Development of a Lightweight Security Framework for Optimal Routing in Secure Wireless Sensor Networks

  • Dr. Manjunath B.E
  • Dr. R. Divya
  • Dr. P. Vamsi Krishna
Keywords: WSN, Security, Routing, Energy Efficiency, Authentication and Encryption

Abstract

In the past recent years, WSN has progressively grown as an emerging technology. Various research efforts have been made in the literature to address the problem associated with WSN security. Based on the review analysis, it is found that the existing methods are mostly associated with complex security operations that are not suitable for resource constraint sensor nodes. The proposed paper has presented cost-effective modeling of the security framework that addresses the problem of security and energy in WSN. The proposed security framework implements two different protocols to attain maximum security services and optimizes the security operation of the proposed security models to achieve higher energy efficiency and privacy preservation against a majority of the lethal attacks. The first security model introduces a novel cost-efficient pair-wise key-based authentication mechanism to identify the availability of optimal routes under the presence of adversary in the network. The second security model introduces an integrated part of the first security model that optimizes security operation to perform secure communication using a lightweight encryption mechanism. Based on the experimental outcome and analysis, the proposed system attains a 60% performance improvement in terms of security and computational efficiency compared to the existing Sec-LEACH. The second security model has achieved a 50% improvement in terms of overall aspects like reduction in transmission delay, packet delivery ratio, remaining energy, and communication performance.

 

Author Biographies

Dr. Manjunath B.E

Professor, Department of ECE, R K College of Engineering-Vijayawada, Andhra Pradesh, India

 

Dr. R. Divya

Assistant Professor, Department of ECE, R K College of Engineering-Vijayawada, Andhra Pradesh, India

 

Dr. P. Vamsi Krishna

Associate Professor, Department of ECE, R K College of Engineering-Vijayawada, Andhra Pradesh, India

 

