Skip to main content

Simplified Framework for Resisting Lethal Incoming Threats from Polluting in Wireless Sensor Network

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 986))

Abstract

Accomplishing enhanced security in a resource-constrained sensor node is one of the most challenging aspects in the area of Wireless Sensor Network (WSN). Review of current research approaches using shows that still there is a big gap in the evolving security practices and what is needed in reality for WSN. Therefore, the proposed system introduces a novel security scheme that is capable of identifying the security threats that usually comes in the deceiving form of incoming request. The analytical scheme presented by proposed system is simple and progressive manner where malicious requests after being identified are diverted as a mechanism of resistance. The simulated outcome of the proposed system shows that it offers good energy retention as well as better packet delivery performance in contrast to existing secure and energy efficient protocols and is in-line with practical security need of WSN.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Kamila, N.K.: Handbook of Research on Wireless Sensor Network Trends, Technologies, and

    Google Scholar 

  2. Kocakulak, M., Butun, I.: An overview of wireless sensor networks towards Internet of Things. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 1–6 (2017)

    Google Scholar 

  3. Mehta, K., Pal, R.: Energy efficient routing protocols for wireless sensor networks: a survey. Energy 165 3 (2017)

    Article  Google Scholar 

  4. Li, S.E., et al.: Kalman filter-based tracking of moving objects using linear ultrasonic sensor array for road vehicles. Mech. Syst. Sig. Process. 98, 173–189 (2018)

    Article  Google Scholar 

  5. Borges, L.M., Velez, F.J., Lebres, A.S.: Survey on the characterization and classification of wireless sensor network applications. In: IEEE Communications Surveys and Tutorials, vol. 16, no. 4, pp. 1860–1890 (2014)

    Article  Google Scholar 

  6. Nayak, P., Devulapalli, A.: A fuzzy logic-based clustering algorithm for WSN to extend the network lifetime. IEEE Sens. J. 16(1), 137–144 (2016)

    Article  Google Scholar 

  7. Tomić, I., McCann, J.A.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 4(6), 1910–1923 (2017)

    Article  Google Scholar 

  8. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. In: IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266–282 (2014)

    Article  Google Scholar 

  9. Xu, J., Yang, G., Chen, Z., Wang, Q.: A survey on the privacy-preserving data aggregation in wireless sensor networks. China Commun. 12(5), 162–180 (2015)

    Article  Google Scholar 

  10. Feng, W., Yan, Z., Zhang, H., Zeng, K., Xiao, Y., Hou, Y.T.: A survey on security, privacy, and trust in mobile crowdsourcing. IEEE Internet Things J. 5(4), 2971–2992 (2018)

    Article  Google Scholar 

  11. Cui, J., et al.: Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer Peer Netw. Appl. 11(5), 1022–1037 (2018)

    Article  Google Scholar 

  12. Moara-Nkwe, K., et al.: A novel physical layer secure key generation and refreshment scheme for wireless sensor networks. IEEE Access 6, 11374–11387 (2018)

    Article  Google Scholar 

  13. Kong, Y., et al.: The security network coding system with physical layer key generation in two-way relay networks. IEEE Access 6, 40673–40681 (2018)

    Article  Google Scholar 

  14. Osanaiye, O.A., Alfa, A.S., Hancke, G.P.: Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6, 6975–7004 (2018)

    Article  Google Scholar 

  15. Shah, K.A., Jinwala, D.C.: Privacy preserving, verifiable and resilient data aggregation in grid-based networks. Comput. J. 61(4), 614–628 (2018)

    Article  Google Scholar 

  16. Luo, M., Luo, Y., Wan, Y., Wang, Z.: Secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the IoT. Secur. Commun. Netw. (2018)

    Google Scholar 

  17. Wu, L., Xu, Z., He, D., Wang, X.: New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Secur. Commun. Netw. (2018)

    Google Scholar 

  18. Li, W., Li, B., Zhao, Y., Wang, P., Wei, F.: Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks. Wirel. Commun. Mob. Comput. (2018)

    Google Scholar 

  19. El Hajji, F., Leghris, C., Douzi, K.: Adaptive routing protocol for lifetime maximization in multi-constraint wireless sensor networks. J. Commun. Inf. Netw. 3(1), 67–83 (2018)

    Article  Google Scholar 

  20. Meena, U., Sharma, A.: Secure key agreement with rekeying using FLSO routing protocol in wireless sensor network. Wirel. Pers. Commun. 101, 1–23 (2018)

    Article  Google Scholar 

  21. Lu, Y., Sun, N.A.: Resilient data aggregation method based on spatio-temporal correlation for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 157 (2018)

    Google Scholar 

  22. Tayebi, A., Berber, S., Swain, A.: Security enhancement of fix chaotic-DSSS in WSNs. IEEE Commun. Lett. 22(4), 816–819 (2018)

    Article  Google Scholar 

  23. Merad Boudia, O.R., Senouci, S.M., Feham, M.: Secure and efficient verification for data aggregation in wireless sensor networks. Int. J. Netw. Manag. 28(1), e2000 (2018)

    Article  Google Scholar 

  24. Sun, Z., Xu, Y., Liang, G., Zhou, Z.: An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens. J. 18(5), 1971–1984 (2018)

    Article  Google Scholar 

  25. Qin, D., Yang, S., Jia, S., Zhang, Y., Ma, J., Ding, Q.: Research on trust sensing based secure routing mechanism for wireless sensor network

    Google Scholar 

  26. Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J. 4(6), 2129–2141 (2017)

    Article  Google Scholar 

  27. Umar, I.A., Hanapi, Z.M., Sali, A., Zulkarnain, Z.A.: TruFIX: a configurable trust-based cross-layer protocol for wireless sensor networks. IEEE Access 5, 2550–2562 (2017)

    Article  Google Scholar 

  28. Meng, W., Li, W., Su, C., Zhou, J., Lu, R.: Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access 6, 7234–7243 (2018)

    Article  Google Scholar 

  29. Shafiee, M., Vakili, V.T.: Comparative evaluation approach for spectrum sensing in cognitive wireless sensor networks (C-WSNs). Can. J. Electr. Comput. Eng. 41(2), 77–86 (2018)

    Google Scholar 

  30. Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Ariffin, K.A., Song, H.: Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6, 5688–5694 (2018)

    Article  Google Scholar 

  31. Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R. Loureiro, A.A.F.: SecLEACH - a random key distribution solution for securing clustered sensor networks. In: Fifth IEEE International Symposium on Network Computing and Applications (NCA 2006), Cambridge, MA, pp. 145–154 (2006)

    Google Scholar 

  32. El_Saadawy, M., Shaaban, E.: Enhancing S-LEACH security for wireless sensor networks. In: 2012 IEEE International Conference on Electro/Information Technology, Indianapolis, IN, pp. 1–6 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Somu Parande .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parande, S., Mallapur, J.D. (2019). Simplified Framework for Resisting Lethal Incoming Threats from Polluting in Wireless Sensor Network. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_3

Download citation

Publish with us

Policies and ethics