Skip to main content
Erschienen in: Wireless Personal Communications 2/2022

21.02.2022

Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN

verfasst von: Uma Meena, Promila Sharma

Erschienen in: Wireless Personal Communications | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) devices has risen drastically due to the advancement of Information and communication technologies. Wireless sensor network (WSN) performs a key function in the development of IoT applications like smart factories, transportation systems, military, smart cities, healthcare systems, etc. However, energy, memory, processing and computation resources are the restrictions included in such smart devices. Along with these restrictions, achieving reliability with secure data transmission is a fundamental challenge for WSN. To overcome these challenges, a dynamic key authentication and energy efficient secure routing protocol is proposed in this paper. The proposed approach consists of node clustering, cluster head (CH) selection, key authentication and secure routing. In WSN, sensor nodes (SNs) are deployed randomly. Energy efficient seagull K-medoid clustering (SKC) algorithm is proposed to cluster these SNs based on the intrinsic qualities of nodes and CH is selected using Rider Bald Eagle Search (RBES) algorithm. Next, the Key agreement process is carried out using a Dynamic key authentication scheme, which offers safer data transmission over the network as security is an important factor. Finally, Decision trust routing protocol is introduced for the secure and effective routing for IoT based WSN. MATLAB is the implementation tool used for experiment. The experimental results showed the proposed method is efficient for energy efficient and secure routing than the existing methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tang, J., Liu, A., Zhang, J., Xiong, N. N., Zeng, Z., & Wang, T. (2018). A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors, 18(3), 751.CrossRef Tang, J., Liu, A., Zhang, J., Xiong, N. N., Zeng, Z., & Wang, T. (2018). A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors, 18(3), 751.CrossRef
2.
Zurück zum Zitat Batra, I., Verma, S., & Alazab, M. (2020). A lightweight IoT-based security framework for inventory automation using wireless sensor network. International Journal of Communication Systems, 33(4), 4228.CrossRef Batra, I., Verma, S., & Alazab, M. (2020). A lightweight IoT-based security framework for inventory automation using wireless sensor network. International Journal of Communication Systems, 33(4), 4228.CrossRef
3.
Zurück zum Zitat Sujanthi, S., & Kalyani, S. N. (2020). SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT. Wireless Personal Communications, 114(3), 2135–2169.CrossRef Sujanthi, S., & Kalyani, S. N. (2020). SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT. Wireless Personal Communications, 114(3), 2135–2169.CrossRef
4.
Zurück zum Zitat Zhang, Q., & Xu, D. (2020). Security authentication technology based on dynamic Bayesian network in Internet of Things. Journal of Ambient Intelligence and Humanized Computing, 11(2), 573–580.CrossRef Zhang, Q., & Xu, D. (2020). Security authentication technology based on dynamic Bayesian network in Internet of Things. Journal of Ambient Intelligence and Humanized Computing, 11(2), 573–580.CrossRef
5.
Zurück zum Zitat Yang, T., Xiangyang, X., Peng, L., Tonghui, L., & Leina, P. (2018). A secure routing of wireless sensor networks based on trust evaluation model. Procedia Computer Science, 131, 1156–1163.CrossRef Yang, T., Xiangyang, X., Peng, L., Tonghui, L., & Leina, P. (2018). A secure routing of wireless sensor networks based on trust evaluation model. Procedia Computer Science, 131, 1156–1163.CrossRef
6.
Zurück zum Zitat Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.CrossRef Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.CrossRef
7.
Zurück zum Zitat Haseeb, K., Almogren, A., Islam, N., Ud Din, I., & Jan, Z. (2019). An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies, 12(21), 4174.CrossRef Haseeb, K., Almogren, A., Islam, N., Ud Din, I., & Jan, Z. (2019). An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies, 12(21), 4174.CrossRef
8.
Zurück zum Zitat Pothumarti, R., Jain, K., & Krishnan, P. (2021). A lightweight authentication scheme for 5G mobile communications: A dynamic key approach. Journal of Ambient Intelligence and Humanized Computing, 14, 1–9. Pothumarti, R., Jain, K., & Krishnan, P. (2021). A lightweight authentication scheme for 5G mobile communications: A dynamic key approach. Journal of Ambient Intelligence and Humanized Computing, 14, 1–9.
9.
Zurück zum Zitat Elhoseny, M., & Hassanien, A. E. (2019). Secure data transmission in WSN: An overview. Dynamic Wireless Sensor Networks, 20, 115–143. Elhoseny, M., & Hassanien, A. E. (2019). Secure data transmission in WSN: An overview. Dynamic Wireless Sensor Networks, 20, 115–143.
