Abstract
Wireless sensor network consists of micro electromechanical sensor nodes which are operated by battery power. Sensor network has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The modern researchers are facing the various issues concerning sensor networks more graciously. However, offering security to an energy constrained network of sensor nodes is still a challenge. The proposed scheme named as Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks adopts a hierarchical network model coupled with low weight security mechanisms in order to conserve energy as well as offer security to the network. Elliptic Curve Cryptography (ECC) based public key cryptography, Elliptic-Curve Diffie-Hellman (ECDH) key exchange scheme, nested hash based message authentication codes (HMAC) and RC5 symmetric cypher are the light-weight security methods used by the proposed scheme. Simulation results prove that SCBRS performs better than Tree Based Protocol for Key Management in Wireless Sensor Networks in terms of energy efficiency and security. SCBRS also performs better than Secure Hierarchical Routing Protocol (SHRP) in fields where security is the most important issue.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kulik, J., Heinzelman, W.R., Balakrishnan, H.: Negotiation based protocols for disseminating information in wireless sensor networks. Wirel. Netw. 8, 169–185 (2002)
Mishra, A.R., Singh, M.: Elliptic curve cryptography (ECC) for security in wireless sensor network. Int. J. Eng. Res. Technol. (IJERT) 1(3), 1–6 (2012)
Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A, Wander, A.S.: Embedded end-to-end wireless security with ECDH key exchange. Published in: Circuits and Systems, 2003 IEEE 46th Midwest Symposium, vol. 2, pp. 786–789 (2003)
Rivest, R.L.: The RC5 encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Berlin (1995)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1, 293–315 (2003). Elsevier Journal, doi:10.1016/S1570-8705(03)00008-8
Azarderakhsh, R., Reyhani-Masoleh, A., Abid, Z.-E.: A key management scheme for cluster based wireless sensor networks. In: 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (2008)
Messai, M.-L., Aliouat, M., Seba, H.: Tree based protocol for key management in wireless sensor networks. In: Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 910695
Roy, S., Das, A.K.: Secure hierarchical routing protocol (SHRP) for wireless sensor network. In: Proceedings of Second International Symposium on Security in Computing and Communications (SSCC 2014), CCIS, vol. 467, pp. 20–29. Springer, Berlin, Heidelberg (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Roy, S. (2015). Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-MartÃnez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-22915-7_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22914-0
Online ISBN: 978-3-319-22915-7
eBook Packages: Computer ScienceComputer Science (R0)