References

[1] Khan, S. &Pathan, A.-S.K. & Alrajeh, N.A (2016). Wireless sensor networks: Current status and future trends.
[2] S. R. Jino Ramson and D. J. Moni, "Applications of wireless sensor networks — A survey," 2017 International Conference on Innovations in Electrical, Electronics, Instrumentation and Media Technology (ICEEIMT), Coimbatore, 2017, pp. 325-329, DOI: 10.1109/ICIEEIMT.2017.8116858.
[3] Mohamed, Reem E., et al. "Survey on wireless sensor network applications and energy efficient routing protocols." Wireless Personal Communications 101.2 (2018): 1019-1055.
[4] BenSaleh, Mohammed Sulaiman, et al. "Wireless Sensor Network Design Methodologies: A Survey" Journal of Sensors 2020 (2020).
[5] Butun, Ismail, Salvatore D. Morgera, and Ravi Sankar. "A survey of intrusion detection systems in wireless sensor networks" IEEE communications surveys & tutorials 16.1 (2013): 266-282.
[6] Jain, Manoj Kumar. "Wireless sensor networks: Security issues and challenges." International Journal of Computer and Information Technology 2.1 (2011): 62-67.
[7] T. Azzabi, H. Farhat and N. Sahli, "A survey on wireless sensor networks security issues and military specificities," 2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET), Hammamet, 2017, pp. 66-72, DOI: 10.1109/ASET.2017.7983668.
[8] Y. Wang, G. Attebury and B. Ramamurthy, "A survey of security issues in wireless sensor networks," in IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006, DOI: 10.1109/COMST.2006.315852.
[9] Gonçalves, Danilo De Oliveira, and Daniel G. Costa. "A survey of image security in wireless sensor networks" Journal of Imaging 1.1 (2015): 4-30.
[10] M. Ebrahim and Chai Wai Chong, "Secure Force: A low-complexity cryptographic algorithm for Wireless Sensor Network (WSN)," 2013 IEEE International Conference on Control System, Computing and Engineering, Mindeb, 2013, pp. 557-562, DOI: 10.1109/ICCSCE.2013.6720027.
[11]. Mahidhar, Rashmi, and Archana Raut. "A Survey on Scheduling Schemes with Security in Wireless Sensor Networks" Procedia Computer Science 78 (2016): 756-762.
[12]. Upadhyaya, Shuchita. "Secure communication using DNA cryptography with secure socket layer (SSL) protocol in wireless sensor networks." Procedia Computer Science 70 (2015): 808-813.
[13]. Kabashkin, Igor, and Jörg Kundler. "Reliability of Sensor Nodes in Wireless Sensor Networks of Cyber Physical Systems" Procedia Computer Science 104 (2017): 380-384.
[14]. Lu, Huang, Jie Li, and Mohsen Guizani. "Secure and efficient data transmission for cluster-based wireless sensor networks." IEEE transactions on parallel and distributed systems 25.3 (2014): 750-761.
[15]. Ghosal, Amrita, Sanjib Sur, and Sipra DasBit. "μSec: a security protocol for unicast communication in wireless sensor networks." Data Privacy Management and Autonomous Spontaneous Security”. Springer, Berlin, Heidelberg, 2013, pp258-273.
[16]. Yu, Jun, and Xueying Zhang. "A cross-layer wireless sensor network energy-efficient communication protocol for real-time monitoring of the long-distance electric transmission lines." Journal of Sensors 2015 (2015).
[17]. Zhu, Xiaojuan, et al. "Transmission reliability evaluation for wireless sensor networks." International Journal of Distributed Sensor Networks 12.2 (2016): 1346079.
[18]. Teng, Haojun, et al. "Adaptive transmission power control for reliable data forwarding in sensor based networks”, Wireless Communications and Mobile Computing2018 (2018).
[19]. Chidean, Mihaela I., et al. "Energy efficiency and quality of data reconstruction through data-coupled clustering for self-organized large-scale WSNs." IEEE sensors journal 16.12 (2016): 5010-5020.
[20]. Hu, Chunqiang, et al. "Secure and efficient data communication protocol for wireless body area networks." IEEE Transactions on Multi-Scale Computing Systems 2.2 (2016): 94-107.
[21]. Biswas, K., Muthu Kumarasamy V., Sithirasenan, E., & Singh, K. Energy Efficient Routing and Secure Data Communication in Wireless Sensor Networks.
[22]. Li, Fagen, Yanan Han, and Chunhua Jin. "Practical signcryption for secure communication of wireless sensor networks" Wireless Personal Communications 89.4 (2016): 1391-1412.
[23] Manjunath B E and P V Rao, “Trends of Recent Secure Communication System and its Effectiveness in Wireless Sensor Network” in International Journal of Advanced Computer Science and Applications (IJACSA) Volume 7, No. 9, 2016, (Thomson Reuters Indexed).
[24]. Liu, Zhi-xin, et al. "Balance energy-efficient and real-time with reliable communication protocol for wireless sensor network." The Journal of China Universities of Posts and Telecommunications 20.1 (2013): 37-46.
[25]. Mondal, Satyajit, Sraban Kumar Mohanty, and Sukumar Nandi. "Energy efficient secure communication architecture for wireless sensor network" Security and Communication Networks 9.16 (2016): 3314-3323.
[26]. Vaseghi, Behrouz, Mohammad Ali Pourmina, and Saleh Mobayen. "Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control." Nonlinear Dynamics 89.3 (2017): 1689-1704.
[27] Manjunath B E and P V Rao, “Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network” in International Journal of Electrical and Computer Engineering (IJECE), Volume 8, No. 2, April 2018, pp. 1048-1055.
[28] Manjunath B E and P V Rao, “Unique Analytical Modelling of Secure Communication in Wireless Sensor Network to Resist Maximum Threats” in International Journal of Advanced Computer Science and Applications (IJACSA), Volume 10 Issue 2, March 2019.
[29]. Yu, Hong, et al. "Enabling end-to-end secure communication between wireless sensor networks and the Internet." World Wide Web 16.4 (2013): 515-540.
[30] N Nasser, Y. Chen, “SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks”, Elsevier, Vol. 30, pp. 2401-2412, 2007
[31] J. Lee, L. Kim and T. Kwon, "FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks," in IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 6-14, Feb. 2016.
How to Cite
Dr. Manjunath B.E, Dr. R. Divya, & Dr. P. Vamsi Krishna. (1). Development of a Lightweight Security Framework for Optimal Routing in Secure Wireless Sensor Networks. Revista Electronica De Veterinaria, 25(1S), 1794-1805. https://doi.org/10.69980/redvet.v25i1S.1645