10.
Zurück zum Zitat Athmani, S., Bilami, A., & Boubiche, D. E. (2019). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, 92, 789–799.CrossRef Athmani, S., Bilami, A., & Boubiche, D. E. (2019). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, 92, 789–799.CrossRef
11.
Zurück zum Zitat Han, G., Zhou, L., Wang, H., Zhang, W., & Chan, S. (2018). A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things. Future Generation Computer Systems, 82, 689–697.CrossRef Han, G., Zhou, L., Wang, H., Zhang, W., & Chan, S. (2018). A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things. Future Generation Computer Systems, 82, 689–697.CrossRef
12.
Zurück zum Zitat Nanda, A., Nanda, P., He, X., Jamdagni, A., & Puthal, D. (2020). A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks. Future Generation Computer Systems, 109, 521–530.CrossRef Nanda, A., Nanda, P., He, X., Jamdagni, A., & Puthal, D. (2020). A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks. Future Generation Computer Systems, 109, 521–530.CrossRef
13.
Zurück zum Zitat Jerbi, W., Guermazi, A., Trabelsi, H. (2020). A Secure Routing Protocol in Heterogeneous Networks for Internet of Things. In2020 International Wireless Communications and Mobile Computing (IWCMC), IEEE, 571–576 Jerbi, W., Guermazi, A., Trabelsi, H. (2020). A Secure Routing Protocol in Heterogeneous Networks for Internet of Things. In2020 International Wireless Communications and Mobile Computing (IWCMC), IEEE, 571–576
14.
Zurück zum Zitat Yang, L., Lu, Y., Liu, S., Guo, T., & Liang, Z. (2018). A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access, 6, 71404–71412.CrossRef Yang, L., Lu, Y., Liu, S., Guo, T., & Liang, Z. (2018). A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks. IEEE Access, 6, 71404–71412.CrossRef
15.
Zurück zum Zitat Dhillon, P. K., & Kalra, S. (2018). Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments, 4(3), 141–160.CrossRef Dhillon, P. K., & Kalra, S. (2018). Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments, 4(3), 141–160.CrossRef
16.
Zurück zum Zitat Alzubaidi, W.K., Shaker, S.H. Secure routing scheme for clustered wireless sensor network (WSN). Alzubaidi, W.K., Shaker, S.H. Secure routing scheme for clustered wireless sensor network (WSN).
17.
Zurück zum Zitat Reegan, A. S., & Kabila, V. (2021). Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Personal Communications, 10, 1–7. Reegan, A. S., & Kabila, V. (2021). Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT. Wireless Personal Communications, 10, 1–7.
18.
Zurück zum Zitat Pradeep, S., Muthurajkumar, S., Ganapathy, S., & Kannan, A. (2021). A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wireless Personal Communications, 14, 1–20. Pradeep, S., Muthurajkumar, S., Ganapathy, S., & Kannan, A. (2021). A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs. Wireless Personal Communications, 14, 1–20.
19.
Zurück zum Zitat Khashan, O. A., Ahmad, R., & Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115, 102448.CrossRef Khashan, O. A., Ahmad, R., & Khafajah, N. M. (2021). An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks, 115, 102448.CrossRef
20.
Zurück zum Zitat Sureshkumar, C., & Sabena, S. (2020). Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks. Wireless Personal Communications, 112(3), 1517–1536.CrossRef Sureshkumar, C., & Sabena, S. (2020). Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks. Wireless Personal Communications, 112(3), 1517–1536.CrossRef
21.
Zurück zum Zitat Nashwan, S. (2021). AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment. Egyptian Informatics Journal, 22(1), 15–26.CrossRef Nashwan, S. (2021). AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment. Egyptian Informatics Journal, 22(1), 15–26.CrossRef
22.
Zurück zum Zitat Lu, Y., Li, L., Peng, H., & Yang, Y. (2016). An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors, 16(6), 837.CrossRef Lu, Y., Li, L., Peng, H., & Yang, Y. (2016). An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors, 16(6), 837.CrossRef
23.
Zurück zum Zitat Xiong, L., Peng, D., Peng, T., Liang, H., & Liu, Z. (2017). A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors, 17(11), 2681.CrossRef Xiong, L., Peng, D., Peng, T., Liang, H., & Liu, Z. (2017). A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors, 17(11), 2681.CrossRef
24.
Zurück zum Zitat Zhang, M., & Song, J. S. (2018). An enhanced temporal-credential-based mutual authentication and key agreement scheme for wireless sensor network. Journal of Advances in Computer Networks, 6(1), 258.MathSciNet Zhang, M., & Song, J. S. (2018). An enhanced temporal-credential-based mutual authentication and key agreement scheme for wireless sensor network. Journal of Advances in Computer Networks, 6(1), 258.MathSciNet
25.
