Skip to main content

How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime

  • Conference paper
  • First Online:
Advanced Information Technology, Services and Systems (AIT2S 2017)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 25))

  • 846 Accesses

Abstract

To maintain the proper functioning of critical applications based on Wireless Sensor Networks, we must provide an acceptable level of security while taking into account limited capabilities of the sensors. In this paper we propose a mobile approach to secure data exchanged by structured nodes in cluster. The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. To compare the performance of the proposed approach with other mobile algorithms, we focus on the following metrics: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys and the memory used by the different sensors to store keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Othman, M.F., Shazali, K.: Wireless sensor network applications: a study in environment monitoring system. Procedia Eng. 41, 1204–1210 (2012)

    Article  Google Scholar 

  2. Jain, A., Kant, K., Tripathy, M.R.: Security solutions for wireless sensor networks. In: 2012 Second International Conference on Advanced Computing & Communication Technologies, pp. 430–433. IEEE (2012)

    Google Scholar 

  3. Pandey, A., Tripathi, R.C.: A survey on wireless sensor networks security. Int. J. Comput. Appl. 3(2), 43–49 (2010)

    Google Scholar 

  4. Adnan, A., Hanapi, Z.: Geographic routing protocols for wireless sensor networks: design and security perspectives. Int. J. Commun. Antenna Propag. (IRECAP) 5(4), 197–211 (2015)

    Article  Google Scholar 

  5. Chandra, S., Paira, S., Alam, S.: A comparative survey of symmetric and asymmetric key cryptography. In: International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp. 83–93. IEEE (2014)

    Google Scholar 

  6. Sasi, S., Dixon, D., Wilson, J.: A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security. IOSR J. Eng. 4(3), 1 (2014)

    Article  Google Scholar 

  7. Kandasamy, R., Krishnan, S.: Enhanced energy efficient method for WSN to prevent far-zone. Int. J. Commun. Antenna Propag. (IRECAP) 4(4), 137–142 (2014)

    Article  Google Scholar 

  8. Munivel, E., Ajit, M.: Efficient public key infrastructure implementation in wireless sensor networks. In: International Conference on Wireless Communication and Sensor Computing, February 2010

    Google Scholar 

  9. Zhang, Y., Yang, W., Kim, K., Park, M.: An AVL tree-based dynamic key management in hierarchical wireless sensor network. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 2008

    Google Scholar 

  10. Setiadi, I., Kistijantoro, A., Miyaji, A.: Elliptic curve cryptography: algorithms and implementation analysis over coordinate systems. In: Proceedings of the 2nd International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA) 2015, pp. 1–6. IEEE (2015)

    Google Scholar 

  11. Qin, Z., Zhang, X., Feng, K.: An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 198 (2015)

    Google Scholar 

  12. Du, X., Guizani, M., Xiao, Y., Chen, H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. In: IEEE International Conference on Communications, ICC 2007, Glasgow, August 2007

    Google Scholar 

  13. Boumerzoug, H., Boucif, A.: A lightweight key management scheme based on an AVL tree and ECC cryptography for wireless sensor networks. Concurr. Comput. Pract. Exp. 28(6), 1831–1847 (2016)

    Article  Google Scholar 

  14. Schleicher, J.M., Vögler, M., Dustdar, S., Inzinger, C.: Enabling a smart city application ecosystem: requirements and architectural aspects. IEEE Internet Comput. 20(2), 58–65 (2016)

    Article  Google Scholar 

  15. Walravens, N.: Mobile city applications for Brussels citizens: smart city trends, challenges and a reality check. Telematics Inform. 32(2), 282–299 (2015)

    Article  Google Scholar 

  16. Jalali, R., El-Khatib, K., McGregor, C.: Smart city architecture for community level services through the internet of things. In: 2015 Proceedings of the 18th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 108–113. IEEE (2015)

    Google Scholar 

  17. Cai, W., Chen, M., Hara, T., Shu, L., Kwon, T.: A genetic algorithm approach to multi-agent itinerary planning in wireless sensor networks. Mob. Netw. Appl. 16(6), 782–793 (2011)

    Article  Google Scholar 

  18. Hao, C.H.U., Cheng-dong, W.U.: A Kalman framework based mobile node localization in rough environment using wireless sensor network. Int. J. Distrib. Sens. Netw. 2015, 73 (2015)

    Google Scholar 

  19. Anderson, R., Seitz, S.: CSE 326: Data Structures AVL Trees (2014)

    Google Scholar 

  20. Salah, M.S., Maizate, A., Ouzzif, M.: Security approaches based on elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 27th International Conference on Microelectronics (ICM), pp. 35–38. IEEE (2015)

    Google Scholar 

  21. Gura, N., Patel, A., Wander, A.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 119–132. Springer, Heidelberg (2004)

    Google Scholar 

  22. Enge, A.: Elliptic Curves and Their Applications to Cryptography: An Introduction. Springer Science & Business Media, Boston (2012)

    MATH  Google Scholar 

  23. Anitha, R., Nawaz, G.: Development of a secure, energy efficient and reliable routing protocol for mobile wireless sensor networks. Int. Rev. Comput. Softw. (IRECOS) 9(3), 487–494 (2014)

    Google Scholar 

  24. Kazienko, J.F., Moraes, I.M., Albuquerque, C.V.: On the performance of a secure storage mechanism for key distribution architectures in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 44 (2015)

    Google Scholar 

  25. Tsou, Y.T., Lu, C.S., Kuo, S.Y.: MoteSec-aware: a practical secure mechanism for wireless sensor networks. IEEE Trans. Wirel. Commun. 12(6), 2817–2829 (2013)

    Article  Google Scholar 

  26. Geetha, R., Kannan, E.: Secure communication against framing attack in wireless sensor network. Int. Rev. Comput. Softw. (IRECOS) 10(4), 393–398 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Saïd Salah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salah, M.S., Maizate, A., Ouzzif, M., Toumi, M. (2018). How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime. In: Ezziyyani, M., Bahaj, M., Khoukhi, F. (eds) Advanced Information Technology, Services and Systems. AIT2S 2017. Lecture Notes in Networks and Systems, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-319-69137-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69137-4_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69136-7

  • Online ISBN: 978-3-319-69137-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics