Signal Processing, 87(12), 2882–2895.CrossRef Oliveira, L., Ferreira, A., Vilaca, M., Wong, H., Bern, M., Dahab, R., et al. (2007). Secleach-on the security of clustered sensor networks. Signal Processing, 87(12), 2882–2895.CrossRef
62.
Zurück zum Zitat Radhika, B., Raja, P., Joseph, C., & Reji, M. (2013). Node attribute behavior based intrusion detection in sensor networks. International Journal of Engineering and Technology, 5(5), 3692–3698. Radhika, B., Raja, P., Joseph, C., & Reji, M. (2013). Node attribute behavior based intrusion detection in sensor networks. International Journal of Engineering and Technology, 5(5), 3692–3698.
63.
Zurück zum Zitat Shanthini, B., & Swamynathan, S. (2012). Genetic- based biometric security system for wireless-sensor-based healthcare systems. In International conference on recent advances in computing and software systems, (pp. 180–184). Shanthini, B., & Swamynathan, S. (2012). Genetic- based biometric security system for wireless-sensor-based healthcare systems. In International conference on recent advances in computing and software systems, (pp. 180–184).
64.
Zurück zum Zitat Sharma, S., & Jena, S. (2011). A survey on secure hierarchical routing protocols in wireless sensor networks. In International conference on communication, computing and security. Sharma, S., & Jena, S. (2011). A survey on secure hierarchical routing protocols in wireless sensor networks. In International conference on communication, computing and security.
65.
Zurück zum Zitat Lalitha, T., & Umarani, R. (2012). Energy efficient cluster based key management technique for wireless sensor network. International Journal of Advances in Engineering and Technology, 3(2), 186–190. Lalitha, T., & Umarani, R. (2012). Energy efficient cluster based key management technique for wireless sensor network. International Journal of Advances in Engineering and Technology, 3(2), 186–190.
66.
Zurück zum Zitat Schaffer, P., Farkas, K., HorvTh, A., Holczer, T., & ButtyN, L. (2012). Secure and reliable clustering in wireless sensor networks: A critical survey. The International Journal of Computer and Telecommunications Networking, 56(11), 2726–2741. Schaffer, P., Farkas, K., HorvTh, A., Holczer, T., & ButtyN, L. (2012). Secure and reliable clustering in wireless sensor networks: A critical survey. The International Journal of Computer and Telecommunications Networking, 56(11), 2726–2741.
67.
Zurück zum Zitat Alrajeh, N., Khan, S., & Shams, B. (2013b). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks.CrossRef Alrajeh, N., Khan, S., & Shams, B. (2013b). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks.CrossRef
68.
Zurück zum Zitat Alrajeh, N., Khan, S., Lloret, J., & Loo, J. (2013a). Secure routing protocol using cross layer design and energy harvesting in wireless sensor networks. International Journal of Distributed Sensor Networks. Alrajeh, N., Khan, S., Lloret, J., & Loo, J. (2013a). Secure routing protocol using cross layer design and energy harvesting in wireless sensor networks. International Journal of Distributed Sensor Networks.
69.
Zurück zum Zitat Diop, A., Qi, Y., Wang, Q., & Hussain, S. (2013). An advanced survey on secure energy efficient hierarchical routing protocols in wireless sensor networks. International Journal of Computer Science Issues, 10(1). Diop, A., Qi, Y., Wang, Q., & Hussain, S. (2013). An advanced survey on secure energy efficient hierarchical routing protocols in wireless sensor networks. International Journal of Computer Science Issues, 10(1).
70.
Zurück zum Zitat Salehi, A., Razzaque, M., Naraei, P., & Farrokhtala, A. (2013). Security in wireless sensor networks: Issues and challanges. In IEEE international conference on space science and communication, (pp. 356–360). Salehi, A., Razzaque, M., Naraei, P., & Farrokhtala, A. (2013). Security in wireless sensor networks: Issues and challanges. In IEEE international conference on space science and communication, (pp. 356–360).
71.
