Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2021

06.01.2021

Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

verfasst von: Irin Loretta G, V. Kavitha

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Networks (WSN) are naturally resource-constrained and have been deployed in various applications such as home monitoring, health care monitoring and military systems. These applications are connected to numerous devices capable of interacting with each other over the internet called as Internet of Things (IoT). WSN application plays a main part in the IoT environment. In WSN, sensors are randomly positioned in harsh surroundings where the communication network is facing privacy issues which is the most critical for data transmission. In this paper, we proposed a cryptographic based clustering structure for preserving data privacy using Optimal Privacy-Multihop Dynamic Clustering Routing Protocol (OP-MDCRP) that improves data privacy and energy efficient routing for the heterogeneous network which uses both clustering and multi-hop communication to reduce the energy consumption of sensor node and increases the lifetime of WSN. Based on the area, the source nodes are grouped to form a cluster in the random network. This scheme also provides high data privacy using Elliptic Curve Integrated Encryption-Key Provisioning Method (ECIES-KPM) along with small key size. Besides, data security based attacks are restricted by ECIES-KPM verification process. In this way, the sensitive data is confidentiality secured with low computational overhead. Experimental comparison shows that the evaluation of OP-MDCRP approach provides more data security than existing methods in terms of computational time, packet delivery ratio, energy consumption, average delay, network overhead and network lifetime.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441CrossRef Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441CrossRef
2.
Zurück zum Zitat Yuvaraja M, Sabrigiriraj M (2017) Fault detection and recovery scheme for routing and lifetime enhancement in WSN. Wirel Netw 23(1):267–277CrossRef Yuvaraja M, Sabrigiriraj M (2017) Fault detection and recovery scheme for routing and lifetime enhancement in WSN. Wirel Netw 23(1):267–277CrossRef
3.
Zurück zum Zitat Zhao J (2017) Topological properties of secure wireless sensor networks under the $ q $-composite key Predistribution scheme with unreliable links. IEEE/ACM Trans Networking 25(3):1789–1802CrossRef Zhao J (2017) Topological properties of secure wireless sensor networks under the $ q $-composite key Predistribution scheme with unreliable links. IEEE/ACM Trans Networking 25(3):1789–1802CrossRef
4.
Zurück zum Zitat Patil B, Kadam R (2018) A novel approach to secure routing protocols in WSN. In2018 2nd international conference on inventive systems and control (ICISC) (pp. 1094-1097). IEEE Patil B, Kadam R (2018) A novel approach to secure routing protocols in WSN. In2018 2nd international conference on inventive systems and control (ICISC) (pp. 1094-1097). IEEE
5.
Zurück zum Zitat Thirukrishna JT, Karthik S, Arunachalam VP (2018 Apr 30) Revamp energy efficiency in homogeneous wireless sensor networks using optimized radio energy algorithm (OREA) and power-aware distance source routing protocol. Futur Gener Comput Syst 81:331–339CrossRef Thirukrishna JT, Karthik S, Arunachalam VP (2018 Apr 30) Revamp energy efficiency in homogeneous wireless sensor networks using optimized radio energy algorithm (OREA) and power-aware distance source routing protocol. Futur Gener Comput Syst 81:331–339CrossRef
6.
Zurück zum Zitat Otoum S, Kantarci B, Mouftah HT (2017) Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. InCommunications (ICC), 2017 IEEE international conference on May 21 (pp. 1-6). IEEE Otoum S, Kantarci B, Mouftah HT (2017) Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. InCommunications (ICC), 2017 IEEE international conference on May 21 (pp. 1-6). IEEE
7.
Zurück zum Zitat Gao Q, Ma W, Luo W (2017) A combinatorial key predistribution scheme for two-layer hierarchical wireless sensor networks. Wirel Pers Commun 96(2):2179–2204 Gao Q, Ma W, Luo W (2017) A combinatorial key predistribution scheme for two-layer hierarchical wireless sensor networks. Wirel Pers Commun 96(2):2179–2204
8.
Zurück zum Zitat Wazid M, Das AK (2017) A secure group-based Blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3):1165–1191CrossRef Wazid M, Das AK (2017) A secure group-based Blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3):1165–1191CrossRef
9.
Zurück zum Zitat Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KK (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204CrossRef Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KK (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204CrossRef
10.
Zurück zum Zitat Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608CrossRef Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608CrossRef
11.
Zurück zum Zitat Lopez J, Rios R, Bao F, Wang G (2017) Evolving privacy: from sensors to the internet of things. Futur Gener Comput Syst 75:46–57CrossRef Lopez J, Rios R, Bao F, Wang G (2017) Evolving privacy: from sensors to the internet of things. Futur Gener Comput Syst 75:46–57CrossRef
12.
Zurück zum Zitat Malviya AR, Jagdale BN (2015) Location privacy of multiple sink using zone partitioning approach in WSN. InApplied and theoretical computing and communication technology (iCATccT), 2015 international conference on Oct 29 (pp. 449-454). IEEE Malviya AR, Jagdale BN (2015) Location privacy of multiple sink using zone partitioning approach in WSN. InApplied and theoretical computing and communication technology (iCATccT), 2015 international conference on Oct 29 (pp. 449-454). IEEE
13.
