Skip to main content

Advertisement

Log in

Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Balancing energy usage over a larger group of participating nodes in a sensor network extends the network’s lifetime. Security protocols mainly focus on saving energy through early filtering of attacks; however, this does not necessarily prolong the network lifetime. In order to save more energy and extend the network lifetime, the underlying routing is equally important. Security protocols such as commutative cipher en-route filtering (CCEF), which considers shortest path routing, do not take advantage of the opportunity to save more energy by considering an energy efficient underlying routing at the design level. In this paper, we propose pre-deterministic key-distribution based CCEF (PKCCEF), which extends the network life significantly through pre-deterministic and random distribution of the witness keys with a modified underlying routing that considers the residual energy. For high FTR, our method selects a path with more filtering nodes to be able to detect more attacks. This needs further verification for legitimate reports and needs more energy as compared to original method, but it can save energy by filtering fabricated or false report earlier. For low FTR, our method selects an energy efficient path with fewer verifications of legitimate reports. Independent of the number of attacks, our method extends the network lifetime as compared to the original method i.e. CCEF. Our method achieves energy efficiency without compromising the security of the original scheme. The results show the effectiveness of the proposed method in terms of the energy efficiency (up to 16.05 %) and extending the network lifetime (up to 84.01 %).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Yang, H., & Songwu, L. (2004). Commutative cipher based en-route filtering in wireless sensor networks. In 60th vehicular technology conference (pp. 1223–1227).

  2. Ye, F., Luo, H., Lu, S., & Zhang, L. (2004). Statistical en-route filtering of injected false data in sensor networks. In IEEE proceedings of INFOCOM (pp. 839–850).

  3. Yu, Z., & Guan, Y. (2010). A dynamic en-route filtering scheme for data reporting in wireless sensor networks. IEEE/ACM Transactions on Networking, 18(1), 150–163.

    Article  Google Scholar 

  4. Karp, B., & Kung, H. T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In ACM MOBICOM (pp. 243–253).

  5. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE symposium on security and privacy (pp. 259–271).

  6. Li, F., & Wu, J. (2006). A probabilistic voting-based fileting scheme in wireless sensor networks. In ACM IWCMC, Vancour, Canada (pp. 27–32).

  7. Lee, H. Y., & Cho, T. H. (2009). Fuzzy-based path selection method for improving the detection of false reports in sensor networks. IEICE Transactions on Information and Systems, E92-D(8), 1574–1576.

    Article  Google Scholar 

  8. Moon, S. Y., & Cho, T. H. (2012). Key index-based routing for filtering false event reports in wireless sensor networks. IEEE Transactions on Communication, E95-B(9), 2807–2814.

    Article  Google Scholar 

  9. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless sensor networks. In Proceedings of the 33rd Hawaii international conference on system sciences (pp. 1–10).

  10. Bajaber, F., & Awan, I. (2011). Adaptive decentralized re-clustering protocol for wireless sensor networks. Journal of Computer and System Sciences, 77(2), 282–292.

    Article  MathSciNet  Google Scholar 

  11. Mitra, S. K., & Naskar, M. K. (2011). Comparative study of radio models for data gathering in wireless sensor network. International Journal of Computer Applications, 27(4), 0975–8887.

    Google Scholar 

  12. Gopu, J. R., Shekar, T. P., & Sagar, D. (2012). An active en-route filtering scheme for information reporting in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, 2(4), 349–356.

    Google Scholar 

  13. Annlin Jeba, S. V., & Paramasivan, D. B. (2012). An evaluation of the en-route filtering schemes on wireless sensor networks. International Journal of Computer Engineering & Technology (IJCET), 3(2), 62–73.

    Google Scholar 

  14. Kim, J. M., Han, Y. S., Lee, H. Y., & Cho, T. H. (2011). Path renewal method in filtering based wireless sensor networks. Sensors, 11(2), 1396–1404.

    Article  Google Scholar 

  15. Nghiem, P. T., & Cho, T. H. (2010). A multi-path interleaved hop by hop en-route filtering scheme in wireless sensor networks. Computer Communications, 33(10), 1202–1209.

    Article  Google Scholar 

  16. Wang, J., Yang, X., Zheng, Y., Zhang, J., & Kim, J.-U. (2012). An energy-efficient multi-hop hierarchical routing protocol for wireless sensor networks. International Journal of Future Generation Communication and Networking, 5(4), 89–98.

    Google Scholar 

  17. Choi, H. M., Nam, S. M., & Cho, T. H. (2013). A secure routing method for detecting false reports and wormhole attacks in wireless sensor networks. Wireless Sensor Network, 5(3), 33–40.

    Article  Google Scholar 

  18. Forster, A., Forster, A., & Murphy, A. L. (2010). Optimal cluster sizes for wireless sensor networks: An experimental analysis. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 28, pp. 49–63).

  19. Al-Karaki, Jamal N., & Kamal, Ahmed E. (2004). Routing techniques in wireless sensor network: A survey. IEEE Wireless Communications, 11(6), 6–28.

    Article  Google Scholar 

  20. Sen, Jaydip. (2009). A survey on wireless sensor network security. International Journal of Communication Networks and Information Security (IJCNIS), 1(2), 55–78.

    Google Scholar 

  21. Zhu, F., Liu, J., Huang, Q., & Zhang, Y. (2003). Fast and incremental node localization in ad hoc networks. Technical Reoirt P-3003-10265, PARK.

Download references

Acknowledgments

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2013R1A2A2A01013971).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tae Ho Cho.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shahzad, M.K., Cho, T.H. Extending the network lifetime by pre-deterministic key distribution in CCEF in wireless sensor networks. Wireless Netw 21, 2799–2809 (2015). https://doi.org/10.1007/s11276-015-0941-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-0941-0

Keywords

Navigation