Creating a secure index for distributed data on the sensor network

Wireless sensor networks (WSNs) deployed in public and untrusted environments are prone to various security vulnerabilities. In this paper, a method has been developed to reduce the security risk of a node from tampering. The sensed data is distributed using the roots of the polynomial equation, thereby reducing the security risk. We propose a security mechanism that works on a clustered heterogeneous network. The index, located on the cluster head, is used for efficient retrieval of data. The scheme provides end-to-end confidentiality. The encrypted data can be decrypted only at the base station and it offers single-value granularity. It provides data confidentiality, authentication and authorisation. We have analysed the performance of the algorithm in terms of energy consumption. The energy consumption has increased with the addition of security. Even though the energy consumption has increased, the network can fulfil the purpose of data collection and can be deployed on large-scale networks.

[1]  Felix C. Freiling,et al.  Attacker Models for Wireless Sensor Networks , 2010, it Inf. Technol..

[2]  Jie Gao,et al.  Double Rulings for Information Brokerage in Sensor Networks , 2006, IEEE/ACM Transactions on Networking.

[3]  Eu-Jin Goh,et al.  Secure Indexes , 2003, IACR Cryptol. ePrint Arch..

[4]  Ivan Stojmenovic,et al.  Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.

[5]  Laurence T. Yang,et al.  Scalable and efficient key management for heterogeneous sensor networks , 2008, The Journal of Supercomputing.

[6]  Ivan Stojmenovic,et al.  Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks , 2009, IEEE Transactions on Computers.

[7]  Lek Heng Ngoh,et al.  An efficient resiliency scheme for data centric storage in wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[8]  Kuei-Ping Shih,et al.  A grid-based dynamic load balancing approach for data-centric storage in wireless sensor networks , 2010, Comput. Electr. Eng..

[9]  Deborah Estrin,et al.  Data-centric storage in sensornets , 2003, CCRV.

[10]  Jianying Zhou,et al.  Wireless Sensor Networks Security , 2008 .

[11]  Stefano Chessa,et al.  Q-NiGHT: Adding QoS to Data Centric Storage in Non-Uniform Sensor Networks , 2007, 2007 International Conference on Mobile Data Management.

[12]  Robert W. Brennan,et al.  A Comparison of Alternative Distributed Dynamic Cluster Formation Techniques for Industrial Wireless Sensor Networks , 2016, Sensors.

[13]  Rabie A. Ramadan,et al.  Smart Environmental Monitoring Using Wireless Sensor Networks , 2013 .

[14]  Jens Grossklags,et al.  Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks , 2003, Mobile Data Management.

[15]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[16]  Slawomir Wesolkowski,et al.  A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks , 2016, Recent Advances in Computational Intelligence in Defense and Security.

[17]  Dong Xuan,et al.  A dynamic geographic hash table for data-centric storage in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[18]  Daniel Curiac,et al.  Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges , 2016, Sensors.

[19]  Peter Desnoyers,et al.  TSAR: a two tier sensor storage architecture using interval skip graphs , 2005, SenSys '05.

[20]  João Barros,et al.  A Network Coding Approach to Secret Key Distribution , 2008, IEEE Transactions on Information Forensics and Security.

[21]  Deborah Estrin,et al.  GHT: a geographic hash table for data-centric storage , 2002, WSNA '02.

[22]  Subhash C. Kak,et al.  A Distributed Data Storage Scheme for Sensor Networks , 2009, MobiSec.

[23]  Ivan Stojmenovic,et al.  Mesh-Based Sensor Relocation for Coverage Maintenance in Mobile Sensor Networks , 2007, UIC.

[24]  Dandan Liu,et al.  A Scalable Quorum Based Location Service in Ad Hoc and Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[25]  Ivan Stojmenovic,et al.  A scalable quorum-based location service in ad hoc and sensor networks , 2008 .