Skip to main content

Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 536))

Included in the following conference series:

Abstract

Wireless sensor network consists of micro electromechanical sensor nodes which are operated by battery power. Sensor network has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The modern researchers are facing the various issues concerning sensor networks more graciously. However, offering security to an energy constrained network of sensor nodes is still a challenge. The proposed scheme named as Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks adopts a hierarchical network model coupled with low weight security mechanisms in order to conserve energy as well as offer security to the network. Elliptic Curve Cryptography (ECC) based public key cryptography, Elliptic-Curve Diffie-Hellman (ECDH) key exchange scheme, nested hash based message authentication codes (HMAC) and RC5 symmetric cypher are the light-weight security methods used by the proposed scheme. Simulation results prove that SCBRS performs better than Tree Based Protocol for Key Management in Wireless Sensor Networks in terms of energy efficiency and security. SCBRS also performs better than Secure Hierarchical Routing Protocol (SHRP) in fields where security is the most important issue.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kulik, J., Heinzelman, W.R., Balakrishnan, H.: Negotiation based protocols for disseminating information in wireless sensor networks. Wirel. Netw. 8, 169–185 (2002)

    Article  MATH  Google Scholar 

  2. Mishra, A.R., Singh, M.: Elliptic curve cryptography (ECC) for security in wireless sensor network. Int. J. Eng. Res. Technol. (IJERT) 1(3), 1–6 (2012)

    Google Scholar 

  3. Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A, Wander, A.S.: Embedded end-to-end wireless security with ECDH key exchange. Published in: Circuits and Systems, 2003 IEEE 46th Midwest Symposium, vol. 2, pp. 786–789 (2003)

    Google Scholar 

  4. Rivest, R.L.: The RC5 encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Berlin (1995)

    Chapter  Google Scholar 

  5. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1, 293–315 (2003). Elsevier Journal, doi:10.1016/S1570-8705(03)00008-8

  6. Azarderakhsh, R., Reyhani-Masoleh, A., Abid, Z.-E.: A key management scheme for cluster based wireless sensor networks. In: 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (2008)

    Google Scholar 

  7. Messai, M.-L., Aliouat, M., Seba, H.: Tree based protocol for key management in wireless sensor networks. In: Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 910695

    Google Scholar 

  8. Roy, S., Das, A.K.: Secure hierarchical routing protocol (SHRP) for wireless sensor network. In: Proceedings of Second International Symposium on Security in Computing and Communications (SSCC 2014), CCIS, vol. 467, pp. 20–29. Springer, Berlin, Heidelberg (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sohini Roy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Roy, S. (2015). Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor Networks. In: Abawajy, J., Mukherjea, S., Thampi, S., Ruiz-Martínez, A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, vol 536. Springer, Cham. https://doi.org/10.1007/978-3-319-22915-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22915-7_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22914-0

  • Online ISBN: 978-3-319-22915-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics