Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.03.2016

Secured Energy Conserving Slot-Based Topology Maintenance Protocol for Wireless Sensor Networks

verfasst von: S. Raja Rajeswari, V. Seenivasagam

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Topology Maintenance Protocols are vital elements that influence Wireless Sensor Networks. These protocols strive to conserve energy and to prevent collisions during communication. In this paper, a Secured Energy Conserving Slot-based Topology Maintenance Protocol, which serves its purpose by overthrowing several existing issues such as energy deterioration and memory overhead, is proposed. Energy conservation is achieved by node behavior based on timeslot. Hence for a particular timeslot, only certain count of nodes remain in work cycle, and the remaining nodes remain in the state of sleep. This conserves energy at its best, which in turn improves the lifespan of the network. Additionally, the issue of memory overhead is resolved by allowing only direct communication between the node and the base station, and hence the base station directly authenticates the constituent nodes. This work widens its scope by focusing on security breaches too. We introduce five attacks to the system; however, the system proves its resilience. The proposed work outperforms the existing system in terms of energy conservation, increase in network lifetime and less memory overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gabrielli, A., Mancini, L. V., Setia, S., & Jajodia, S. (2011). Securing topology maintenance protocols for sensor networks. IEEE Transactions on Dependable and Secure Computing, 8, 450–465. doi:10.1109/TDSC.2009.46.2.CrossRef Gabrielli, A., Mancini, L. V., Setia, S., & Jajodia, S. (2011). Securing topology maintenance protocols for sensor networks. IEEE Transactions on Dependable and Secure Computing, 8, 450–465. doi:10.​1109/​TDSC.​2009.​46.​2.CrossRef
2.
Zurück zum Zitat Conti, M., Di Pietro, R., Gabrielli, A., & Mancini, L. V. (2011). Secure topology maintenance and events collection in WSNs. Security and Communication Networks. doi:10.1002/sec.280. Conti, M., Di Pietro, R., Gabrielli, A., & Mancini, L. V. (2011). Secure topology maintenance and events collection in WSNs. Security and Communication Networks. doi:10.​1002/​sec.​280.
3.
4.
Zurück zum Zitat Zhu, C., Zheng, C., Shu, L., & Han, G. (2012). A survey on coverage and connectivity issues in wireless sensor networks. Journal of Network and Computer Applications, 35, 619–632.CrossRef Zhu, C., Zheng, C., Shu, L., & Han, G. (2012). A survey on coverage and connectivity issues in wireless sensor networks. Journal of Network and Computer Applications, 35, 619–632.CrossRef
5.
Zurück zum Zitat Li, M., Li, Z., & Vasilakos, A. V. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE. doi:10.1109/JPROC.2013.2286656. Li, M., Li, Z., & Vasilakos, A. V. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE. doi:10.​1109/​JPROC.​2013.​2286656.
6.
Zurück zum Zitat Xhafa, F., Li, J., Wong, D.S., & Palmieri, F. (2014). Advances in security and privacy in sensor networks. International Journal of Distributed Sensor Networks, 2014, 956265. doi:10.1155/2014/956265. Xhafa, F., Li, J., Wong, D.S., & Palmieri, F. (2014). Advances in security and privacy in sensor networks. International Journal of Distributed Sensor Networks, 2014, 956265. doi:10.​1155/​2014/​956265.
7.
Zurück zum Zitat Khan, S.U., & Lavagno, L. (2012). Security in wireless sensor networks. Global Journal of Computer Science and Technology Network, Web and Security, 12(16). Khan, S.U., & Lavagno, L. (2012). Security in wireless sensor networks. Global Journal of Computer Science and Technology Network, Web and Security, 12(16).
8.
Zurück zum Zitat Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35, 867–880.CrossRef Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35, 867–880.CrossRef
9.
Zurück zum Zitat Modares, H., Salleh, R., & Moravejosharieh, A. (2011). Overview of security issues in wireless sensor networks. In Computational intelligence, modelling and simulation (CIMSiM). Third international conference (pp. 308–311). Modares, H., Salleh, R., & Moravejosharieh, A. (2011). Overview of security issues in wireless sensor networks. In Computational intelligence, modelling and simulation (CIMSiM). Third international conference (pp. 308–311).
10.
Zurück zum Zitat Jinwala, D., Patel, D., & Dasgupta, K. (2012). FlexiSec: A configurable link layer security architecture for wireless sensor networks. arXiv preprint arXiv:1203.4697. Jinwala, D., Patel, D., & Dasgupta, K. (2012). FlexiSec: A configurable link layer security architecture for wireless sensor networks. arXiv preprint arXiv:​1203.​4697.
