A trust enhancement scheme for cluster-based wireless sensor networks

AbstractSecurity is crucial in wireless sensor networks (WSNs) since a growing variety of applications require strict security. Cluster-based architecture has an enhancement in the system performance of WSNs. This article presents a trust enhancement scheme for cluster-based WSNs, where network time is divided into multiple rounds. Each round contains a setup phase and a steady-state phase. In the setup phase, clusters are formed and mutual trusted relationships between cluster nodes are established through two proposed authentication protocols called SET-μTESLA (Setup μTESLA) and SET-SCHNORR (Setup SCHNORR). SET-μTESLA uses the authenticated broadcast μTESLA scheme and reduces the iterations of hash function to improve the energy efficiency, while SET-SCHNORR applies a lightweight signature SCHNORR scheme. In the steady-state phase, collected environmental or physical data are transmitted through the proposed STEADY-μTESLA protocol (Steady-state μTESLA), which guarantees the data credibility. The analysis demonstrates that the security scheme does well in resisting such attacks as data confidentiality attacks, data integrity attacks and compromise node attacks. In addition, the results of calculations and simulations show that the proposed scheme performs better than the existing security protocols in terms of communication overhead and energy consumption.

[1]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[2]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[3]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[4]  Muhammad Khurram Khan,et al.  An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards , 2006, ISPEC.

[5]  Wen Hu,et al.  A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks , 2011, PM2HW2N '11.

[6]  Javier Blesa,et al.  A Security Scheme for Wireless Sensor Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[7]  T. Wark,et al.  Fleck - A platform for real-world outdoor sensor networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[8]  Andrei V. Gurtov,et al.  An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications , 2014, Sensors.

[9]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[10]  Christoph Krauß,et al.  T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks , 2011, SecureComm.

[11]  I. Valkova,et al.  LOCALIZATION OF GHRELIN IN THE EPITHELIAL CELLS OF THE DUODENUM IN THE RAT , 2015 .

[12]  Arun Kumar Sangaiah,et al.  Survey on clustering in heterogeneous and homogeneous wireless sensor networks , 2017, The Journal of Supercomputing.

[13]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[14]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[15]  Gang Chen,et al.  Automatically constructing trusted cluster computing environment , 2009, The Journal of Supercomputing.

[16]  Enzo Baccarelli,et al.  P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks , 2017, The Journal of Supercomputing.

[17]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[18]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[19]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[20]  Leendert van Doorn,et al.  A Practical Guide to Trusted Computing , 2007 .

[21]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[22]  Seungmin Rho,et al.  Multilayer cluster designing algorithm for lifetime improvement of wireless sensor networks , 2014, The Journal of Supercomputing.

[23]  Li Qing,et al.  Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks , 2006, Comput. Commun..

[24]  Prasanta K. Jana,et al.  A distributed algorithm for energy efficient and fault tolerant routing in wireless sensor networks , 2015, Wirel. Networks.

[25]  Apostolis K. Salkintzis Guest editorial - multimedia communications oiler satellites , 2001 .

[26]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[27]  Sai Ji,et al.  Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks , 2017, The Journal of Supercomputing.

[28]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[29]  Prasanta K. Jana,et al.  Energy Efficient Clustering and Routing Algorithms for Wireless Sensor Networks: GA Based Approach , 2015, Wireless Personal Communications.

[30]  Mohsen Guizani,et al.  PKC Based Broadcast Authentication using Signature Amortization for WSNs , 2012, IEEE Transactions on Wireless Communications.

[31]  Ameer Ahmed Abbasi,et al.  A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..

[32]  Yanjiang Yang,et al.  Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks , 2011, Secur. Commun. Networks.

[33]  Azer Bestavros,et al.  SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks , 2004 .

[34]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[35]  Christoph Krauß,et al.  Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques , 2007, ESAS.

[36]  Janusz Furtak,et al.  Securing transmissions between nodes of WSN using TPM , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).

[37]  Sanghamitra Panda,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2015 .

[38]  Jaecheol Ryou,et al.  ID-based sensor node authentication for multi-layer sensor networks , 2014, Journal of Communications and Networks.

[39]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[40]  Manisha J Nene,et al.  Chip-Based Key Distribution Technique for Security Enhancement in Hierarchical Wireless Sensors Networks , 2017, 2017 IEEE 7th International Advance Computing Conference (IACC).