Zurück zum Zitat Rifa-Pous, H., & Herrera-Joancomart, J. (2011). A fair and secure cluster formation process for ad hoc networks. Wireless Personal Communications, 56(3), 625–636.CrossRef Rifa-Pous, H., & Herrera-Joancomart, J. (2011). A fair and secure cluster formation process for ad hoc networks. Wireless Personal Communications, 56(3), 625–636.CrossRef
72.
Zurück zum Zitat Wang, G., Kim, D., & Cho, G. (2012). A secure cluster formation scheme in wireless sensor networks. International Journal of Distributed Sensor Networks.CrossRef Wang, G., Kim, D., & Cho, G. (2012). A secure cluster formation scheme in wireless sensor networks. International Journal of Distributed Sensor Networks.CrossRef
73.
Zurück zum Zitat Wu, D., Hu, G., & Ni, G. (2008). Research and improve on secure routing protocols in wireless sensor networks. In Fourth IEEE international conference on circuits and systems for communications, (pp. 853–856). IEEE. Wu, D., Hu, G., & Ni, G. (2008). Research and improve on secure routing protocols in wireless sensor networks. In Fourth IEEE international conference on circuits and systems for communications, (pp. 853–856). IEEE.
74.
Zurück zum Zitat Zhang, Y., & Xu, L. (2008). An efficient secure on-demand routing in clustered wireless ad hoc networks. In International conference on wireless communications, networking and mobile computing. IEEE. Zhang, Y., & Xu, L. (2008). An efficient secure on-demand routing in clustered wireless ad hoc networks. In International conference on wireless communications, networking and mobile computing. IEEE.
75.
Zurück zum Zitat Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security, 5(3). Sahraoui, S., & Bouam, S. (2013). Secure routing optimization in hierarchical cluster-based wireless sensor networks. International Journal of Communication Networks and Information Security, 5(3).
76.
Zurück zum Zitat Gawdan, I., Chow, C., Zia, T., & Sarhan, Q. (2011). A novel secure key management for hierarchical wireless sensor network. In Third conference on computational intelligence, modeling and simulation, (pp. 312–316). IEEE. Gawdan, I., Chow, C., Zia, T., & Sarhan, Q. (2011). A novel secure key management for hierarchical wireless sensor network. In Third conference on computational intelligence, modeling and simulation, (pp. 312–316). IEEE.
77.
Zurück zum Zitat Kumar, S., & Jena, S. (2010). SCMRP: secure cluster based multipath routing protocol for wireless sensor networks. In Sixth international conference on wireless communication and sensor networks, (pp. 1–6). IEEE. Kumar, S., & Jena, S. (2010). SCMRP: secure cluster based multipath routing protocol for wireless sensor networks. In Sixth international conference on wireless communication and sensor networks, (pp. 1–6). IEEE.
78.
Zurück zum Zitat Ibriq, J., & Mahgoub, I. (2006). A secure hierarchical routing protocol for wireless sensor networks. In IEEE International conference on communication systems, (pp. 1–6). IEEE. Ibriq, J., & Mahgoub, I. (2006). A secure hierarchical routing protocol for wireless sensor networks. In IEEE International conference on communication systems, (pp. 1–6). IEEE.
79.
Zurück zum Zitat Kausar, F., Masood, A., & Hussain, S. (2008). An authenticated key management scheme for hierarchical wireless sensor work. Advances in Communication Systems and Electrical Engineering, 4, 85–98.CrossRef Kausar, F., Masood, A., & Hussain, S. (2008). An authenticated key management scheme for hierarchical wireless sensor work. Advances in Communication Systems and Electrical Engineering, 4, 85–98.CrossRef
80.
Zurück zum Zitat Tubaishat, M., Yin, J., Panja, B., & Madria, S. (2004). A secure hierarchical model for sensor network. ACM Sigmod Record, 33(1), 7–13.CrossRef Tubaishat, M., Yin, J., Panja, B., & Madria, S. (2004). A secure hierarchical model for sensor network. ACM Sigmod Record, 33(1), 7–13.CrossRef
81.
