Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

[1]  Falko Dressler,et al.  Benefits of Bio-inspired Technologies for Networked Embedded Systems: An Overview , 2006, Organic Computing - Controlled Emergence.

[2]  Pramod K. Varshney,et al.  Geographic Routing in Wireless Ad Hoc Networks , 2009, Guide to Wireless Ad Hoc Networks.

[3]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[4]  Yuanyuan Zhang,et al.  A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography , 2016, Secur. Commun. Networks.

[5]  Mehmet A. Orgun,et al.  Secure transfer of environmental data to enhance human decision accuracy , 2015, Comput. Hum. Behav..

[6]  Peter Schuster,et al.  A principle of natural self-organization , 1977, Naturwissenschaften.

[7]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[8]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[9]  Mehmet A. Orgun,et al.  Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience , 2015, Comput. Hum. Behav..

[10]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[11]  Mehmet A. Orgun,et al.  Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[12]  Vijay Varadharajan,et al.  A trust management architecture for hierarchical wireless sensor networks , 2010, IEEE Local Computer Network Conference.

[13]  Kashif Saleem,et al.  Enhanced Ant Colony algorithm for self-optimized data assured routing in wireless sensor networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[14]  Kashif Saleem,et al.  An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.

[15]  Deborah Estrin,et al.  Statistical model of lossy links in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[16]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[17]  Weibo Gong,et al.  Dynamic Wireless Security , 2014 .

[18]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[19]  Sanggon Lee,et al.  A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation , 2015, Sensors.

[20]  Yacine Challal,et al.  SMART: Secure Multi-pAths Routing for wireless sensor neTworks , 2014, ADHOC-NOW.

[21]  Fernando Boavida,et al.  An Energy-Efficient Ant-Based Routing Algorithm for Wireless Sensor Networks , 2006, ANTS Workshop.

[22]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[23]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[24]  Norsheila Fisal,et al.  Ant colony inspired self-optimized routing protocol based on cross layer architecture for wireless sensor networks , 2010, ICC 2010.

[25]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[26]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[27]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[28]  A. Gani,et al.  Geographic Wormhole Detection in Wireless Sensor Networks , 2015, PloS one.

[29]  Xing Li,et al.  Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks , 2015, Sensors.

[30]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[31]  M. Eigen,et al.  The Hypercycle: A principle of natural self-organization , 2009 .

[32]  H. Von Foerster,et al.  On Self-Organizing Systems and Their Environments , 2003 .

[33]  Kashif Saleem,et al.  Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.

[34]  Abdullah Al-Dhelaan,et al.  Integrated Protocols to Ensure Security Services in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[35]  Bo Sheng,et al.  Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[36]  Kashif Saleem,et al.  Biological inspired secure autonomous routing mechanism for wireless sensor networks , 2011, Int. J. Intell. Inf. Database Syst..

[37]  Yun Liu,et al.  Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks , 2015, Sensors.

[38]  Shuang Liu,et al.  Implementing the TEA algorithm on sensors , 2004, ACM-SE 42.

[39]  Sungyoung Lee,et al.  Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[40]  샤나즈 A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network , 2011 .

[41]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[42]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[43]  Choong Seon Hong,et al.  SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks , 2008, Ann. des Télécommunications.

[44]  Liang Zhou,et al.  A Data Encryption Solution for Mobile Health Apps in Cooperation Environments , 2013, Journal of medical Internet research.

[45]  Kashif Saleem,et al.  BIOSARP: biological inspired self-organized secure autonomous routing protocol for wireless sensor network , 2011 .

[46]  Norsheila Fisal,et al.  Secure real-time routing protocol with load distribution in wireless sensor networks , 2011, Secur. Commun. Networks.

[47]  Han-Chieh Chao,et al.  A survey of key distribution in wireless sensor networks , 2014, Secur. Commun. Networks.

[48]  Kyung Sup Kwak,et al.  A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.

[49]  Chae Hoon Lim LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.