Skip to main content

Secure Anti-Void Energy-Efficient Routing (SAVEER) Protocol for WSN-Based IoT Network

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 988))

Abstract

The use of Internet of Things (IoT) is increasing rapidly. In most of the cases, wireless sensor network (WSN) takes the responsibility of communication between IoT devices. The deployment of secure communication for resource-constrained sensor nodes in WSN leads to a great challenge for the researchers. WSNs are deployed in remote areas in most of the applications with almost no possibility of recharging. This makes efficient energy usage a major criterion to be considered while designing security solutions in this field. To keep WSN in confidential and to provide guaranteed packet delivery, secure communication is essential. This paper has proposed a protocol, called SAVEER, which is used to prevent from both the internal and the external threats by using low-cost encryption technique with one-way hash chain-based authentication mechanism. The rolling ball approach is used to prevent the anti-void problem. The simulation results show that SAVEER provides better routing efficiency than existing protocols SEER, INSENS, and CASER.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. I. Bose, R. Pal, Auto-ID: managing anything, anywhere, anytime in the supply chain. Commun. ACM 48(8), 100–106 (2005)

    Article  Google Scholar 

  2. M.M. Afsar, M.-H. Tayarani-N, Clustering in sensor networks: a literature survey. J. Netw. Comput. Appl. 46, 198–226 (2014)

    Article  Google Scholar 

  3. T. Martin, M. Hsiao, D. Ha, J. Krishnaswami, Denial-of-service attacks on battery powered mobile computers, in Second IEEE International Conference on Pervasive Computing and Communications (PerCom’04), (IEEE, 2004), pp. 309–318

    Google Scholar 

  4. A.K. Das, R. Chaki, K.N. Dey, Secure energy efficient routing protocol for wireless sensor network, in Foundation of Computing and Decision Sciences (FCDS), vol. 41, Issue-1, (2016), pp. 3–27. ISSN- 0867-6356, https://doi.org/10.1515/fcds-2016-0001

    Article  Google Scholar 

  5. C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. Elsevier J. 293–315 (2003). https://doi.org/10.1016/s1570-8705(03)00008-8

    Article  Google Scholar 

  6. C. Cachin, J.A. Poritz, Secure intrusion-tolerant replication on the internet, in IEEE International Conference on Dependable-Systems and Networks (DSN’02), (2002)

    Google Scholar 

  7. Y.C. Hu, A. Perrig, D.B. Johnson, Packet leashes, A defense against wormhole attacks in wireless networks, in Proceedings of IEEE Infocom, (2003)

    Google Scholar 

  8. B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless sensor network, in 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom, (Aug 2000). pp. 243–254

    Google Scholar 

  9. W.-J. Liu, K.-T. Feng, GAR: greedy routing with anti-void traversal for wireless sensor networks. IEEE Trans. Mob. Comput. 8(7), 910–922 (2009)

    Article  Google Scholar 

  10. K.T. Feng, W.-J. Liu, Greedy routing with anti-void traversal for wireless sensor networks. IEEE Trans. Mob. Comput. 8(7), 910–922 (2009)

    Article  Google Scholar 

  11. S.N. Kumar, Review on network security and cryptography. Int. Trans. Electr. Comput. Eng. Syst. 3(1), 1–11 (2015)

    Google Scholar 

  12. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 1(2–3) (2003)

    Google Scholar 

  13. A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar, Spins: security protocols for sensor networks. Wirel. Netw. J. (WINET) 8(5), 521–534 (2002)

    Article  Google Scholar 

  14. A. Wood, Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)

    Article  Google Scholar 

  15. J. Sen, A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 1(2), 2009

    Google Scholar 

  16. A. Perrig, J. Stankovic, D. Wagner, Security in wireless sensor network. L Commun. ACM. 47, 2004

    Article  Google Scholar 

  17. H. Hayouni, M. Hamdi, T.-H. Kim, A survey on encryption schemes in wireless sensor networks, in 7th International Conference on Advanced Software Engineering & Its Applications, (2014)

    Google Scholar 

  18. W. Du, J. Deny, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor network using deployment knowledge, (2004)

    Google Scholar 

  19. P. Chuang, S. Chang, C. Lin, A node revocation scheme using public-key cryptography in wireless sensor networks. J. Inf. Sci. Eng. 26, 1859–1873 (2010)

    Google Scholar 

  20. J. Deng, R. Han, S. Mishra, INSENS: Intrusion-tolerant routing for wireless sensor networks. Comput. Commun., Elsevier 29(2), 216–230 (2006). https://doi.org/10.1016/j.comcom.2005.05.018

    Article  Google Scholar 

  21. D. Tang, T. Li, J. Ren, J. Wu, Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 960–973 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayan Kumar Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tabassum, A., Sadaf, S., Sinha, D., Das, A.K. (2020). Secure Anti-Void Energy-Efficient Routing (SAVEER) Protocol for WSN-Based IoT Network. In: Sahana, S., Bhattacharjee, V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_11

Download citation

Publish with us

Policies and ethics