Zurück zum Zitat Yin, J., & Madria, S. (2006). Secrout a secure routing protocol for sensor network. In IEEE International conference on advanced information networking and applications, Vol. 1. Yin, J., & Madria, S. (2006). Secrout a secure routing protocol for sensor network. In IEEE International conference on advanced information networking and applications, Vol. 1.
82.
Zurück zum Zitat Cheng, Y., & Agrawal, D. (2007). An improved key distribution mechanism for large scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.CrossRef Cheng, Y., & Agrawal, D. (2007). An improved key distribution mechanism for large scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1), 35–48.CrossRef
83.
Zurück zum Zitat Elhoseny, M., Abdelaziz, A., Salama, A. S., Riad, A. M., Muhammad, K., & Sangaiah, A. K. (2018). A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Generation Computer Systems. Elsevier. (in Press). Elhoseny, M., Abdelaziz, A., Salama, A. S., Riad, A. M., Muhammad, K., & Sangaiah, A. K. (2018). A hybrid model of internet of things and cloud computing to manage big data in health services applications. Future Generation Computer Systems. Elsevier. (in Press).
85.
Zurück zum Zitat Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., & Muhammad, K. (2017). The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing. Springer. https://doi.org/10.1007/s12652-017-0659-1. Darwish, A., Hassanien, A. E., Elhoseny, M., Sangaiah, A. K., & Muhammad, K. (2017). The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: Opportunities, challenges, and open problems. Journal of Ambient Intelligence and Humanized Computing. Springer. https://​doi.​org/​10.​1007/​s12652-017-0659-1.
86.
Zurück zum Zitat Abdelaziz, A., Elhoseny, M., Salama, A. S., Riad, A. M., & Hassanien, A. E. (2018). Intelligent algorithms for optimal selection of virtual machine in cloud environment, towards enhance healthcare services. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://doi.org/10.1007/978-3-319-64861-3_27. Abdelaziz, A., Elhoseny, M., Salama, A. S., Riad, A. M., & Hassanien, A. E. (2018). Intelligent algorithms for optimal selection of virtual machine in cloud environment, towards enhance healthcare services. In A. Hassanien, K. Shaalan, T. Gaber, & M. Tolba (Eds.), Proceedings of the international conference on advanced intelligent systems and informatics 2017, AISI 2017, Advances in Intelligent Systems and Computing, Vol. 639. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-319-64861-3_​27.
87.
Zurück zum Zitat Wang, L., Wang, C., & Liu, C. (2009). Optimal number of clusters in dense wireless sensor networks: A cross-layer approach. IEEE Transactions on Vehicular Technology, 58(2), 966–976.MathSciNetCrossRef Wang, L., Wang, C., & Liu, C. (2009). Optimal number of clusters in dense wireless sensor networks: A cross-layer approach. IEEE Transactions on Vehicular Technology, 58(2), 966–976.MathSciNetCrossRef
88.
Zurück zum Zitat Zhong, C., Yinghong, M., Zhao, J., Lin, C., & Lu, X. (2014). Secure clustering and reliable multipath route discovering in wireless sensor networks. In Sixth international symposium on parallel architectures and algorithms and programming, pp. 130–134. IEEE. Zhong, C., Yinghong, M., Zhao, J., Lin, C., & Lu, X. (2014). Secure clustering and reliable multipath route discovering in wireless sensor networks. In Sixth international symposium on parallel architectures and algorithms and programming, pp. 130–134. IEEE.
89.
Zurück zum Zitat Zhao, P., Xu, Y., & Nan, M. (2012). A hybrid key management scheme based on clustered wireless sensor networks. Wireless Sensor Network, 4, 197–201.CrossRef Zhao, P., Xu, Y., & Nan, M. (2012). A hybrid key management scheme based on clustered wireless sensor networks. Wireless Sensor Network, 4, 197–201.CrossRef
Metadaten
Titel
Secure Data Transmission in WSN: An Overview
verfasst von
Mohamed Elhoseny
Aboul Ella Hassanien
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-92807-4_6

Premium Partner