Abstract
The use of Internet of Things (IoT) is increasing rapidly. In most of the cases, wireless sensor network (WSN) takes the responsibility of communication between IoT devices. The deployment of secure communication for resource-constrained sensor nodes in WSN leads to a great challenge for the researchers. WSNs are deployed in remote areas in most of the applications with almost no possibility of recharging. This makes efficient energy usage a major criterion to be considered while designing security solutions in this field. To keep WSN in confidential and to provide guaranteed packet delivery, secure communication is essential. This paper has proposed a protocol, called SAVEER, which is used to prevent from both the internal and the external threats by using low-cost encryption technique with one-way hash chain-based authentication mechanism. The rolling ball approach is used to prevent the anti-void problem. The simulation results show that SAVEER provides better routing efficiency than existing protocols SEER, INSENS, and CASER.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
I. Bose, R. Pal, Auto-ID: managing anything, anywhere, anytime in the supply chain. Commun. ACM 48(8), 100–106 (2005)
M.M. Afsar, M.-H. Tayarani-N, Clustering in sensor networks: a literature survey. J. Netw. Comput. Appl. 46, 198–226 (2014)
T. Martin, M. Hsiao, D. Ha, J. Krishnaswami, Denial-of-service attacks on battery powered mobile computers, in Second IEEE International Conference on Pervasive Computing and Communications (PerCom’04), (IEEE, 2004), pp. 309–318
A.K. Das, R. Chaki, K.N. Dey, Secure energy efficient routing protocol for wireless sensor network, in Foundation of Computing and Decision Sciences (FCDS), vol. 41, Issue-1, (2016), pp. 3–27. ISSN- 0867-6356, https://doi.org/10.1515/fcds-2016-0001
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. Elsevier J. 293–315 (2003). https://doi.org/10.1016/s1570-8705(03)00008-8
C. Cachin, J.A. Poritz, Secure intrusion-tolerant replication on the internet, in IEEE International Conference on Dependable-Systems and Networks (DSN’02), (2002)
Y.C. Hu, A. Perrig, D.B. Johnson, Packet leashes, A defense against wormhole attacks in wireless networks, in Proceedings of IEEE Infocom, (2003)
B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless sensor network, in 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom, (Aug 2000). pp. 243–254
W.-J. Liu, K.-T. Feng, GAR: greedy routing with anti-void traversal for wireless sensor networks. IEEE Trans. Mob. Comput. 8(7), 910–922 (2009)
K.T. Feng, W.-J. Liu, Greedy routing with anti-void traversal for wireless sensor networks. IEEE Trans. Mob. Comput. 8(7), 910–922 (2009)
S.N. Kumar, Review on network security and cryptography. Int. Trans. Electr. Comput. Eng. Syst. 3(1), 1–11 (2015)
Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 1(2–3) (2003)
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. Tygar, Spins: security protocols for sensor networks. Wirel. Netw. J. (WINET) 8(5), 521–534 (2002)
A. Wood, Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)
J. Sen, A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 1(2), 2009
A. Perrig, J. Stankovic, D. Wagner, Security in wireless sensor network. L Commun. ACM. 47, 2004
H. Hayouni, M. Hamdi, T.-H. Kim, A survey on encryption schemes in wireless sensor networks, in 7th International Conference on Advanced Software Engineering & Its Applications, (2014)
W. Du, J. Deny, Y.S. Han, S. Chen, P.K. Varshney, A key management scheme for wireless sensor network using deployment knowledge, (2004)
P. Chuang, S. Chang, C. Lin, A node revocation scheme using public-key cryptography in wireless sensor networks. J. Inf. Sci. Eng. 26, 1859–1873 (2010)
J. Deng, R. Han, S. Mishra, INSENS: Intrusion-tolerant routing for wireless sensor networks. Comput. Commun., Elsevier 29(2), 216–230 (2006). https://doi.org/10.1016/j.comcom.2005.05.018
D. Tang, T. Li, J. Ren, J. Wu, Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 960–973 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tabassum, A., Sadaf, S., Sinha, D., Das, A.K. (2020). Secure Anti-Void Energy-Efficient Routing (SAVEER) Protocol for WSN-Based IoT Network. In: Sahana, S., Bhattacharjee, V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_11
Download citation
DOI: https://doi.org/10.1007/978-981-13-8222-2_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8221-5
Online ISBN: 978-981-13-8222-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)