Skip to main content
Erschienen in: Wireless Networks 2/2012

01.02.2012

A dynamic TDMA based scheme for securing query processing in WSN

verfasst von: Amrita Ghosal, Subir Halder, Sipra DasBit

Erschienen in: Wireless Networks | Ausgabe 2/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending such attacks becomes a big challenge. We propose a scheme to build a security mechanism in a query-processing paradigm within WSN. The scheme is capable of protecting replay attack while preserving essential properties of security such as authentication, data integrity and data freshness. The solution is made lightweight using symmetric key cryptography with very short-length key. Further, the key used in our scheme is neither pre-deployed nor is transmitted directly. The key information is established among nodes through an efficient use of one variant of dynamic TDMA mechanism which ensures security of key. Another variant of dynamic TDMA is used to make the scheme bandwidth saving, an essential quality of WSN. Performance of the scheme is analyzed in terms of storage, computation and communication overhead. Finally the analytical results are compared with two of the existing schemes including the previous version of the present scheme that show significant reduction of all such overheads thereby proving the suitability of the proposed scheme for a resource-constrained network like WSN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.CrossRef
2.
Zurück zum Zitat DasBit, S., & Ragupathy, R. (2008). Routing in MANET and sensor network—A 3D position based approach. Journal of Foundation of Computing and Decision Sciences, 33(3), 211–239. DasBit, S., & Ragupathy, R. (2008). Routing in MANET and sensor network—A 3D position based approach. Journal of Foundation of Computing and Decision Sciences, 33(3), 211–239.
3.
Zurück zum Zitat Ghosal, A., Halder, S., & DasBit, S. (2009). A scheme to tolerate jamming in multiple nodes in wireless sensor networks. Proceedings of Wireless VITAE, IEEE press, 948–951. Ghosal, A., Halder, S., & DasBit, S. (2009). A scheme to tolerate jamming in multiple nodes in wireless sensor networks. Proceedings of Wireless VITAE, IEEE press, 948–951.
4.
Zurück zum Zitat Ghosal, A., Halder, S., Chatterjee, S., Sen, J., & DasBit, S. (2009). Estimating delay in a data forwarding scheme for defending jamming attack in wireless sensor network. Proceedings of 3rd International Conference NGMAST, IEEE CS press, 351–356. Ghosal, A., Halder, S., Chatterjee, S., Sen, J., & DasBit, S. (2009). Estimating delay in a data forwarding scheme for defending jamming attack in wireless sensor network. Proceedings of 3rd International Conference NGMAST, IEEE CS press, 351–356.
5.
Zurück zum Zitat Halder, S., Ghosal, A., Sur, S., Dan, A., & DasBit, S. (2009). A lifetime enhancing node deployment strategy in WSN. Proceedings of Future Generation Information Technology, LNCS-5899, 296–308. Halder, S., Ghosal, A., Sur, S., Dan, A., & DasBit, S. (2009). A lifetime enhancing node deployment strategy in WSN. Proceedings of Future Generation Information Technology, LNCS-5899, 296–308.
6.
Zurück zum Zitat Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. Proceedings of 33rd Hawaii International Conference on System Sciences, 2, 8020–8029. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. Proceedings of 33rd Hawaii International Conference on System Sciences, 2, 8020–8029.
7.
Zurück zum Zitat Ferreira, A. C., Vilaca, M. A., Oliveira, L. B., Habib, E., Wang, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of 4th International Conference on Networking, LNCS-3420, 449–458. Ferreira, A. C., Vilaca, M. A., Oliveira, L. B., Habib, E., Wang, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of 4th International Conference on Networking, LNCS-3420, 449–458.
8.
Zurück zum Zitat Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54–62.CrossRef Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54–62.CrossRef
9.
