SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs

Security is one of the main objectives while designing protocols for underwater wireless sensor networks (UWSN), since the sensors in UWSN are vulnerable to malicious attack. So it becomes easy for opponents to manipulate the communication channel of UWSN and its nodes. Authentication and data integrity play important roles in the context of security to make network scalable and survivable. Hence in this paper, a secure authentication and protected data aggregation method for the cluster based structure of UWSN is proposed as because cluster based arrangement produces a concise and stable network. In this technique, the cluster head in each cluster is authenticated by the gateway to ensure that all the clusters are being handled by valid nodes. Also, the data being communicated in the network will be securely handled to ensure that it will not get compromised during network operations. In this way, the security of all the nodes is ensured to maintain safe network communication. The proposed technique improves the data reliability in the network by reducing the energy consumption and delay. Here, the proposed method is moreover compared with the state of the art techniques to prove the validity and effectiveness.

[1]  Sunilkumar S. Manvi,et al.  Fuzzy and PSO Based Clustering Scheme in Underwater Acoustic Sensor Networks Using Energy and Distance Parameters , 2019, Wirel. Pers. Commun..

[2]  Yonghwan Jeong,et al.  An Efficient MOP Decision Method Using Hop Interval for RPL-Based Underwater Sensor Networks , 2017, Wirel. Pers. Commun..

[3]  Ning Sun,et al.  Secure communication for underwater acoustic sensor networks , 2015, IEEE Communications Magazine.

[4]  Chau Yuen,et al.  Energy harvesting communications: Part 2 [Guest Editorial] , 2015, IEEE Communications Magazine.

[5]  Dario Pompili,et al.  Underwater Acoustic Carrier Aggregation: Achievable Rate and Energy-Efficiency Evaluation , 2017, IEEE Journal of Oceanic Engineering.

[6]  Soo-Hyun Park,et al.  Ticket-based authentication protocol for Underwater Wireless Sensor Network , 2016, 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN).

[7]  Anil Kumar Verma,et al.  Improved Data Aggregation for Cluster Based Underwater Wireless Sensor Networks , 2017 .

[8]  M. Sindhuja,et al.  Cluster Head Selection Framework for Risk Awareness Enabled IoT Networks Using Ant Lion Optimisation Approach , 2019, Wirel. Pers. Commun..

[9]  Ahmed I. Saleh,et al.  Survey on Wireless Sensor Network Applications and Energy Efficient Routing Protocols , 2018, Wireless Personal Communications.

[10]  Hossein Karimi,et al.  Implementing a Reliable, Fault Tolerance and Secure Framework in the Wireless Sensor-actuator Networks for Events Reporting , 2015 .

[11]  Frank Y. Li,et al.  Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs , 2013, Comput. Commun..

[12]  Seema Verma,et al.  A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks , 2015 .

[13]  Deying Li,et al.  A Low Computational Complexity Authentication Scheme in Underwater Wireless Sensor Network , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[14]  Balwinder Singh Dhaliwal,et al.  Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks , 2016 .

[15]  Tooska Dargahi,et al.  Securing Underwater Sensor Networks Against Routing Attacks , 2017, Wirel. Pers. Commun..

[16]  Daqi Zhu,et al.  A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[17]  Anil Kumar Verma,et al.  Data aggregation in underwater wireless sensor network: Recent approaches and issues , 2017, J. King Saud Univ. Comput. Inf. Sci..

[18]  Rajeshwari Pandey,et al.  Operational Transresistance Amplifier Based Wienbridge Oscillator and Its Harmonic Analysis , 2019, Wirel. Pers. Commun..

[19]  Guangjie Han,et al.  A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks , 2016, Sensors.

[20]  Jihong Guan,et al.  Towards a Secure Medium Access Control Protocol for Cluster-Based Underwater Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[21]  Mayank Dave,et al.  Protocol Stack of Underwater Wireless Sensor Network: Classical Approaches and New Trends , 2018, Wireless Personal Communications.

[22]  Sayyed Majid Mazinani,et al.  A Vector-Based Routing Protocol in Underwater Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[23]  Rakesh Kumar,et al.  A Survey on Data Aggregation And Clustering Schemes in Underwater Sensor Networks , 2014 .

[24]  Mayank Dave,et al.  A novel fault detection and recovery technique for cluster‐based underwater wireless sensor networks , 2018, Int. J. Commun. Syst..

[25]  E. I. Hamilton,et al.  Comments on the trace element chemistry of water: sampling a key factor in water quality surveillance. , 1972, Environmental letters.

[26]  Zara Hamid,et al.  QoS in Wireless Multimedia Sensor Networks: A Layered and Cross-Layered Approach , 2014, Wirel. Pers. Commun..

[27]  Sabu M. Thampi,et al.  Secure communication in mobile underwater wireless sensor networks , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[28]  J. Martin Leo Manickam,et al.  Energy Efficient Shortest Path Routing Protocol for Underwater Acoustic Wireless Sensor Network , 2018, Wirel. Pers. Commun..

[29]  Rahman Zandi,et al.  Distributed estimation of sensors position in underwater wireless sensor network , 2015 .

[30]  Chunming Qiao,et al.  Cooperative Search and Survey Using Autonomous Underwater Vehicles (AUVs) , 2011, IEEE Transactions on Parallel and Distributed Systems.

[31]  Dejey,et al.  Balanced and Multi-objective Optimized Opportunistic Routing for Underwater Sensor Networks , 2017, Wirel. Pers. Commun..

[32]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[33]  Younghwan Yoo,et al.  Practical Multiple User System Using Heterogeneous Frequency Modulation for High Data Rate in Underwater Sensor Network , 2019, Wirel. Pers. Commun..

[34]  Peng Ning,et al.  Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks , 2012, Ad Hoc Networks.

[35]  V Geetha,et al.  A Distributed Trust Based Secure Communication Framework for Wireless Sensor Network , 2014 .

[36]  R. M. Gomathi,et al.  Energy Efficient Static Node Selection in Underwater Acoustic Wireless Sensor Network , 2019, Wirel. Pers. Commun..

[37]  Keqin Li,et al.  A secure routing scheme for underwater acoustic networks , 2017, Int. J. Distributed Sens. Networks.

[38]  Mayank Dave,et al.  Energy Efficient Architecture for Intra and Inter Cluster Communication for Underwater Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[39]  Wang Jian,et al.  Classification of DoS Attacks in Smart Underwater Wireless Sensor Network , 2019, Wireless Personal Communications.

[40]  Mazleena Salleh,et al.  CBE2R: clustered-based energy efficient routing protocol for underwater wireless sensor network , 2018, International Journal of Electronics.

[41]  Gianluca Dini,et al.  A Secure Communication Suite for Underwater Acoustic Sensor Networks , 2012, Sensors.