Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks

Wireless Sensor Networks (WSNs) is a collection of tiny distributed sensor nodes that have been used to sense the physical parameters of the environment where it has been deployed. Data dissemination is an important activity performed in WSNs in order to administer and manage them. Gossiping makes the network to transmit the same data item multiple times by multiple sensor nodes to their neighbors until they reach the required nodes which are in need of them. These multiple transmissions result in a problem called a Redundant Broadcast Storm Problem (RBSP). Moreover, the RBSP results in too many senders’ problem and also leads to the consumption of more energy in the network. In data dissemination, providing energy efficiency and security are the two major challenging issues. In such a scenario, the attackers may make use of the weakness in security provisions available in the network and they can perform unauthorized activities to disrupt the process of data dissemination. Hence, it is necessary to address the issues of RBSP, energy consumption, security and too many senders problem in order to enhance the reliability and security of communication in WSN for data dissemination. In this paper, a novel protocol named Cluster based Secured Data dissemination Protocol (CSDP) has been proposed for providing energy efficient and secured dissemination of data. The proposed protocol is a distributed protocol which considers the route discovery process, cluster formation, cluster head selection, cluster based routing and security through the design of a new digital signature based authentication algorithm, trust based security enhancement and encryption techniques for effective key management. The major contributions of the proposed work include the proposal of cryptography based public key and private key generation algorithms, techniques for trust score computation and malicious node identification and finally the effective prevention of malicious activities for enhancing the security of the network. Moreover, this work considers node identification techniques for effective clustering of nodes and performs optimal route discovery and secured transmission of packets. This work is novel with respect to multicast based data dissemination protocol, proposal of combined signature generation and verification schemes, encryption based key management and distributed data collection and communication techniques. In addition, an Intelligent Fuzzy based Unequal Clustering algorithm is used to perform effective clustering process and the traffic analyzer to identify the intruders by monitoring the node’s behaviors and their trust values. The proposed protocol has been extensively tested with realistic simulation parameters using NS2 simulator. The simulation results obtained from this work have proved that the proposed protocol improves the level of security through the proposal of a time efficient encryption and decryption algorithm with increase in packet delivery ratio and network throughput and at the same time it reduces the energy consumption as well as delay in data dissemination.

[1]  Kyung-Ah Shim,et al.  BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Philip Levis,et al.  Data Discovery and Dissemination with DIP , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[3]  Nazar Abbas Saqib,et al.  AAGV: A Cluster Based Multicast Routing Protocol for Autonomous Aerial and Ground Vehicles Communication in VANET , 2017, 2017 International Conference on Frontiers of Information Technology (FIT).

[4]  Mohsen Guizani,et al.  Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks , 2015, IEEE Transactions on Wireless Communications.

[5]  Waqar Farooq,et al.  A Novel Real Time Framework for Cluster Based Multicast Communication in Vehicular Ad Hoc Networks , 2016, Int. J. Distributed Sens. Networks.

[6]  Arputharaj Kannan,et al.  An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks , 2019, Wireless Personal Communications.

[7]  Xia Wang,et al.  Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility , 2017, IEEE Transactions on Vehicular Technology.

[8]  Wu-chi Feng,et al.  DHV: A Code Consistency Maintenance Protocol for Multi-hop Wireless Sensor Networks , 2009, EWSN.

[9]  Yogesh Palanichamy,et al.  Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN , 2018, Wirel. Networks.

[10]  Hao Li,et al.  Study on Location of Wireless Sensor Network Node in Forest Environment , 2017 .

[11]  Mohsen Guizani,et al.  Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[12]  Ivan Stojmenovic,et al.  Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.

[13]  Arputharaj Kannan,et al.  Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks , 2019, Wirel. Networks.

[14]  Wasi Haider Butt,et al.  Evaluation of clustering algorithms for wireless sensor and actor networks , 2018, 2018 15th International Bhurban Conference on Applied Sciences and Technology (IBCAST).

[15]  Rui Zhang,et al.  LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.

[16]  Arputharaj Kannan,et al.  Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks , 2018, Comput. Electr. Eng..

