Skip to main content
Erschienen in: Annals of Telecommunications 5-6/2017

22.03.2017

Securing wireless sensor networks for improved performance in cloud-based environments

verfasst von: Ashfaq Hussain Farooqi, Farrukh Aslam Khan

Erschienen in: Annals of Telecommunications | Ausgabe 5-6/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has a great potential to assist in storing and processing data collected from sensors placed in any environment such as smart homes, vehicles, hospitals, enemy surveillance areas, volcanoes, oceans, etc. The sensors may be implanted in the form of a body sensor network or placed in the surroundings. The data recorded by these sensors may further be used for several applications implemented in the cloud as well as other services. Here, the data is acquired from sensors through the wireless medium. Recent studies show that wireless sensor networks (WSNs) are vulnerable to various kinds of security threats and there is a requirement of a security solution that safeguards them from lethal attacks. In this paper, we modify the low-energy adaptive clustering hierarchy (LEACH) protocol for WSNs and add the functionality of intrusion detection to secure WSNs from sinkhole, black hole, and selective forwarding attacks. The modified protocol is called LEACH++. We perform two types of analyses: numerical analysis to check the effect on throughput and energy, and simulations in Network Simulator-2 (NS-2) to prove the results found from the numerical analysis. The results are quite promising and favor LEACH++ over LEACH under attack with respect to throughput and energy consumption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdullah M, Alsanee E, Alseheymi N (2014) Energy efficient cluster-based intrusion detection system for wireless sensor networks. Int J Adv Comput Sci Appl 5(9):10–15 Abdullah M, Alsanee E, Alseheymi N (2014) Energy efficient cluster-based intrusion detection system for wireless sensor networks. Int J Adv Comput Sci Appl 5(9):10–15
2.
Zurück zum Zitat Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks , 325–349. Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks , 325–349.
3.
Zurück zum Zitat Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. 42nd Annual Southeast Regional Conference ACM-SE, (pp. 96–97). Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. 42nd Annual Southeast Regional Conference ACM-SE, (pp. 96–97).
5.
Zurück zum Zitat Bojkovic ZS, Bakmaz BM, Bakmaz MR (2008) Security issues in wireless sensor networks. International Journal of Communications II(1):106–115. Bojkovic ZS, Bakmaz BM, Bakmaz MR (2008) Security issues in wireless sensor networks. International Journal of Communications II(1):106–115.
6.
Zurück zum Zitat Doukas, C. & Maglogiannis, I. (2011). Managing wearable sensor data through cloud computing. Third IEEE International Conference on Cloud Computing Technology and Science, (pp. 440–445). Doukas, C. & Maglogiannis, I. (2011). Managing wearable sensor data through cloud computing. Third IEEE International Conference on Cloud Computing Technology and Science, (pp. 440–445).
7.
Zurück zum Zitat Camara C, Peris-Lopez P, Tapiador J (2015) Security and privacy issues in implantable medical devices. Journal of Biomedical Informatics 55:272–289. Camara C, Peris-Lopez P, Tapiador J (2015) Security and privacy issues in implantable medical devices. Journal of Biomedical Informatics 55:272–289.
8.
Zurück zum Zitat Chen, S., Yang, G., & Chen, S. (2010). A security routing mechanism against Sybil attack for wireless sensor networks. International Conference on Communications and Mobile Computing, (pp. 142–146). Chen, S., Yang, G., & Chen, S. (2010). A security routing mechanism against Sybil attack for wireless sensor networks. International Conference on Communications and Mobile Computing, (pp. 142–146).
9.
Zurück zum Zitat Da Silva AP, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong WC (2005) Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks. ACM, Quebec, pp 16–23 Da Silva AP, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong WC (2005) Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks. ACM, Quebec, pp 16–23
10.
Zurück zum Zitat Deng H, Li W, Agrawal DP (2002) Routing security in ad hoc networks. IEEE Communications Magazine, Special Topics on security in Telecommunication Networks 40(10):70–75 Deng H, Li W, Agrawal DP (2002) Routing security in ad hoc networks. IEEE Communications Magazine, Special Topics on security in Telecommunication Networks 40(10):70–75
11.
Zurück zum Zitat Farooqi, A. H., & Khan, F. A. (2012). A survey of intrusion detection systems for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 9(2):69–83. Farooqi, A. H., & Khan, F. A. (2012). A survey of intrusion detection systems for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 9(2):69–83.
12.
Zurück zum Zitat Farooqi, A. H., & Khan, F. A. (2009). “Intrusion Detection Systems for Wireless Sensor Networks: A Survey. International Conference on Future Generation Communication and Networking, Jeju, South Korea. 234–241. Farooqi, A. H., & Khan, F. A. (2009). “Intrusion Detection Systems for Wireless Sensor Networks: A Survey. International Conference on Future Generation Communication and Networking, Jeju, South Korea. 234–241.
13.
Zurück zum Zitat Farooqi AH, Khan FA, Wang J, Lee S (2013) A novel intrusion detection framework for wireless sensor networks. Pers Ubiquit Comput 17(5):907–919CrossRef Farooqi AH, Khan FA, Wang J, Lee S (2013) A novel intrusion detection framework for wireless sensor networks. Pers Ubiquit Comput 17(5):907–919CrossRef
