Secure Communication and Routing Architecture in Wireless Sensor Networks

Security of wireless sensor networks (WSN) is an important feature, as they are used in critical applications such as surveillance, monitoring, tracking and controlling etc. Secure and reliable communication is highly important in delivering critical information correctly and in-time by low-powered sensor motes (SM). Many secure WSNs protocols have been proposed but they have focused primarily on denial-of-communication at the routing or medium access control levels. Although WSNs have interesting distinctiveness (i.e., minimum set-up cost, unattended network operation), and because of the wireless medium (i.e., there are no gateways or routers to observe data flow), the security of these networks is the main issue, particularly when privacy is the main theme. Secure communication in WSNs reclines in the security of their routing protocols. However, resource bound security solutions are needed for WSNs. This paper has proposed novel security mechanism by combining features of two security architectures in WSNs, i.e., TESLA from SPINE and Bloom Filters (BF) from MiniSec. We have used TOSSIM for simulation and showed that our proposed mechanism perform better than other security schemes.

[1]  Ramu Kuchipudi,et al.  Key Distribution Approaches for Wireless Sensor Networks , 2012 .

[2]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[3]  Rabie A. Ramadan Agent Based Multipath Routing in wireless sensor networks , 2009, 2009 IEEE Symposium on Intelligent Agents.

[4]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[5]  Asaduzzaman Asaduzzaman,et al.  Security Issues in Wireless Sensor Networks: A Survey , 2013 .

[6]  Kamalrulnizam Abu Bakar,et al.  Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges , 2012, Sensors.

[7]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[8]  Kate Ching-Ju Lin,et al.  On Enhancing Network-Lifetime Using Opportunistic Routing in Wireless Sensor Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[9]  Dhiren R. Patel,et al.  FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks , 2012, ArXiv.

[10]  Pooja,et al.  Security Issues and Sybil Attack in Wireless Sensor Networks , 2013 .

[11]  Der-Jiunn Deng,et al.  Localization Algorithm for Wireless Sensor Networks , 2013, EMC/HumanCom.

[12]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[13]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[14]  Prasanta K. Jana,et al.  Energy-aware routing algorithm for wireless sensor networks , 2015, Comput. Electr. Eng..

[15]  Jaydip Sen,et al.  A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks , 2013, ArXiv.

[16]  Jie Wu,et al.  Providing hop-by-hop authentication and source privacy in wireless sensor networks , 2012, 2012 Proceedings IEEE INFOCOM.

[17]  Jaydip Sen An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks , 2013, Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence.

[18]  Álvaro Araujo,et al.  Security in cognitive wireless sensor networks. Challenges and open problems , 2012, EURASIP Journal on Wireless Communications and Networking.

[19]  Fazlullah Khan Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).