A Complete and Generic Security Approach for Wireless Sensors Network

  • Imen Bouabidi
  • Pr. Mahmoud AbdellaouiEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12026)


Wireless communication-random deployment-resources limitations are the main characteristics of wireless sensors networks that make them vulnerable to attacks. Indeed, sensors nodes and transmitted data are not protected. So, data privacy and integrity are essential to secure the transmitted information and to protect the various nodes. In this context, we have presented in this paper a complete and generic security solution adapted to the WSN constraints. This approach is based on the crossing between the three layers: physical layer, data link layer and network layer through the implementation of a secure MAC protocol and an intrusion detection system. As well as, the development of a new cryptographic solution grouping the modified AES encryption algorithm in CTR mode and a new key management protocol. The simulations results have proved on the one hand, the efficiency of our solution in WSN metrics term namely: mobility rate (from a network size 200, the mobility rate completes 99%), loss packets rate (LPR), energy consumption (does not exceed 0.512 \(\upmu \)j for the case of our encryption scheme and 142 mj for the case of our MAC protocol SXMachiavel), data freshness (40.79%), control overhead (2.4), etc. On the other hand, it’s resistance to the most dangerous attacks in the WSN: eavesdropping attacks, node capture attack, DOS attacks and spoofing attacks.


Data privacy Secure MAC protocol Authentication Cryptographic solution Malware and attacks detection WSN 


  1. 1.
    Abdellaoui, Pr.M.: Multitasks-Generic-Intelligent-Efficiency-Secure WSNs and theirs Applications, Part 3: Secure Wireless Sensors Network, pp. 142–185. LAMBERT Academic Publishing LAP, Geneva (2017). ISBN: 978-3-330-04707-5. Printed book (330 pages, 4 Parts)Google Scholar
  2. 2.
    Bouabidi, I., Abdellaoui, Pr.M.: Hierarchical organization with a cross layers using smart sensors for intelligent cities. Adv. Sci. Technol. Eng. Syst. J. (ASTESJ) textbf2(1), 97–107 (2017). ISSN: 2415–6698CrossRefGoogle Scholar
  3. 3.
    Bouabidi, I., Abdellaoui, Pr.M.: A novel cryptographic solution to secure mobile wireless sensors networks. Int. J. Secur. Netw. 14(4), 1–18 (2019)CrossRefGoogle Scholar
  4. 4.
    Athman, S., Bilami, A., Boubiche, D.: EDAK: an efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Gener. Comput. Syst. 92, 789–799 (2019)CrossRefGoogle Scholar
  5. 5.
    Boliveira, L.: SecLEACH- a random key distribution solution for securing clustered sensor networks. In: Fifth IEEE International Symposium on Network Computing and Applications (NCA 2006), pp. 1–8 (2006)Google Scholar
  6. 6.
    Lathaa, A., Prasannab, S., Hemalathac, S., Sivakumar, B.: A harmonized trust assisted energy efficient data aggregation scheme for distributed sensor networks. Cogn. Syst. Res. 56, 14–22 (2019)CrossRefGoogle Scholar
  7. 7.
    Agarkhed, J., Kalnoor, G., Patil, S.R.: Intrusion detection system using pattern matching techniques for wireless sensor networks. In: Saini, H.S., Sayal, R., Govardhan, A., Buyya, R. (eds.) Innovations in Computer Science and Engineering. LNNS, vol. 32, pp. 411–418. Springer, Singapore (2019). Scholar
  8. 8.
    Kuntz, R.: Medium access control facing the dynamics of wireless sensor networks. Thesis, Strasbourg University, pp. 1–189 (2010)Google Scholar
  9. 9.
    Zhang, X., Heys, M.H., Li, C.: Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In: 25th symposium on communication, Kingston, ON, Canada, 12–14 May 2010, pp. 168–172 (2010)Google Scholar
  10. 10.
    AnandaKrishna, B., Madhuri, N., Koteswara, M.R., VijaySekar, B.: Implementation of a novel cryptographic algorithm in wireless sensor networks. In: 2018 Conference on Signal Processing And Communication Engineering Systems (SPACES), Vijayawada, India, 4–5 January 2018, pp. 149–153 (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.National Engineer School of Sfax, WIMCS Research TeamSfax UniversitySfaxTunisia
  2. 2.National Engineer School of Electronic and Communication, WIMCS Research TeamSfax UniversitySfaxTunisia

Personalised recommendations