14.
Zurück zum Zitat Ferreira, A. C., Vilaça, M. A., Oliveira, L. B., Habib, E., Wong, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. 4th IEEE International Conference on Networking, (pp. 449–458). Ferreira, A. C., Vilaça, M. A., Oliveira, L. B., Habib, E., Wong, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. 4th IEEE International Conference on Networking, (pp. 449–458).
15.
Zurück zum Zitat Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (March 2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(424):1–25 Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (March 2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(424):1–25
17.
Zurück zum Zitat Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670CrossRef Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670CrossRef
18.
Zurück zum Zitat Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2000). Energy-efficient routing protocols for wireless microsensor networks. 33rd Hawaii International Conference System Sciences. Maui, HI. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2000). Energy-efficient routing protocols for wireless microsensor networks. 33rd Hawaii International Conference System Sciences. Maui, HI.
19.
Zurück zum Zitat Herbert D, Sundaram V, Lu YH, Bagchi S, Li Z (2007) Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. ACM Transactions on Autonomous and Adaptive Systems 2(3):1–23CrossRef Herbert D, Sundaram V, Lu YH, Bagchi S, Li Z (2007) Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. ACM Transactions on Autonomous and Adaptive Systems 2(3):1–23CrossRef
20.
Zurück zum Zitat Hsieh MY, Huang YM, Chao HC (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11–12):2385–2400CrossRef Hsieh MY, Huang YM, Chao HC (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11–12):2385–2400CrossRef
21.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. The first IEEE International Workshop on Sensor Network Protocols and Applications (pp. 113–127). IEEE. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. The first IEEE International Workshop on Sensor Network Protocols and Applications (pp. 113–127). IEEE.
22.
Zurück zum Zitat Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European Wireless Conference. ENSTA and SEE, Paris Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European Wireless Conference. ENSTA and SEE, Paris
23.
Zurück zum Zitat Krontiris I, Dimitriou T, Giannetsos T (2008a) LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. ACM Secure Communication. Fourth International Conference on Security and Privacy for Communication Networks, Istanbul, TurkeyCrossRef Krontiris I, Dimitriou T, Giannetsos T (2008a) LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. ACM Secure Communication. Fourth International Conference on Security and Privacy for Communication Networks, Istanbul, TurkeyCrossRef
24.
Zurück zum Zitat Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008b). Launching a sinkhole attack in wireless sensor networks: the intruder side. International Conference on Wireless and Mobile Computing Networking and Communications, (pp. 526–531). Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008b). Launching a sinkhole attack in wireless sensor networks: the intruder side. International Conference on Wireless and Mobile Computing Networking and Communications, (pp. 526–531).
25.
Zurück zum Zitat Lee S, Lee Y, Yoo SG (2012) A specification based intrusion detection mechanism for LEACH protocol. Inf Technol J 11(1):40–48CrossRef Lee S, Lee Y, Yoo SG (2012) A specification based intrusion detection mechanism for LEACH protocol. Inf Technol J 11(1):40–48CrossRef
26.
Zurück zum Zitat Lounis A, Hadjidj A, Bouabdallah A, Challal Y (2015) Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur Gener Comput Syst 55:266–277CrossRef Lounis A, Hadjidj A, Bouabdallah A, Challal Y (2015) Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur Gener Comput Syst 55:266–277CrossRef
27.
Zurück zum Zitat Marchang, N., & Datta, R. (2008). Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks, 6(4): 508–523 Marchang, N., & Datta, R. (2008). Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks, 6(4): 508–523
28.
Zurück zum Zitat Masdari M, Bazarchi SM, Bidaki M (2013) Analysis of secure LEACH-based clustering protocols in wireless sensor networks. J Netw Comput Appl 36(2013):1243–1260CrossRef Masdari M, Bazarchi SM, Bidaki M (2013) Analysis of secure LEACH-based clustering protocols in wireless sensor networks. J Netw Comput Appl 36(2013):1243–1260CrossRef
29.
Zurück zum Zitat Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management 34(2): 177–184 Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management 34(2): 177–184
30.
Zurück zum Zitat Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A. & Salvador, G. S. (2010). A cloud computing solution for patient's data collection in health care institutions. Second IEEE International Conference on eHealth, Telemedicine, and Social Medicine, (pp. 95–99) Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A. & Salvador, G. S. (2010). A cloud computing solution for patient's data collection in health care institutions. Second IEEE International Conference on eHealth, Telemedicine, and Social Medicine, (pp. 95–99)
31.
