OLWS: Optimized Light Weight Secure Clustering protocol for Wireless Sensor Networks

The amount of research in wireless sensor networks (WSNs) is gaining a lot of interest in the research community. The sensors are deployed in the remote areas and establishment of communications between these nodes is ad-hoc in nature and thus are vulnerable to multiple security attacks which result in low network performance. The main bottleneck in these sensor nodes is the limited resources and because of that traditional security mechanism which involves complex computations and large communication overhead are not feasible. So designing and implementing a secure and efficient WSN is a challenging task. In this paper, we present a novel approach called “Optimized Light Weight Secure Clustering protocol (OLWS) for WSN” to increase the security with reduced overhead. In OLWS, the key for hashing is generated dynamically and calculated based on the identity of the node hence the complexity of key management is reduced. The proposed protocol leads to early detection of the attacker as in case of attack, the adversary node is identified at the cluster head only. Extensive simulations are done on NS2 and results indicate that OLWS performs better in terms of energy consumption and provide an increased level of security.

[1]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[2]  Naixue Xiong,et al.  A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks , 2018, Sensors.

[3]  R. B. Patel,et al.  A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks , 2013, Int. J. Netw. Secur..

[4]  Swapna B Sasi,et al.  A General Comparison of Symmetric and Asymmetric Cryptosystems for WSNs and an Overview of Location Based Encryption Technique for Improving Security , 2014 .

[5]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[6]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[7]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[8]  Sajal K. Das,et al.  On the Energy Hole Problem of Nonuniform Node Distribution in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[9]  Kahina Chelli,et al.  Security Issues in Wireless Sensor Networks : Attacks and Countermeasures , 2015 .

[10]  Preetika Joshi,et al.  Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[11]  Abdelkamel Tari,et al.  Lightweight identity-based authentication protocol for wireless sensor networks , 2016, Int. J. Inf. Comput. Secur..

[12]  Baijian Yang,et al.  Internet of things: Survey on security , 2017, Inf. Secur. J. A Glob. Perspect..