11.
Zurück zum Zitat Conti, Mauro, Di Pietro, R., Mancini, L. V., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TDSC.2010.25. Conti, Mauro, Di Pietro, R., Mancini, L. V., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing. doi:10.​1109/​TDSC.​2010.​25.
12.
Zurück zum Zitat Wei, W., Xu, F., Tan, C.C., & Li, Q. (2012). Sybil defender: Defend against Sybil attacks in large social networks. In INFOCOM, 2012 Proceedings IEEE (pp. 1951–1959). Wei, W., Xu, F., Tan, C.C., & Li, Q. (2012). Sybil defender: Defend against Sybil attacks in large social networks. In INFOCOM, 2012 Proceedings IEEE (pp. 1951–1959).
13.
Zurück zum Zitat Ren, F., He, T., Das, S., & Lin, C. (2011). Traffic-aware dynamic routing to alleviate congestion in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2011.24. Ren, F., He, T., Das, S., & Lin, C. (2011). Traffic-aware dynamic routing to alleviate congestion in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems. doi:10.​1109/​TPDS.​2011.​24.
14.
Zurück zum Zitat Tague, P., & Poovendran, R. (2007). Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks, 5, 801–814.CrossRef Tague, P., & Poovendran, R. (2007). Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks, 5, 801–814.CrossRef
15.
Zurück zum Zitat Chou, C. H. A., Ssu, K. F., Jiau, H. C., Wang, W. T., & Wang, C. (2011). A dead-end free topology maintenance protocol for geographic forwarding in wireless sensor networks. IEEE Transactions on Computers. doi:10.1109/TC.2010.208.MathSciNet Chou, C. H. A., Ssu, K. F., Jiau, H. C., Wang, W. T., & Wang, C. (2011). A dead-end free topology maintenance protocol for geographic forwarding in wireless sensor networks. IEEE Transactions on Computers. doi:10.​1109/​TC.​2010.​208.MathSciNet
16.
17.
Zurück zum Zitat Wang, X., Xing, G., Zhang, Y., Lu, C., Pless, R., & Gill, C. (2003). Integrated coverage and connectivity configuration in wireless sensor networks. In Proceedings of the 1st international conference on Embedded Networked Sensor Systems (pp. 28–39). Wang, X., Xing, G., Zhang, Y., Lu, C., Pless, R., & Gill, C. (2003). Integrated coverage and connectivity configuration in wireless sensor networks. In Proceedings of the 1st international conference on Embedded Networked Sensor Systems (pp. 28–39).
19.
Zurück zum Zitat Sun, Z., Wu, W., Wang, H., Chen, H., & Xing, X. (2014). A novel coverage algorithm based on event-probability-driven mechanism in wireless sensor network. EURASIP Journal on Wireless Communications and Networking. doi:10.1186/1687-1499-2014-58. Sun, Z., Wu, W., Wang, H., Chen, H., & Xing, X. (2014). A novel coverage algorithm based on event-probability-driven mechanism in wireless sensor network. EURASIP Journal on Wireless Communications and Networking. doi:10.​1186/​1687-1499-2014-58.
20.
Zurück zum Zitat Boulfekhar, S., & Benmohammed, M. (2013). A novel energy efficient and lifetime maximization routing protocol in wireless sensor networks. Wireless Personal Communications. doi:10.1007/s11277-013-1081-4. Boulfekhar, S., & Benmohammed, M. (2013). A novel energy efficient and lifetime maximization routing protocol in wireless sensor networks. Wireless Personal Communications. doi:10.​1007/​s11277-013-1081-4.
21.
Zurück zum Zitat Gentili, M., & Raiconi, A. (2013). α-Coverage to extend network lifetime on wireless sensor networks. Optimization Letters, 7, 157–172.CrossRefMathSciNetMATH Gentili, M., & Raiconi, A. (2013). α-Coverage to extend network lifetime on wireless sensor networks. Optimization Letters, 7, 157–172.CrossRefMathSciNetMATH
22.
Zurück zum Zitat Nan, G., Shi, G., Mao, Z., & Li, M. (2012). CDSWS: Coverage-guaranteed distributed sleep/wake scheduling for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking. doi:10.1186/1687-1499-2012-44. Nan, G., Shi, G., Mao, Z., & Li, M. (2012). CDSWS: Coverage-guaranteed distributed sleep/wake scheduling for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking. doi:10.​1186/​1687-1499-2012-44.
23.
Zurück zum Zitat Stergiopoulos, Y. J., & Tzes, A. (2011). Decentralized swarm coordination: A combined coverage/connectivity approach. Journal of Intelligent and Robotic Systems. doi:10.1007/s10846-010-9537-1.MATH Stergiopoulos, Y. J., & Tzes, A. (2011). Decentralized swarm coordination: A combined coverage/connectivity approach. Journal of Intelligent and Robotic Systems. doi:10.​1007/​s10846-010-9537-1.MATH
24.
