Skip to main content
Erschienen in: Cluster Computing 5/2019

13.10.2017

Secured and reliable data transmission on multi-hop wireless sensor network

verfasst von: R. J. Kavitha, B. Elizabeth Caroline

Erschienen in: Cluster Computing | Sonderheft 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor network constitutes a set of distributed senor nodes with no definite infrastructure for transferring and routing the packet. The effective packet transmission through wireless senor networks is a quite challenging task as the malicious nodes might often lead to packet loss or corruption which should be avoided by the reliable method of packet transmission. Hence the present research focuses on employing a novel method for secured transmission of data packets. By proposing the communication and threshold based cryptographic mechanism (CTCM), the insider attackers present in the cluster nodes can be considered for enhancing the security of the wireless sensor network. The behavior of malicious node is first located by keeping some monitoring nodes in the communication environment. The monitoring nodes will communicate the information on malicious node to as much nodes as possible for secured data transmission. The secret keys are also shared to other set of sensor nodes. This ensures that the data can be accessed by the node only when it possesses the specific shares unless which the nodes are refrained from sharing their secret key as it is considered malicious. The evaluation of the experimental results are performed in MATLAB simulation environment and compared with the existing approaches in terms of various performance metrics. The simulation results have proved that the proposed CTCM mechanism shows higher performance compared to other available methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sohraby, K., Minoli, D., Znati, T.: Wireless Sensor Networks: Technology, Protocols, and Applications. Wiley, Hoboken (2007)CrossRef Sohraby, K., Minoli, D., Znati, T.: Wireless Sensor Networks: Technology, Protocols, and Applications. Wiley, Hoboken (2007)CrossRef
2.
Zurück zum Zitat Valero, M., Jung, S.S., Uluagac, A.S., Li, Y., Beyah, R.: Di-sec: a distributed security framework for heterogeneous wireless sensor networks, pp. 585–593. IEEE (2012) Valero, M., Jung, S.S., Uluagac, A.S., Li, Y., Beyah, R.: Di-sec: a distributed security framework for heterogeneous wireless sensor networks, pp. 585–593. IEEE (2012)
3.
Zurück zum Zitat Mohamed Mubarak, T., Sattar, S.A., Rao, G.A., Sajitha, M.: Intrusion detection: an energy efficient approach in heterogeneous WSN. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1092–1096. IEEE (2011) Mohamed Mubarak, T., Sattar, S.A., Rao, G.A., Sajitha, M.: Intrusion detection: an energy efficient approach in heterogeneous WSN. In: 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1092–1096. IEEE (2011)
4.
Zurück zum Zitat Boujelben, M., Youssef, H., Mzid, R., Abid, M.: IKM-an identity based key management scheme for heterogeneous sensor networks. J. Commun. 6(2), 185–197 (2011)CrossRef Boujelben, M., Youssef, H., Mzid, R., Abid, M.: IKM-an identity based key management scheme for heterogeneous sensor networks. J. Commun. 6(2), 185–197 (2011)CrossRef
5.
Zurück zum Zitat Carman, D.W. Krus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. Technical Report No : 00-010, NAI Labs, Network Associates Inc., Glenwood, MD (2000) Carman, D.W. Krus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. Technical Report No : 00-010, NAI Labs, Network Associates Inc., Glenwood, MD (2000)
6.
Zurück zum Zitat Ba, M., et al.: A deterministic key management scheme for securing cluster-based sensors networks. 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC). IEEE (2010) Ba, M., et al.: A deterministic key management scheme for securing cluster-based sensors networks. 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC). IEEE (2010)
7.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)CrossRef Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)CrossRef
8.
Zurück zum Zitat Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1, 293–315 (2003) Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1, 293–315 (2003)
9.
Zurück zum Zitat Wang, C., Zheng, W., Bertino, E.: Provenance for wireless sensor networks: a survey. Data Sci. Eng. 1(3), 189–200 (2016)CrossRef Wang, C., Zheng, W., Bertino, E.: Provenance for wireless sensor networks: a survey. Data Sci. Eng. 1(3), 189–200 (2016)CrossRef
10.
