In the past few years secure transmission of data along with efficiency is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and convenient way to enhance performance of the WSNs system. efficient data transmission is one of the most important issues for WSNs. Meanwhile, many WSNs are deployed in harsh, neglected and often adversarial physical environments for certain applications, such as military domains and sensing tasks with trustless surroundings In this project work, we study a secure transmission of data for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and sporadically,periodically. We make use of two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by means of the IdentityBased digital Signature (IBS) scheme and the IdentityBased Online/Offline digital Signature (IBOOS) scheme, correspondingly. In this paper, after rigorous practical and theoretical analysis, we have designed efficient protocols to provide defense against innumerable security attacks in the clustered wireless sensor deployment environments. We have tried to address challenges like communication and computation overhead along with security to increase the performance of the deployed sensors. The results show that the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption. Most existing time synchronization schemes are vulnerable to several attacks. Their low costs impede use of expensive tamperresistant hardware. Existing solutions are provided for distributed WSNs, but not for CWSNs.It reduces the possibility of a node joining with a CH.Problem occurs when a node does not share a pairwise key with others in its preloaded key ring. In the proposed protocols pairing parameters are distributed and preloaded in all sensor nodes by the BS initially. It overcomes the key escrow problem of the ID-based cryptosystem and is efficient in communication and saves energy. And Solve the orphan node problem in the secure data transmission with asymmetric key management and is more feasible.
[1]
Anantha P. Chandrakasan,et al.
An application-specific protocol architecture for wireless microsensor networks
,
2002,
IEEE Trans. Wirel. Commun..
[2]
Dharma P. Agrawal,et al.
An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol
,
2002,
IEEE Trans. Parallel Distributed Syst..
[3]
Yong Wang,et al.
A survey of security issues in wireless sensor networks
,
2006,
IEEE Communications Surveys & Tutorials.
[4]
Ameer Ahmed Abbasi,et al.
A survey on clustering algorithms for wireless sensor networks
,
2007,
Comput. Commun..
[5]
Ricardo Dahab,et al.
SecLEACH - On the security of clustered sensor networks
,
2007,
Signal Process..
[6]
Soumendra Nath Lahiri,et al.
Security and performance analysis of a secure clustering protocol for sensor networks
,
2007,
Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).
[7]
Yookun Cho,et al.
PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks
,
2007,
Comput. Commun..
[8]
Cong Wang,et al.
A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management
,
2008,
2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[9]
Takahiro Hara,et al.
Wireless Sensor Network Technologies for the Information Explosion Era
,
2012,
Wireless Sensor Network Technologies for the Information Explosion Era.
[10]
Sanjay Kumar Jena,et al.
A survey on secure hierarchical routing protocols in wireless sensor networks
,
2011,
ICCCS '11.
[11]
K. Pradeepa,et al.
Design and Implementation Issues of Clustering in Wireless Sensor Networks
,
2012
.