Zurück zum Zitat Dłotko, P., Ghrist, R., Juda, M., & Mrozek, M. (2012). (Distributed computation of coverage in sensor networks by homological methods. Applicable Algebra in Engineering, Communication and Computing. doi:10.1007/s00200-012-0167-7. Dłotko, P., Ghrist, R., Juda, M., & Mrozek, M. (2012). (Distributed computation of coverage in sensor networks by homological methods. Applicable Algebra in Engineering, Communication and Computing. doi:10.​1007/​s00200-012-0167-7.
25.
Zurück zum Zitat Dohare, U., Lobiyal, D., & Kumar, S. (2014). Energy balanced model for lifetime maximization in randomly distributed wireless sensor networks. Wireless Personal Communications. doi:10.1007/s11277-014-1759-2. Dohare, U., Lobiyal, D., & Kumar, S. (2014). Energy balanced model for lifetime maximization in randomly distributed wireless sensor networks. Wireless Personal Communications. doi:10.​1007/​s11277-014-1759-2.
26.
Zurück zum Zitat Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V., & Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks. doi:10.1007/s11276-012-0449-9. Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic, V., & Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks. doi:10.​1007/​s11276-012-0449-9.
27.
Zurück zum Zitat Qureshi, H. K., Iqbal, A., & Asif, W. (2014). Topology control for harvesting enabled wireless sensor networks: A design approach. Wireless Personal Communications. doi:10.1007/s11277-014-2195-z. Qureshi, H. K., Iqbal, A., & Asif, W. (2014). Topology control for harvesting enabled wireless sensor networks: A design approach. Wireless Personal Communications. doi:10.​1007/​s11277-014-2195-z.
28.
Zurück zum Zitat Mostafaei, H., & Meybodi, M. R. (2013). Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wireless Personal Communications. doi:10.1007/s11277-012-0885-y. Mostafaei, H., & Meybodi, M. R. (2013). Maximizing lifetime of target coverage in wireless sensor networks using learning automata. Wireless Personal Communications. doi:10.​1007/​s11277-012-0885-y.
29.
Zurück zum Zitat Cheng, M. X., & Gong, X. (2011). Maximum lifetime coverage preserving scheduling algorithms in sensor networks. Journal of Global Optimization. doi:10.1007/s10898-010-96363. Cheng, M. X., & Gong, X. (2011). Maximum lifetime coverage preserving scheduling algorithms in sensor networks. Journal of Global Optimization. doi:10.​1007/​s10898-010-96363.
30.
Zurück zum Zitat Özdemir, S., Bara’a, A. A., & Khalil, Ö. A. (2013). Multi-objective clustered-based routing with coverage control in wireless sensor networks. Soft Computing. doi:10.1007/s00500-012-0970-x. Özdemir, S., Bara’a, A. A., & Khalil, Ö. A. (2013). Multi-objective clustered-based routing with coverage control in wireless sensor networks. Soft Computing. doi:10.​1007/​s00500-012-0970-x.
32.
Zurück zum Zitat Özdemir, S., Bara’a, A. A., & Khalil, Ö. A. (2013). Multi-objective evolutionary algorithm based on decomposition for energy efficient coverage in wireless sensor networks. Wireless Personal Communications. doi:10.1007/s11277-012-0811-3. Özdemir, S., Bara’a, A. A., & Khalil, Ö. A. (2013). Multi-objective evolutionary algorithm based on decomposition for energy efficient coverage in wireless sensor networks. Wireless Personal Communications. doi:10.​1007/​s11277-012-0811-3.
33.
Zurück zum Zitat Akhlaq, M., Sheltami, T. R., & Shakshuki, E. M. (2014). C3: An energy-efficient protocol for coverage, connectivity and communication in WSNs. Personal and Ubiquitous Computing. doi:10.1007/s00779-013-0719-2. Akhlaq, M., Sheltami, T. R., & Shakshuki, E. M. (2014). C3: An energy-efficient protocol for coverage, connectivity and communication in WSNs. Personal and Ubiquitous Computing. doi:10.​1007/​s00779-013-0719-2.
35.
Zurück zum Zitat Younis, M., Senturk, I. F., Akkaya, K., Lee, S., & Senel, F. (2014). Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks. doi:10.1016/j.comnet.2013.08.021. Younis, M., Senturk, I. F., Akkaya, K., Lee, S., & Senel, F. (2014). Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Computer Networks. doi:10.​1016/​j.​comnet.​2013.​08.​021.
36.
Zurück zum Zitat Bhattasali, T., Chaki, R., & Sanyal, S. (2012). Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:1203.0231. Bhattasali, T., Chaki, R., & Sanyal, S. (2012). Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:​1203.​0231.
Metadaten
Titel
Secured Energy Conserving Slot-Based Topology Maintenance Protocol for Wireless Sensor Networks
verfasst von
S. Raja Rajeswari
V. Seenivasagam
Publikationsdatum
01.03.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-3103-x

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe

Neuer Inhalt