Zurück zum Zitat El-Kaissi, R., Kayssi, A., Chehab, A., Dawy, Z.: DAWWSEN: a defense mechanism against wormhole attacks in wireless sensor networks (2005) El-Kaissi, R., Kayssi, A., Chehab, A., Dawy, Z.: DAWWSEN: a defense mechanism against wormhole attacks in wireless sensor networks (2005)
11.
Zurück zum Zitat Sun, B., Xiao, Y., Li, C.C., Chen, H.-H., Yang, T.A.: Security co-existence of wireless sensor networks and RFID for pervasive computing. Comp. Comm. 31(18), 4294–4303 (2008) Sun, B., Xiao, Y., Li, C.C., Chen, H.-H., Yang, T.A.: Security co-existence of wireless sensor networks and RFID for pervasive computing. Comp. Comm. 31(18), 4294–4303 (2008)
13.
Zurück zum Zitat Sultana, S., Ghinita, G., Bertino, E., Shehab, M.: A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks. IEEE Trans. Dependable Secure. Comput. 12(3), 256–269 (2015)CrossRef Sultana, S., Ghinita, G., Bertino, E., Shehab, M.: A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks. IEEE Trans. Dependable Secure. Comput. 12(3), 256–269 (2015)CrossRef
14.
Zurück zum Zitat Karthik, N., Ananthanarayana, V.S.: Data trustworthiness in wireless sensor networks. In: Trustcom/BigDataSE/I SPA, 2016 IEEE, pp. 2181–2186. IEEE (2016) Karthik, N., Ananthanarayana, V.S.: Data trustworthiness in wireless sensor networks. In: Trustcom/BigDataSE/I SPA, 2016 IEEE, pp. 2181–2186. IEEE (2016)
15.
Zurück zum Zitat Shanmugham, S.: Secure routing in wireless sensor networks scholarly paper advisor: Dr. Jens-Peter Kaps Shanmugham, S.: Secure routing in wireless sensor networks scholarly paper advisor: Dr. Jens-Peter Kaps
16.
Zurück zum Zitat Doğan, G., Avincan, K., Brown, T.: Provenance and trust as new factors for self-organization in a wireless sensor network. In: 2015 23rd Signal Processing and Communications Applications Conference (SIU), pp. 544–547. IEEE (2015) Doğan, G., Avincan, K., Brown, T.: Provenance and trust as new factors for self-organization in a wireless sensor network. In: 2015 23rd Signal Processing and Communications Applications Conference (SIU), pp. 544–547. IEEE (2015)
17.
Zurück zum Zitat Kavitha, R.J., Caroline, B.E.: Hybrid energy-efficient transmission protocol for heterogeneous wireless sensor networks. Circuits Syst. 7(06), 897 (2016)CrossRef Kavitha, R.J., Caroline, B.E.: Hybrid energy-efficient transmission protocol for heterogeneous wireless sensor networks. Circuits Syst. 7(06), 897 (2016)CrossRef
18.
Zurück zum Zitat Elizabeth Caroline, B., Kavitha, R.J.: Hybrid transmission technique with security in heterogeneous wireless sensor networks. Asian J. Inf. Technol. 15, 651–660 (2016) Elizabeth Caroline, B., Kavitha, R.J.: Hybrid transmission technique with security in heterogeneous wireless sensor networks. Asian J. Inf. Technol. 15, 651–660 (2016)
19.
Zurück zum Zitat Kavitha, R.J.: Hybrid firefly and identity-based ring signcryption scheme based secure data aggregation for clustered heterogeneous wireless sensor network. Transylv. Rev. 24, 7 (2016) Kavitha, R.J.: Hybrid firefly and identity-based ring signcryption scheme based secure data aggregation for clustered heterogeneous wireless sensor network. Transylv. Rev. 24, 7 (2016)
20.
Zurück zum Zitat Berkhin, P.: A survey of clustering data mining techniques. In: Grouping Multidimensional Data, pp. 25–71. Springer, Berlin Heidelberg (2006) Berkhin, P.: A survey of clustering data mining techniques. In: Grouping Multidimensional Data, pp. 25–71. Springer, Berlin Heidelberg (2006)
21.
Zurück zum Zitat Ferenc, J.S., Néda, Z.: On the size distribution of Poisson Voronoi cells. Phys. A Stat. Mech. Appl. 385(2), 518–526 (2007)CrossRef Ferenc, J.S., Néda, Z.: On the size distribution of Poisson Voronoi cells. Phys. A Stat. Mech. Appl. 385(2), 518–526 (2007)CrossRef
22.
Zurück zum Zitat Alam, S.I., Fahmy, S.: Feluda: provenance-enabled diagnosis of elusive network failures in wireless Sensor networks. In: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9. IEEE (2016) Alam, S.I., Fahmy, S.: Feluda: provenance-enabled diagnosis of elusive network failures in wireless Sensor networks. In: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–9. IEEE (2016)
Metadaten
Titel
Secured and reliable data transmission on multi-hop wireless sensor network
verfasst von
R. J. Kavitha
B. Elizabeth Caroline
Publikationsdatum
13.10.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 5/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1227-3

Weitere Artikel der Sonderheft 5/2019

Cluster Computing 5/2019 Zur Ausgabe