Skip to main content
Log in

Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Dissemination is a service provided for Wireless Sensor Networks to update the deployed sensor nodes online by using over air programming through radio communication. Since the centralized data dissemination approaches suffer from the limitations of single point of failure, lack of scalability and inability to provide better security they have been replaced by the distributed approaches. In distributed data dissemination, the dissemination privileges are delegated by the network owners to the network users to disseminate the data items on their behalf. In the distributed data dissemination, security is a major concern. The adversaries can easily exploit the security vulnerabilities and launch various security attacks that can disrupt data dissemination process. In this paper we propose the novel Secured-Selective Design Relay Inquiry Protocol (S-SELDRIP) which provides the secured optimal routing by means of hop by hop authentication during data dissemination. The feasibility and efficiency of S-SELDRIP scheme have been analyzed by considering possible vulnerabilities during the data dissemination and the extent to which the proposed scheme is able to withstand them. The proposed protocol is tested in NS2 Mannasim framework and results have taken by measuring the various parameters through repeated simulations. Simulation results justify the viability of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Lin, K., & Levis, P. (2008). Data discovery and dissemination with dip. In Proceedings of the 2008 International conference on information processing in sensor networks (IPSN 2008), Washington, DC, USA (pp. 433–444). IEEE Computer Society.

  2. De, P., Liu, Y., & Das, S. K. (2008). Remo: An energy efficient reprogramming protocol for mobile sensor networks. In Proceedings of the 6th IEEE PerCom (pp. 60–69).

  3. Panta, R. K, Khalil, I., & Bagchi, S. (2007). Stream: Low overhead wireless reprogramming for sensor networks. In Proceedings of the 26th IEEE INFOCOM (pp. 928–936).

  4. Wang, Q., Zhu, Y., & Cheng, L. (2006). Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network, 20(3), 48–55.

    Article  Google Scholar 

  5. Dang, T., Bulusu, N., Feng, W., & Park, S. (2009). DHV: Acode consistency maintenance protocol for multi-hop wireless sensor networks. In Proceedings of 6th European conference wireless sensor networks (pp. 327–342).

  6. He, D., Chan, S., Tang, S., & Guizani, M. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 26(4), 1129–1139.

    Google Scholar 

  7. Geoss. http://www.epa.gov/geoss/.

  8. NOPP. http://www.nopp.org/.

  9. ORION. http://www.joiscience.org/oceanobserving/advisors.

  10. He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638–4646.

    Article  Google Scholar 

  11. Wang, L. (2004). MNP: Multihop network reprogramming service for sensor networks. In Proceedings of the 2nd ACM conference on embedded networked sensor systems, USA.

  12. Hyun, S., Ning, P., Liu, A., & Du, W. (2008). Seluge: Secure and DoS resistant code dissemination in wireless sensor networks. In Proceedings of 2008, ACM/IEEE IPSN (pp. 445–456).

  13. Zhang, R., Zhang, Y. (2011) LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks. In Proceedings of international conference on distributed computing systems (pp. 497–506). IEE Computer Society.

  14. Naik, V., Arora, A., Sinha, P., & Zhang, H. (2005). Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In Proceedings of the 26th IEEE international real-time systems symposium (RTSS).

  15. Hui, J. W., Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on embedded networked sensor systems (Sensys 04), New York, NY, USA, ACM (pp. 81–94).

  16. Levis, P., Patel, N., Culler, D., & Shenker, S. (2004). Trickle: A self-regulating algorithm for code maintenance and propagation in wirelesssensor networks. In Proceedings of 1st conference symposium network systems design implementation (pp. 15–28).

  17. Huang, L., & Setia, S. (2008). CORD: Energy-efficient reliable bulk data dissemination in sensor networks. In Proceedings of INFOCOM.

  18. Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Distributed fine-grained accesscontrol in wireless sensor networks. In Proceedings of IEEE IPDPS (pp. 352–362).

  19. He, D., Bu, J., Zhu, S., Chan, S., & Chen, C. (2011). Distributed access controlwith privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications, 10(10), 3472–3481.

    Article  Google Scholar 

  20. Zhu, S. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy.

  21. Lee, H. W. (2007). A method to control the probability of attempts to verify a report in Statistical En-Route FilteringNetworks. In 15th IEEE international conference on networks.

  22. Hu, Y. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks.

  23. Li, J., & Ren, J. (2014). Hop by Hop message authentication and source privacy inn WSN. IEE Transcations on Parallel and Distributed Systems, 25, 1223–1232.

    Article  Google Scholar 

  24. Hur, J. (2011). Fine-grained data access control for distributed sensor networks. Wireless Networks, 17(5), 1235–1249.

    Article  Google Scholar 

  25. He, D. (2015). Accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 14(1), 387–398.

    Google Scholar 

  26. Santhosh Kumar, S. V. N., & Yogesh, P. (2016). Privacy preserving with enhanced access control for distributed data dissemination in WSN. Asian Journal of Research in Social Sciences and Humanities, 6(12), 561–577.

    Article  Google Scholar 

  27. Golden Julie, E., & Tamilselvi, S. (2016). CDS-fuzzy opportunistic routing protocol for WSN. Wireless Personal Communication, 90, 903–922.

    Article  Google Scholar 

Download references

Acknowledgements

The authors gratefully acknowledge DST, New Delhi for providing financial support to carry out this research work under PURSE II scheme. One of the authors MR. SVN. Santhosh Kumar is thankful for DST for the award of DST-PURSE fellowship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. N. Santhosh Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Santhosh Kumar, S.V.N., Palanichamy, Y. Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Netw 24, 1343–1360 (2018). https://doi.org/10.1007/s11276-017-1549-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1549-3

Keywords

Navigation