Zurück zum Zitat Mathapati, M., Kumaran, T. S., Muruganandham, A., & Mathivanan, M. (2020). Secure routing scheme with multi-dimensional trust evaluation for wireless sensor network. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6047–6055.CrossRef Mathapati, M., Kumaran, T. S., Muruganandham, A., & Mathivanan, M. (2020). Secure routing scheme with multi-dimensional trust evaluation for wireless sensor network. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6047–6055.CrossRef
26.
Zurück zum Zitat Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.CrossRef Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.CrossRef
27.
Zurück zum Zitat Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.CrossRef Liu, Y., Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.CrossRef
28.
Zurück zum Zitat Thippeswamy, B. M., Reshma, S., Tejaswi, V., Shaila, K., Venugopal, K. R., & Patnaik, L. M. (2015). STEAR: Secure trust-aware energy-efcient adaptive routing in wireless sensor networks. Journal of Advances in Computer Networks, 3(2), 146–149.CrossRef Thippeswamy, B. M., Reshma, S., Tejaswi, V., Shaila, K., Venugopal, K. R., & Patnaik, L. M. (2015). STEAR: Secure trust-aware energy-efcient adaptive routing in wireless sensor networks. Journal of Advances in Computer Networks, 3(2), 146–149.CrossRef
29.
Zurück zum Zitat Wu, F., Li, X., Xu, L., Vijayakumar, P., & Kumar, N. (2020). A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Systems Journal, 15(1), 1120–1129.CrossRef Wu, F., Li, X., Xu, L., Vijayakumar, P., & Kumar, N. (2020). A novel three-factor authentication protocol for wireless sensor networks with IoT notion. IEEE Systems Journal, 15(1), 1120–1129.CrossRef
30.
Zurück zum Zitat Tabassum, A., Sadaf, S., Sinha, D., & Das, A. K. (2020). Secure anti-void energy-efficient routing (saveer) protocol for wsn-based iot network. Advances in Computational Intelligence (pp. 129–142). Springer.CrossRef Tabassum, A., Sadaf, S., Sinha, D., & Das, A. K. (2020). Secure anti-void energy-efficient routing (saveer) protocol for wsn-based iot network. Advances in Computational Intelligence (pp. 129–142). Springer.CrossRef
31.
Zurück zum Zitat Shende, D. K., & Sonavane, S. S. (2020). CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks, 26(6), 4011–4029.CrossRef Shende, D. K., & Sonavane, S. S. (2020). CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks, 26(6), 4011–4029.CrossRef
32.
Zurück zum Zitat Kavitha, V. (2021). Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. Peer-to-Peer Networking and Applications, 14(2), 821–836.CrossRef Kavitha, V. (2021). Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. Peer-to-Peer Networking and Applications, 14(2), 821–836.CrossRef
33.
Zurück zum Zitat Batra, P. K., & Kant, K. (2016). LEACH-MAC: A new cluster head selection algorithm for Wireless Sensor Networks. Wireless Networks, 22(1), 49–60.CrossRef Batra, P. K., & Kant, K. (2016). LEACH-MAC: A new cluster head selection algorithm for Wireless Sensor Networks. Wireless Networks, 22(1), 49–60.CrossRef
34.
Zurück zum Zitat Singh, T., Singh, J., & Sharma, S. (2017). Energy efficient secured routing protocol for MANETs. Wireless Networks, 23(4), 1001–1009.CrossRef Singh, T., Singh, J., & Sharma, S. (2017). Energy efficient secured routing protocol for MANETs. Wireless Networks, 23(4), 1001–1009.CrossRef
35.
Zurück zum Zitat Wang, J., Wang, K., Niu, J., Liu, W. (2018). A K-medoids based clustering algorithm for wireless sensor networks. In2018 international workshop on advanced image technology (IWAIT), IEEE, 1–4. Wang, J., Wang, K., Niu, J., Liu, W. (2018). A K-medoids based clustering algorithm for wireless sensor networks. In2018 international workshop on advanced image technology (IWAIT), IEEE, 1–4.
36.
Zurück zum Zitat Binu, D., & Kariyappa, B. S. (2018). RideNN: A new rider optimization algorithm-based neural network for fault diagnosis in analog circuits. IEEE Transactions on Instrumentation and Measurement, 68(1), 2–6.CrossRef Binu, D., & Kariyappa, B. S. (2018). RideNN: A new rider optimization algorithm-based neural network for fault diagnosis in analog circuits. IEEE Transactions on Instrumentation and Measurement, 68(1), 2–6.CrossRef
37.
Zurück zum Zitat Sutrala, A. K., Das, A. K., Kumar, N., Reddy, A. G., Vasilakos, A. V., & Rodrigues, J. J. (2018). On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. International Journal of Communication Systems, 31(8), e3514.CrossRef Sutrala, A. K., Das, A. K., Kumar, N., Reddy, A. G., Vasilakos, A. V., & Rodrigues, J. J. (2018). On the design of secure user authenticated key management scheme for multigateway-based wireless sensor networks using ECC. International Journal of Communication Systems, 31(8), e3514.CrossRef
Metadaten
Titel
Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN
verfasst von
Uma Meena
Promila Sharma
Publikationsdatum
21.02.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09632-y

Weitere Artikel der Ausgabe 2/2022

Wireless Personal Communications 2/2022 Zur Ausgabe

Neuer Inhalt