Energy efficient secure data collection with path-constrained mobile sink in duty-cycled unattended wireless sensor network

Abstract This paper addresses the problem of secure data transmission and balanced energy consumption in an unattended wireless sensor network (UWSN) comprising of multiple static source nodes and a mobile sink in the presence of adversaries. The proposed system comprises of three phases: the identification of data collection points (convex nodes), path planning by the mobile sink, and secure data transmission. An energy-aware convex hull algorithm is used for the identification of data collection points for data transmission to the mobile sink. Data transmission from sensor nodes to the nearest data collection point is performed using multihop communication and from sensor nodes to the mobile sink in a single hop. Data are securely transmitted through an elliptic curve cryptography based ElGamal scheme for message authentication. A data packet is associated with a digital signature. The variation in a digital signature and threshold energy obtained using support vector machine is used to determine the presence of malicious nodes in the network. The performance of the proposed system is evaluated using Cooja simulator by Contiki for various node counts under a static sink and mobile sink, with different threat scenarios. The results indicate that the proposed system is resilient against threats and provides satisfactory performance

[1]  Sajal K. Das,et al.  Data Collection in Wireless Sensor Networks with Mobile Elements: A Survey , 2011, TOSN.

[2]  Suraj Sharma,et al.  Proactive data routing using controlled mobility of a mobile sink in Wireless Sensor Networks , 2018, Comput. Electr. Eng..

[3]  Anthony T. Chronopoulos,et al.  An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs) , 2018 .

[4]  Roberto Di Pietro,et al.  Secure topology maintenance and events collection in WSNs , 2011, Secur. Commun. Networks.

[5]  Yu Gu,et al.  The Evolution of Sink Mobility Management in Wireless Sensor Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[6]  Sajal K. Das,et al.  Optimizing the Lifetime of Sensor Networks with Uncontrollable Mobile Sinks and QoS Constraints , 2016, TOSN.

[7]  Binoy Ravindran,et al.  An Automatic Presence Service for Low Duty-Cycled Mobile Sensor Networks , 2011, Mob. Networks Appl..

[8]  Xiong Li,et al.  An elliptic curve cryptography based lightweight authentication scheme for smart grid communication , 2018, Future Gener. Comput. Syst..

[9]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[10]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[11]  Sudip Misra,et al.  Policy controlled self-configuration in unattended wireless sensor networks , 2011, J. Netw. Comput. Appl..

[12]  Guihai Chen,et al.  Time-Independent Data Collection Protocol in Mobility-Assistant Wireless Sensor Networks with Duty Cycles , 2012, Int. J. Distributed Sens. Networks.

[13]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[14]  Saadi Boudjit,et al.  Duty-cycle SN-multi-point relay algorithm for mobile sink wireless sensor networks , 2015, IET Wirel. Sens. Syst..

[15]  S. Chandrakala,et al.  Erratum to: MRL-SCSO: Multi-agent Reinforcement Learning-Based Self-Configuration and Self-Optimization Protocol for Unattended Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[16]  S. Raja Rajeswari,et al.  Secured Energy Conserving Slot-Based Topology Maintenance Protocol for Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[17]  Amir Sarabi,et al.  Reducing delay and energy consumption in wireless sensor networks by making virtual grid infrastructure and using mobile sink , 2018 .

[18]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.