Abstract
To maintain the proper functioning of critical applications based on Wireless Sensor Networks, we must provide an acceptable level of security while taking into account limited capabilities of the sensors. In this paper we propose a mobile approach to secure data exchanged by structured nodes in cluster. The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. To compare the performance of the proposed approach with other mobile algorithms, we focus on the following metrics: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys and the memory used by the different sensors to store keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Othman, M.F., Shazali, K.: Wireless sensor network applications: a study in environment monitoring system. Procedia Eng. 41, 1204–1210 (2012)
Jain, A., Kant, K., Tripathy, M.R.: Security solutions for wireless sensor networks. In: 2012 Second International Conference on Advanced Computing & Communication Technologies, pp. 430–433. IEEE (2012)
Pandey, A., Tripathi, R.C.: A survey on wireless sensor networks security. Int. J. Comput. Appl. 3(2), 43–49 (2010)
Adnan, A., Hanapi, Z.: Geographic routing protocols for wireless sensor networks: design and security perspectives. Int. J. Commun. Antenna Propag. (IRECAP) 5(4), 197–211 (2015)
Chandra, S., Paira, S., Alam, S.: A comparative survey of symmetric and asymmetric key cryptography. In: International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp. 83–93. IEEE (2014)
Sasi, S., Dixon, D., Wilson, J.: A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security. IOSR J. Eng. 4(3), 1 (2014)
Kandasamy, R., Krishnan, S.: Enhanced energy efficient method for WSN to prevent far-zone. Int. J. Commun. Antenna Propag. (IRECAP) 4(4), 137–142 (2014)
Munivel, E., Ajit, M.: Efficient public key infrastructure implementation in wireless sensor networks. In: International Conference on Wireless Communication and Sensor Computing, February 2010
Zhang, Y., Yang, W., Kim, K., Park, M.: An AVL tree-based dynamic key management in hierarchical wireless sensor network. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 2008
Setiadi, I., Kistijantoro, A., Miyaji, A.: Elliptic curve cryptography: algorithms and implementation analysis over coordinate systems. In: Proceedings of the 2nd International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA) 2015, pp. 1–6. IEEE (2015)
Qin, Z., Zhang, X., Feng, K.: An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 198 (2015)
Du, X., Guizani, M., Xiao, Y., Chen, H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. In: IEEE International Conference on Communications, ICC 2007, Glasgow, August 2007
Boumerzoug, H., Boucif, A.: A lightweight key management scheme based on an AVL tree and ECC cryptography for wireless sensor networks. Concurr. Comput. Pract. Exp. 28(6), 1831–1847 (2016)
Schleicher, J.M., Vögler, M., Dustdar, S., Inzinger, C.: Enabling a smart city application ecosystem: requirements and architectural aspects. IEEE Internet Comput. 20(2), 58–65 (2016)
Walravens, N.: Mobile city applications for Brussels citizens: smart city trends, challenges and a reality check. Telematics Inform. 32(2), 282–299 (2015)
Jalali, R., El-Khatib, K., McGregor, C.: Smart city architecture for community level services through the internet of things. In: 2015 Proceedings of the 18th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 108–113. IEEE (2015)
Cai, W., Chen, M., Hara, T., Shu, L., Kwon, T.: A genetic algorithm approach to multi-agent itinerary planning in wireless sensor networks. Mob. Netw. Appl. 16(6), 782–793 (2011)
Hao, C.H.U., Cheng-dong, W.U.: A Kalman framework based mobile node localization in rough environment using wireless sensor network. Int. J. Distrib. Sens. Netw. 2015, 73 (2015)
Anderson, R., Seitz, S.: CSE 326: Data Structures AVL Trees (2014)
Salah, M.S., Maizate, A., Ouzzif, M.: Security approaches based on elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 27th International Conference on Microelectronics (ICM), pp. 35–38. IEEE (2015)
Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 119–132. Springer, Heidelberg (2004)
Enge, A.: Elliptic Curves and Their Applications to Cryptography: An Introduction. Springer Science & Business Media, Boston (2012)
Anitha, R., Nawaz, G.: Development of a secure, energy efficient and reliable routing protocol for mobile wireless sensor networks. Int. Rev. Comput. Softw. (IRECOS) 9(3), 487–494 (2014)
Kazienko, J.F., Moraes, I.M., Albuquerque, C.V.: On the performance of a secure storage mechanism for key distribution architectures in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 44 (2015)
Tsou, Y.T., Lu, C.S., Kuo, S.Y.: MoteSec-aware: a practical secure mechanism for wireless sensor networks. IEEE Trans. Wirel. Commun. 12(6), 2817–2829 (2013)
Geetha, R., Kannan, E.: Secure communication against framing attack in wireless sensor network. Int. Rev. Comput. Softw. (IRECOS) 10(4), 393–398 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Salah, M.S., Maizate, A., Ouzzif, M., Toumi, M. (2018). How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime. In: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds) Advanced Information Technology, Services and Systems. AIT2S 2017. Lecture Notes in Networks and Systems, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-69137-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-69137-4_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69136-7
Online ISBN: 978-3-319-69137-4
eBook Packages: EngineeringEngineering (R0)