Zurück zum Zitat Crosby, G. V., Pissinou, N., & Gadze, J. (2006). A framework for trust-based cluster head election in wireless sensor networks. Proceedings of 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 13–22. Crosby, G. V., Pissinou, N., & Gadze, J. (2006). A framework for trust-based cluster head election in wireless sensor networks. Proceedings of 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 13–22.
10.
Zurück zum Zitat Lee, P., Kim, J., Han, I., Rye, H., & Ahn, W. H. (2007). Secure cluster header election techniques in sensor network. Proceedings of ISPA Workshop, LNCS-4743, 20–31. Lee, P., Kim, J., Han, I., Rye, H., & Ahn, W. H. (2007). Secure cluster header election techniques in sensor network. Proceedings of ISPA Workshop, LNCS-4743, 20–31.
11.
Zurück zum Zitat Oliveira, L. B., Wong, H.C., Bern, M., Dahab, R., & Loureiro, A. A. F. (2006). SecLEACH—A random key distribution solution for securing clustered sensor networks. Proceedings of 5th IEEE International Symposium on Network Computing and Applications, 145–154. Oliveira, L. B., Wong, H.C., Bern, M., Dahab, R., & Loureiro, A. A. F. (2006). SecLEACH—A random key distribution solution for securing clustered sensor networks. Proceedings of 5th IEEE International Symposium on Network Computing and Applications, 145–154.
12.
Zurück zum Zitat Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Journal of Computer Communications, 30(11–12), 2385–2400.CrossRef Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Journal of Computer Communications, 30(11–12), 2385–2400.CrossRef
13.
Zurück zum Zitat Poornima, A. S., & Amberker, B. B. (2009). Protocols for secure node-to-cluster head communication in clustered wireless sensor networks. Proceedings of 2nd International Conference on Contemporary Computing, CCIS-40, 434–444. Poornima, A. S., & Amberker, B. B. (2009). Protocols for secure node-to-cluster head communication in clustered wireless sensor networks. Proceedings of 2nd International Conference on Contemporary Computing, CCIS-40, 434–444.
14.
Zurück zum Zitat Kao, J. C., & Marculescu, R. (2007). Minimizing eavesdropping risk by transmission power control in multihop wireless networks. IEEE Transaction on Computers, 56(8), 1009–1023.MathSciNetCrossRef Kao, J. C., & Marculescu, R. (2007). Minimizing eavesdropping risk by transmission power control in multihop wireless networks. IEEE Transaction on Computers, 56(8), 1009–1023.MathSciNetCrossRef
15.
Zurück zum Zitat Kao, J. C., & Marculescu, R. (2007). Energy-efficient anonymous multicast in mobile ad-hoc networks. Proceedings of 13th International Conference on Parallel and Distributed Systems, 1, 1–8. Kao, J. C., & Marculescu, R. (2007). Energy-efficient anonymous multicast in mobile ad-hoc networks. Proceedings of 13th International Conference on Parallel and Distributed Systems, 1, 1–8.
16.
Zurück zum Zitat Bashar, S., & Ding, Z. (2009). Optimum power allocation against information leakage in wireless network. Proceedings of 28th IEEE GLOBECOM, 1–6. Bashar, S., & Ding, Z. (2009). Optimum power allocation against information leakage in wireless network. Proceedings of 28th IEEE GLOBECOM, 1–6.
17.
Zurück zum Zitat Xiao, Y., Rayi, V. K., Sun, B., Xiaojiang, D., Fei, H., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Journal of Computer Communications, 30(11–12), 2314–2341.CrossRef Xiao, Y., Rayi, V. K., Sun, B., Xiaojiang, D., Fei, H., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Journal of Computer Communications, 30(11–12), 2314–2341.CrossRef
18.
Zurück zum Zitat Jiang, C.-j., Shi, W.-r., Xiang, M., & Tang, X.-L. (2010). Energy-balanced unequal clustering protocol for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 17(4), 94–99.CrossRef Jiang, C.-j., Shi, W.-r., Xiang, M., & Tang, X.-L. (2010). Energy-balanced unequal clustering protocol for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 17(4), 94–99.CrossRef
19.
Zurück zum Zitat Deng, J., Han, R., & Mishra, S. (2006). Limiting DoS attacks during multihop data delivery in wireless sensor networks. Journal of Security and Networks, 1(3/4), 167–178.CrossRef Deng, J., Han, R., & Mishra, S. (2006). Limiting DoS attacks during multihop data delivery in wireless sensor networks. Journal of Security and Networks, 1(3/4), 167–178.CrossRef
20.
Zurück zum Zitat David, R. R., Marchany, R. C., & Midkiff, S. F. (2007). Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks. Proceedings of the 2007 IEEE Workshop on Information Assurance, 127–134. David, R. R., Marchany, R. C., & Midkiff, S. F. (2007). Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks. Proceedings of the 2007 IEEE Workshop on Information Assurance, 127–134.
21.
Zurück zum Zitat Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks architectures and protocols. New Jersey: Prentice Hall. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks architectures and protocols. New Jersey: Prentice Hall.
23.
Zurück zum Zitat Kim, B. C., & Un, C. K. (1994). Capacity of wireless dynamic TDMA and media access control for packetized voice/data integration. Journal of Wireless Personal Communications, 1(4), 313–319.CrossRef Kim, B. C., & Un, C. K. (1994). Capacity of wireless dynamic TDMA and media access control for packetized voice/data integration. Journal of Wireless Personal Communications, 1(4), 313–319.CrossRef
24.
Zurück zum Zitat Drakopoulos, E., & Gerakoulis, D. (1998). Performance of a dynamic TDMA system for mobile wireless access. International Journal of Wireless Information Networks, 5(4), 321–340.CrossRef Drakopoulos, E., & Gerakoulis, D. (1998). Performance of a dynamic TDMA system for mobile wireless access. International Journal of Wireless Information Networks, 5(4), 321–340.CrossRef
25.
Zurück zum Zitat Wu, C. M. (2007). Dynamic frame length channel assignment in wireless multihop ad hoc networks. Journal of Computer Communications, 30(18), 3832–3840.CrossRef Wu, C. M. (2007). Dynamic frame length channel assignment in wireless multihop ad hoc networks. Journal of Computer Communications, 30(18), 3832–3840.CrossRef
26.
Zurück zum Zitat Pomalaza-Raez, C. A., & Hemminger, T. L. (2002). A unified approach to dynamic TDMA slot assignment and to distributed routing for multi-hop packet radio networks. Proceedings of ANNIE Conference, 975–980. Pomalaza-Raez, C. A., & Hemminger, T. L. (2002). A unified approach to dynamic TDMA slot assignment and to distributed routing for multi-hop packet radio networks. Proceedings of ANNIE Conference, 975–980.
27.
Zurück zum Zitat Ren, F. C., Chang, C. J., & Cheng, R. G. (2002). QoS-guaranteed fuzzy transmission controller for dynamic TDMA protocol in multimedia communication. IEE Proceedings-Communications, 149(6), 292–298.CrossRef Ren, F. C., Chang, C. J., & Cheng, R. G. (2002). QoS-guaranteed fuzzy transmission controller for dynamic TDMA protocol in multimedia communication. IEE Proceedings-Communications, 149(6), 292–298.CrossRef
28.
Zurück zum Zitat Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. Proceedings of International Conference on Systems and Network Communications, 1–4. Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. Proceedings of International Conference on Systems and Network Communications, 1–4.
30.
Zurück zum Zitat Ghosal, A., Halder, S., Sur, S., Dan, A., & DasBit, S. (2010). Ensuring basic security and preventing replay attack in a query processing application domain in WSN. Proceedings of International Conference on Computational Science and its Application (ICCSA), LNCS-6018, 321–335. Ghosal, A., Halder, S., Sur, S., Dan, A., & DasBit, S. (2010). Ensuring basic security and preventing replay attack in a query processing application domain in WSN. Proceedings of International Conference on Computational Science and its Application (ICCSA), LNCS-6018, 321–335.
Metadaten
Titel
A dynamic TDMA based scheme for securing query processing in WSN
verfasst von
Amrita Ghosal
Subir Halder
Sipra DasBit
Publikationsdatum
01.02.2012
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 2/2012
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-011-0393-0

Weitere Artikel der Ausgabe 2/2012

Wireless Networks 2/2012 Zur Ausgabe

Neuer Inhalt