SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks

  • Al-Sakib Khan Pathan
  • Choong Seon Hong


In this paper, we present secure energy-efficient routing protocol (SERP) for densely deployed wireless sensor networks which aims to achieve robust security for transmitted sensor readings with an energy-efficient network backbone. When the sensors with limited energy budgets are deployed in hazardous environment, ensuring energy efficiency and security of the sensor readings becomes a crucial task. Here, we address how to deal with such a deployment scenario. Our protocol ensures secure transmission of data from the source sensors to the base station in a way that it can best utilize the available amount of energy in the network. We use one-way hash chain and pre-stored shared secret keys for ensuring data transmission security. In SERP, first, a sink rooted tree structure is created as the backbone of the network. This energy-efficient network structure is used for authenticated and encrypted data delivery from the source sensors to the base station. To introduce data freshness, SERP includes an optional key refreshment mechanism which could be applied depending on the application at hand. Our analysis and simulation results show that SERP provides a good level of confidentiality and authenticity of data that are transmitted from the sensors to the base station. It also helps for energy-efficient structuring of the network so that the maximum lifetime of the network could be achieved.


Energy Distance One-way hash chain Shared secret key 



This research was supported by the MKE under the ITRC support program supervised by the IITA (IITA-2008-(C1090-0801-0016)). Dr. CS Hong is the corresponding author. We’d like to give special thanks to Md. Mamun-Or-Rashid for his generous help for this work. Also, special thanks to the reviewers for their valuable comments to improve this paper.


  1. 1.
    Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor net-works: a survey. Comput Networks 38:393–422CrossRefGoogle Scholar
  2. 2.
    Dai S, Jing X, Li L (2005) Research and analysis on routing protocols for wireless sensor networks. Proceedings of the International Conference on Communications, Circuits and Systems, volume 1, pp 407–411 (27–30 May)Google Scholar
  3. 3.
    Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, pp 293–315, (September)Google Scholar
  4. 4.
    Pathan A-SK, Lee H-W, Hong CS (2006) Security in wireless sensor networks: issues and challenges. Proceedings of the 8th IEEE ICACT 2006, Volume II, Phoenix Park, Korea, pp 1043–1048, (20–22 February)Google Scholar
  5. 5.
    Pathan A-SK, Hong CS (2007) A secure energy-efficient routing protocol for WSN. ISPA 2007, LNCS 4742, Springer, pp 407–418Google Scholar
  6. 6.
    Çam H, Özdemir S, Muthuavinashiappan D, Nair P (2003) Energy efficient security protocol for wireless sensor networks. IEEE 58th Vehicular Technology Conference, 2003, VTC 2003-Fall 2003, volume 5, pp 2981–2984, (6–9 Oct)Google Scholar
  7. 7.
    Çam H, Özdemir S, Nair P, Muthuavinashiappan D, Sanli HO (2006) Energy-efficient secure pattern based data aggregation for wireless sensor networks. Comput Commun 29(4):446–455CrossRefGoogle Scholar
  8. 8.
    Ye F, Luo H, Lu S, Zhang L (2005) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Area Commun 23(4):839–850 (April)CrossRefGoogle Scholar
  9. 9.
    Zhu S, Setia S, Jajodia S, Ning P (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Proceedings of S&P, pp 259–271Google Scholar
  10. 10.
    Lee HY, Cho TH (2006) Key inheritance-based false data filtering scheme in wireless sensor networks. Lecture notes in computer science, LNCS 4317, Springer, pp 116–127Google Scholar
  11. 11.
    Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii Inter-national Conference on System Sciences (HICSS), pp 3005–3014Google Scholar
  12. 12.
    Azzedine B, Xiuzhen C, Joseph L (2003) Energy-aware data-centric routing in microsensor networks. Proceedings of the 8th MSWiM 03, San Diego, pp 42–49Google Scholar
  13. 13.
    Hyunh TT, Hong CS (2006) An energy delay efficient multi-hop routing scheme for wireless sensor networks. IEICE Trans Inf Syst E89-D(5):1654–1661 (May)CrossRefGoogle Scholar
  14. 14.
    Yin C, Huang S, Su P, Gao C (2003) Secure routing for large-scale wireless sensor networks. In Proceedings of IEEE ICCT 2003, volume 2, pp 1282–1286, (9–11 April)Google Scholar
  15. 15.
    Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) SPINS: security protocols for sensor networks. Wirel Netw 8:521–534MATHCrossRefGoogle Scholar
  16. 16.
    Xbow Sensor Networks. Available at:
  17. 17.
    Hass ZJ (2001) Design methodologies for adaptive and multimedia networks. IEEE Commun Mag 39(11):106–107 (November)CrossRefGoogle Scholar
  18. 18.
    Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670 (October)CrossRefGoogle Scholar
  19. 19.
    Lamport L (1979) Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International, OctoberGoogle Scholar
  20. 20.
    The Network Simulator-ns-2.
  21. 21.
    Coppersmith D, Jakobsson M (2002) Almost optimal hash sequence traversal. 6th International Financial Cryptography 2002, Bermuda, (March)Google Scholar
  22. 22.
    Jakobsson M (2002) Fractal hash sequence representation and traversal. 2002 IEEE International Symposium on Information Theory, Switzerland (July)Google Scholar
  23. 23.
    Sella Y (2003) On the computation-storage trade-offs of hash chain traversal. The 7th International Financial Cryptography Conference, Guadeloupe, (January)Google Scholar
  24. 24.
    Ee CT, Bajcsy R (2004) Congestion control and fairness for many-to-one routing in sensor networks. Proceedings of ACM SenSys’04, 148-161Google Scholar

Copyright information

© Institut TELECOM and Springer-Verlag France 2008

Authors and Affiliations

  1. 1.Networking Laboratory, Department of Computer EngineeringKyung Hee UniversityGiheungSouth Korea

Personalised recommendations