Abstract
Accomplishing enhanced security in a resource-constrained sensor node is one of the most challenging aspects in the area of Wireless Sensor Network (WSN). Review of current research approaches using shows that still there is a big gap in the evolving security practices and what is needed in reality for WSN. Therefore, the proposed system introduces a novel security scheme that is capable of identifying the security threats that usually comes in the deceiving form of incoming request. The analytical scheme presented by proposed system is simple and progressive manner where malicious requests after being identified are diverted as a mechanism of resistance. The simulated outcome of the proposed system shows that it offers good energy retention as well as better packet delivery performance in contrast to existing secure and energy efficient protocols and is in-line with practical security need of WSN.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kamila, N.K.: Handbook of Research on Wireless Sensor Network Trends, Technologies, and
Kocakulak, M., Butun, I.: An overview of wireless sensor networks towards Internet of Things. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 1–6 (2017)
Mehta, K., Pal, R.: Energy efficient routing protocols for wireless sensor networks: a survey. Energy 165 3 (2017)
Li, S.E., et al.: Kalman filter-based tracking of moving objects using linear ultrasonic sensor array for road vehicles. Mech. Syst. Sig. Process. 98, 173–189 (2018)
Borges, L.M., Velez, F.J., Lebres, A.S.: Survey on the characterization and classification of wireless sensor network applications. In: IEEE Communications Surveys and Tutorials, vol. 16, no. 4, pp. 1860–1890 (2014)
Nayak, P., Devulapalli, A.: A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime. IEEE Sens. J. 16(1), 137–144 (2016)
Tomić, I., McCann, J.A.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 4(6), 1910–1923 (2017)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. In: IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266–282 (2014)
Xu, J., Yang, G., Chen, Z., Wang, Q.: A survey on the privacy-preserving data aggregation in wireless sensor networks. China Commun. 12(5), 162–180 (2015)
Feng, W., Yan, Z., Zhang, H., Zeng, K., Xiao, Y., Hou, Y.T.: A survey on security, privacy, and trust in mobile crowdsourcing. IEEE Internet Things J. 5(4), 2971–2992 (2018)
Cui, J., et al.: Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer Peer Netw. Appl. 11(5), 1022–1037 (2018)
Moara-Nkwe, K., et al.: A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access 6, 11374–11387 (2018)
Kong, Y., et al.: The security network coding system with physical layer key generation in two-way relay networks. IEEE Access 6, 40673–40681 (2018)
Osanaiye, O.A., Alfa, A.S., Hancke, G.P.: Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6, 6975–7004 (2018)
Shah, K.A., Jinwala, D.C.: Privacy preserving, verifiable and resilient data aggregation in grid-based networks. Comput. J. 61(4), 614–628 (2018)
Luo, M., Luo, Y., Wan, Y., Wang, Z.: Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Secur. Commun. Netw. (2018)
Wu, L., Xu, Z., He, D., Wang, X.: New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Secur. Commun. Netw. (2018)
Li, W., Li, B., Zhao, Y., Wang, P., Wei, F.: Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks. Wirel. Commun. Mob. Comput. (2018)
El Hajji, F., Leghris, C., Douzi, K.: Adaptive routing protocol for lifetime maximization in multi-constraint wireless sensor networks. J. Commun. Inf. Netw. 3(1), 67–83 (2018)
Meena, U., Sharma, A.: Secure key agreement with rekeying using FLSO routing protocol in wireless sensor network. Wirel. Pers. Commun. 101, 1–23 (2018)
Lu, Y., Sun, N.A.: Resilient data aggregation method based on spatio-temporal correlation for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 157 (2018)
Tayebi, A., Berber, S., Swain, A.: Security enhancement of fix chaotic-DSSS in WSNs. IEEE Commun. Lett. 22(4), 816–819 (2018)
Merad Boudia, O.R., Senouci, S.M., Feham, M.: Secure and efficient verification for data aggregation in wireless sensor networks. Int. J. Netw. Manag. 28(1), e2000 (2018)
Sun, Z., Xu, Y., Liang, G., Zhou, Z.: An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens. J. 18(5), 1971–1984 (2018)
Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., Ding, Q.: Research on trust sensing based secure routing mechanism for wireless sensor network
Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J. 4(6), 2129–2141 (2017)
Umar, I.A., Hanapi, Z.M., Sali, A., Zulkarnain, Z.A.: TruFIX: a configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access 5, 2550–2562 (2017)
Meng, W., Li, W., Su, C., Zhou, J., Lu, R.: Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access 6, 7234–7243 (2018)
Shafiee, M., Vakili, V.T.: Comparative evaluation approach for spectrum sensing in cognitive wireless sensor networks (C-WSNs). Can. J. Electr. Comput. Eng. 41(2), 77–86 (2018)
Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6, 5688–5694 (2018)
Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R. Loureiro, A.A.F.: SecLEACH - a random key distribution solution for securing clustered sensor networks. In: Fifth IEEE International Symposium on Network Computing and Applications (NCA 2006), Cambridge, MA, pp. 145–154 (2006)
El_Saadawy, M., Shaaban, E.: Enhancing S-LEACH security for wireless sensor networks. In: 2012 IEEE International Conference on Electro/Information Technology, Indianapolis, IN, pp. 1–6 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Parande, S., Mallapur, J.D. (2019). Simplified Framework for Resisting Lethal Incoming Threats from Polluting in Wireless Sensor Network. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-19813-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19812-1
Online ISBN: 978-3-030-19813-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)