Secure Routing in Cluster-Based Wireless Sensor Networks

One of the most important source of WSN vulnerability is the forwarding process between the nodes. In fact, routing protocols are often based on clustering principle, where a set of clusters represented by a Cluster Head (CH) for each cluster, is conceived to rely fundamentally data packets between the network nodes. These protocols are vulnerable to several attacks affecting different routing processes such as hello flooding, selective forwarding, replay process. These attacks are more damaging if the CH is corrupted by a malicious node playing CH role. This paper proposes a new secure protocol based on the well-known LEACH routing protocol named Hybrid Cryptography-Based Scheme for secure data communication in cluster-based WSN (HCBS). As a multi-constrained criteria approach, HCBS is built on a combination of the cryptography technique based on Elliptic Curves to exchange keys that uses symmetric keys for data encryption and MAC operations. After a set of tests on TOSSIM simulator, the results obtained showed that our proposal achieves good performances in terms of energy consumption, loss rate and end-to-end delay. In addition, HCBS guaranties a high level of security.

[1]  Mahesh Singh,et al.  Elliptic Curve Cryptography (ECC) for Security in wireless Sensor Network , 2012 .

[2]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[3]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[4]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  Lin Yang,et al.  Current Challenges and Approaches in Securing Communications for Sensors and Actuators , 2014 .

[6]  Dieter Hogrefe,et al.  A Survey on Measures for Secure Routing in Wireless Sensor Networks , 2012 .

[7]  Gang Hu,et al.  Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[11]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[14]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[15]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.