Secure Multi-level Cluster Based Wireless Sensor Network
Szerzők
Megtekintés
Kulcsszavak
Licenc
Copyright (c) 2018 by the authors
This work is licensed under a Creative Commons Attribution 4.0 International License.
Hogyan hivatkozzuk
Absztrakt
The demand of wireless sensor networks (WSNs) is on the raise due to its potential applications. The data transmission occurs via a wireless link by the sensor node in network hence these nodes are vulnerable to several outside or inside attacks. A WSN may works in an unfriendly environment therefore it is a fundamental requirement of WSN to secure the sensing data. In this paper, we focus on highlighting the security issues in a multilayer WSN architecture and provide a secure communication solution (combination of various state- of-art protocols) for it by considering the WSN constraints. We propose a multi-level protocol distribution method to enhance the security of the WSN under consideration via targeting and providing resilience to specific attacks at each level. The simulation and results show that by implementing our proposed method, the overall security of the network has been enhanced.
Hivatkozások
- Zeb, A.; Islam, A.K.M.M.; Komaki, S.; Baharun, S., ”Multi-nodes joining for dynamic cluster-based Wireless Sensor Network,” in Informatics, Electronics and Vision (ICIEV), 2014 International Conference on , vol., no., pp.1-6, 23-24 May 2014.
- Prasath, K.A.; Shankar, T., ”RMCHS: Ridge method based cluster head selection for energy efficient clustering hierarchy protocol in WSN,” in Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on , vol., no., pp.64-70, 6-8 May 2015.
- Roy, S.; Kumar Das, A., ”Energy efficient cluster based routing pro- tocol (EECBRP) for Wireless Sensor Network,” in Networks and Soft Computing (ICNSC), 2014 First International Conference on , vol., no., pp.25-29, 19-20 Aug. 2014
- Padmavathi G.; Shanmugapriya, D. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks (IJCSIS)
- International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009.
- Chowdhury M., Kader M. F., and Asaduzzaman A Survey on Security Issues in Wireless Sensor Networks International Journal of Future Generation Communication and Networking Vol.6, No.5 (2013).
- 21. Ozdemir, S., Secure and reliable data aggregation for wireless sensor networks, In Ubiquitous Computing System; Ichikawa, H., Cho, W.-D., Sato, I., Hee, Y.Y., Eds; Springer: Berlin/Heidelberg, Germany, 2007; pp. 102109.
- 22. Sakai, R.; Ohgishi, K.; Kasahara, M. Cryptosystems based on pairing. In Proceedings of the SCIS2000-C20, Okinawa, Japan, 2628 January 2000.
- Chakraborty, S.; Khan, A.K., ”A noble approach for self learning and cluster based routing protocol with power efficiency in WSN,” in Communications and Signal Processing (ICCSP), 2014 International Conference on , vol., no., pp.773-777, 3-5 April 2014.
- Tang, L.; Li, Q. S-SPIN: A Provably Secure Routing Protocol for Wireless Sensor Networks. International Conference on Communication Software and Networks, IEEE Computer Society 2009.
- El-Semary, A. M. Energy-efficient secure routing protocol based on rulette-wheel and TESLA for wireless sensor networks. The International Journal of Sensor Networks and Data Communications, vol.1, ArticleIDX110201,13 pages,2012.