[17]  Kannan Arputharaj,et al.  Detection of DoS attacks in cloud networks using intelligent rule based classification system , 2018, Cluster Computing.

[18]  Wei Dong,et al.  A Lightweight and Density-Aware Reprogramming Protocol for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.

[19]  Eanoch Golden Julie,et al.  CDS-Fuzzy Opportunistic Routing Protocol for Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[20]  Junbeom Hur,et al.  Fine-grained data access control for distributed sensor networks , 2011, Wirel. Networks.

[21]  Chin-Ming Hsu A group digital signature technique for authentication , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[22]  Mohsen Guizani,et al.  Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[23]  Qiang Wang,et al.  Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.

[24]  Tae Ho Cho,et al.  A method to control the probability of attempts to verify a report in Statistical En-Route Filtering , 2011, The 7th International Conference on Digital Content, Multimedia Technology and its Applications.

[25]  P Yogesh,et al.  Privacy Preserving with Enhanced Access Control for Distributed Data Dissemination in WSN , 2016 .

[26]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[27]  P. Velvizhy,et al.  A rule based delay constrained energy efficient routing technique for wireless sensor networks , 2017, Cluster Computing.

[28]  Ammar Hawbani,et al.  Sink-oriented tree based data dissemination protocol for mobile sinks wireless sensor networks , 2018, Wirel. Networks.

[29]  Jie Wu,et al.  Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[30]  Muhammad Sher,et al.  An efficient and reliable clustering algorithm for wireless sensor actor networks (WSANs) , 2010, 2010 53rd IEEE International Midwest Symposium on Circuits and Systems.

[31]  Issa M. Khalil,et al.  Stream: Low Overhead Wireless Reprogramming for Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[32]  Kamalrulnizam Abu Bakar,et al.  Adaptive energy aware cluster-based routing protocol for wireless sensor networks , 2017, Wirel. Networks.

[33]  S. Arora,et al.  Node Localization in Wireless Sensor Networks Using Butterfly Optimization Algorithm , 2017, Arabian Journal for Science and Engineering.

[34]  Yaping Lin,et al.  RAS: A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.

[35]  Sannasi Ganapathy,et al.  Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT , 2019, Comput. Networks.

[36]  Kannan Arputharaj,et al.  Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks , 2020, IET Commun..

[37]  Jianping Pan,et al.  Optimal Dropbox Deployment Algorithm for Data Dissemination in Vehicular Networks , 2018, IEEE Transactions on Mobile Computing.

[38]  Kui Ren,et al.  Distributed Privacy-Preserving Access Control in Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[39]  Jianping Pan,et al.  Delay Minimization for Data Dissemination in Large-Scale VANETs with Buses and Taxis , 2016, IEEE Transactions on Mobile Computing.

[40]  David E. Culler,et al.  Design of an application-cooperative management system for wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[41]  Kannan Arputharaj,et al.  Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN , 2020, Soft Computing.

[42]  Mohsen Guizani,et al.  A Node Location Algorithm Based on Node Movement Prediction in Underwater Acoustic Sensor Networks , 2020, IEEE Transactions on Vehicular Technology.

[43]  David E. Culler,et al.  The dynamic behavior of a data dissemination protocol for network programming at scale , 2004, SenSys '04.

[44]  Yunhao Liu,et al.  Bulk data dissemination in wireless sensor networks: Modeling and analysis , 2012, Comput. Networks.

[45]  Prasun Sinha,et al.  Sprinkler: a reliable and energy efficient data dissemination service for wireless embedded devices , 2005, 26th IEEE International Real-Time Systems Symposium (RTSS'05).

[46]  Sajal K. Das,et al.  ReMo : An Energy Efficient Reprogramming Protocol for Mobile Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[47]  Arputharaj Kannan,et al.  Fuzzy logic based unequal clustering for wireless sensor networks , 2016, Wirel. Networks.

[48]  Nauman Aslam,et al.  An Energy Efficient Fuzzy Logic Cluster Formation Protocol in Wireless Sensor Networks , 2012, ANT/MobiWIS.

[49]  Peng Ning,et al.  Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[50]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.