Zurück zum Zitat George CM, Kumar M (2013) Cluster based location privacy in wireless sensor networks against a universal adversary. InInformation communication and embedded systems (ICICES), 2013 international conference on Feb 21 (pp. 288-293). IEEE George CM, Kumar M (2013) Cluster based location privacy in wireless sensor networks against a universal adversary. InInformation communication and embedded systems (ICICES), 2013 international conference on Feb 21 (pp. 288-293). IEEE
14.
Zurück zum Zitat Sivashankari S, Mohamed RM (2013) A framework of trust management on location privacy and minimizing the error rate in wireless sensor networks, in Optical Imaging Sensor and Security (ICOSS), International Conference on 2013 Sivashankari S, Mohamed RM (2013) A framework of trust management on location privacy and minimizing the error rate in wireless sensor networks, in Optical Imaging Sensor and Security (ICOSS), International Conference on 2013
15.
Zurück zum Zitat Gurjar A, Patil ARB (2013) Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network, in Communication Systems and Network Technologies (CSNT), International Conference on 2013 Gurjar A, Patil ARB (2013) Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network, in Communication Systems and Network Technologies (CSNT), International Conference on 2013
16.
Zurück zum Zitat Kumar V, Madria S (2013) PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks, in Reliable Distributed Systems (SRDS), IEEE 32nd International Symposium on 2013 Kumar V, Madria S (2013) PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks, in Reliable Distributed Systems (SRDS), IEEE 32nd International Symposium on 2013
17.
Zurück zum Zitat Jhumka A, Bradbury M, Leeke M (2012) Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources, in Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 11th International Conference on2012 Jhumka A, Bradbury M, Leeke M (2012) Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources, in Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 11th International Conference on2012
18.
Zurück zum Zitat Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155CrossRef Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155CrossRef
19.
Zurück zum Zitat Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312CrossRef Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312CrossRef
20.
Zurück zum Zitat Wu F, Xu L, Kumari S, Li X, Shen J, Choo KK, Wazid M, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J Netw Comput Appl 89:72–85CrossRef Wu F, Xu L, Kumari S, Li X, Shen J, Choo KK, Wazid M, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J Netw Comput Appl 89:72–85CrossRef
21.
Zurück zum Zitat Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325CrossRef Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325CrossRef
22.
Zurück zum Zitat Yang C, Puthal D, Mohanty SP, Kougianos E (2017) Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks. IEEE Consumer Electronics Magazine 6(4):48–56CrossRef Yang C, Puthal D, Mohanty SP, Kougianos E (2017) Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks. IEEE Consumer Electronics Magazine 6(4):48–56CrossRef
23.
Zurück zum Zitat Tai WL, Chang YF, Li WH (2017) An IOT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. Journal of Information Security and Applications 34:133–141CrossRef Tai WL, Chang YF, Li WH (2017) An IOT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. Journal of Information Security and Applications 34:133–141CrossRef
24.
Zurück zum Zitat Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J 4(6):1844–1852CrossRef Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J 4(6):1844–1852CrossRef
25.
Zurück zum Zitat Li X, Niu J, Bhuiyan MZ, Wu F, Karuppiah M, Kumari S (2018) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics 14(8):3599–3609CrossRef Li X, Niu J, Bhuiyan MZ, Wu F, Karuppiah M, Kumari S (2018) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics 14(8):3599–3609CrossRef
26.
Zurück zum Zitat Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Futur Gener Comput Syst 84:200–215CrossRef Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Futur Gener Comput Syst 84:200–215CrossRef
27.
Zurück zum Zitat Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering 69:534–554CrossRef Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering 69:534–554CrossRef
28.
Zurück zum Zitat Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Computer Science 54:73–82CrossRef Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Computer Science 54:73–82CrossRef
29.
Zurück zum Zitat Somsuk K, Sanemueang C (2018) The new modified methodology to solve ECDLP based on brute force attack. InInternational conference on computing and information technology (pp. 255-264). Springer, Cham Somsuk K, Sanemueang C (2018) The new modified methodology to solve ECDLP based on brute force attack. InInternational conference on computing and information technology (pp. 255-264). Springer, Cham
30.
Zurück zum Zitat Singh T, Singh J, Sharma S (2017) Energy efficient secured routing protocol for MANETs. Wirel Netw 23(4):1001–1009CrossRef Singh T, Singh J, Sharma S (2017) Energy efficient secured routing protocol for MANETs. Wirel Netw 23(4):1001–1009CrossRef
31.
Zurück zum Zitat Batra PK, Kant K (2016) LEACH-MAC: a new cluster head selection algorithm for wireless sensor networks. Wirel Netw 22(1):49–60CrossRef Batra PK, Kant K (2016) LEACH-MAC: a new cluster head selection algorithm for wireless sensor networks. Wirel Netw 22(1):49–60CrossRef
Metadaten
Titel
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
verfasst von
Irin Loretta G
V. Kavitha
Publikationsdatum
06.01.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-01038-6

Weitere Artikel der Ausgabe 2/2021

Peer-to-Peer Networking and Applications 2/2021 Zur Ausgabe