Zurück zum Zitat Zhang, R. & Liu, L. (2010). Security models and requirements for healthcare application clouds. 3rd IEEE International Conference on Cloud Computing, (pp. 268–275), Miami, FL. Zhang, R. & Liu, L. (2010). Security models and requirements for healthcare application clouds. 3rd IEEE International Conference on Cloud Computing, (pp. 268–275), Miami, FL.
32.
Zurück zum Zitat Rahayu, T. M., Lee, S.-G., & Lee, H.-J. (2014, February). Survey on LEACH-based security protocols. 16th International Conference on Advanced Communication Technology, 304–309. Rahayu, T. M., Lee, S.-G., & Lee, H.-J. (2014, February). Survey on LEACH-based security protocols. 16th International Conference on Advanced Communication Technology, 304–309.
33.
Zurück zum Zitat Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40CrossRef Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40CrossRef
34.
Zurück zum Zitat Roman, R., Zhou, J., & Lopez, J. (2006). Applying intrusion detection systems to wireless sensor networks. 3rd IEEE Consumer Communications and Networking Conference (pp. 640–644). IEEE Communications Society. Roman, R., Zhou, J., & Lopez, J. (2006). Applying intrusion detection systems to wireless sensor networks. 3rd IEEE Consumer Communications and Networking Conference (pp. 640–644). IEEE Communications Society.
35.
Zurück zum Zitat Roosta, T., Shieh, S., & Sastry, S. (2006). Taxonomy of security attacks in sensor networks and countermeasures. First International Conference on System Integration and Reliability Improvements. Hanoi, Vietnam: IEEE. Roosta, T., Shieh, S., & Sastry, S. (2006). Taxonomy of security attacks in sensor networks and countermeasures. First International Conference on System Integration and Reliability Improvements. Hanoi, Vietnam: IEEE.
36.
Zurück zum Zitat Su, C. C., Chang, K. M., Kuo, Y. H., & Horng, M. F. (2005). The new intrusion prevention and detection approaches for clustering-based sensor networks. IEEE Wireless Communications and Networking Conference, (pp. 1927–1932). Su, C. C., Chang, K. M., Kuo, Y. H., & Horng, M. F. (2005). The new intrusion prevention and detection approaches for clustering-based sensor networks. IEEE Wireless Communications and Networking Conference, (pp. 1927–1932).
37.
Zurück zum Zitat Sundararajan RK, Arumugam U (2015) Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors 2015:1–12 Sundararajan RK, Arumugam U (2015) Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors 2015:1–12
38.
Zurück zum Zitat Teodoroa PG, Verdejo JD, Fernandez GM, Vazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Computers and Security 28:18–28CrossRef Teodoroa PG, Verdejo JD, Fernandez GM, Vazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Computers and Security 28:18–28CrossRef
39.
Zurück zum Zitat Tian, L., ChangDu, H., & Huang, Y. (2012, June). The simulation and analysis of LEACH protocol for wireless sensor network protocol for wireless sensor network based on NS2. International Conference on System Science and Engineering, 530–533. Tian, L., ChangDu, H., & Huang, Y. (2012, June). The simulation and analysis of LEACH protocol for wireless sensor network protocol for wireless sensor network based on NS2. International Conference on System Science and Engineering, 530–533.
40.
Zurück zum Zitat Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer (pp. 54–62). IEEE Computer Society. Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer (pp. 54–62). IEEE Computer Society.
41.
Zurück zum Zitat Wu, D., Hu, G., & Ni, G. (2008). Research and improve on secure routing protocols in wireless sensor networks. 4th IEEE International Conference on Circuits and Systems for Communications (pp. 853–856). Wu, D., Hu, G., & Ni, G. (2008). Research and improve on secure routing protocols in wireless sensor networks. 4th IEEE International Conference on Circuits and Systems for Communications (pp. 853–856).
42.
Zurück zum Zitat Wang, X. & Tan, Y. (2010). Application of cloud computing in the health information system. International Conference on Computer Application and System Modeling, (pp. 179–182). Wang, X. & Tan, Y. (2010). Application of cloud computing in the health information system. International Conference on Computer Application and System Modeling, (pp. 179–182).
43.
Zurück zum Zitat Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34:1302–1325CrossRef Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34:1302–1325CrossRef
44.
Zurück zum Zitat Zhang, K., Wang, C., & Wang C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (pp. 1–5). Zhang, K., Wang, C., & Wang C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (pp. 1–5).
45.
Zurück zum Zitat Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556CrossRef Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556CrossRef
46.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015). Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions and, future directions. IEEE Wireless Communications, 136–144. Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015). Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions and, future directions. IEEE Wireless Communications, 136–144.
Metadaten
Titel
Securing wireless sensor networks for improved performance in cloud-based environments
verfasst von
Ashfaq Hussain Farooqi
Farrukh Aslam Khan
Publikationsdatum
22.03.2017
Verlag
Springer Paris
Erschienen in
Annals of Telecommunications / Ausgabe 5-6/2017
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-017-0566-7

Weitere Artikel der Ausgabe 5-6/2017

Annals of Telecommunications 5-6/2017 Zur Ausgabe