Advertisement

An Enhanced Security Pattern for Wireless Sensor Network

  • Venu Madhav Kuthadi
  • Rajalakshmi Selvaraj
  • Tshilidzi Marwala
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 380)

Abstract

Numerous schemes for data aggregation are done by encryption for privacy of data, and thus, homomorphism has been reviewed and designed on the wireless sensor network (WSN) to improve security. WSN is an emerging and challenging technology in the area of the research because of its vital scope with low power energy associated with it. Several application sensors collect information or data from different sensed nodes and will be aggregated to a host computer or a base station. Data aggregation happens in a network between intermediate nodes which causes to reduce energy consumption on these nodes to make efficient network performance. The algorithm used in existing aggregation system does not provide sufficient security functionality and is more vulnerable to several attacks. Furthermore, some compromised nodes also inject false data which leads to a falsify data aggregation which is forwarded to base station. The enlargement of WSNs is thrombosed due the limited energy constraints. The main focus of this paper is done mainly on enhancing energy in WSN by working on the enhancement of some routing protocol. This paper also explains on eliminating of data vulnerability, security aggregation, and false data injecting attack by presenting different robust surveys and protocols. In this paper, initial discussions are done on WSN with a detailed overview of sensor, and reviews are made on providing security of wireless sensor network. The proposed novel idea is used in aggregating data during exchanging of messages and to preserve its data privacy and also to overcome problem in network construction (NC) and its security. The NC is done by clustering its topology, and assigning heads to each cluster with huge communication range, also security pattern generation is created for protecting the data information.

Keywords

Wireless sensor network Data aggregation False data injecting attack Pattern generation 

References

  1. 1.
    Sanli, H.O., Ozdemir, S., Cam, H.: SRDA: Secure reference based data aggregation protocol for wireless sensor networks. In: 60th IEEE Vehicular Technology Conference, USA, pp. 4650–4654 (2004)Google Scholar
  2. 2.
    Stefanos, A.N., Dionisis, K., Dimitrios, D.V., Christos, D.: Energy efficient routing in wireless sensor networks through balanced clustering. Algorithms 6, 29–42 (2013)CrossRefGoogle Scholar
  3. 3.
    Kuthadi, V.M., Rajendra, C., Selvaraj, R.: A study of security challenges in wireless sensor networks. JATIT 20(1), 39–44 (2010)Google Scholar
  4. 4.
    Abhishek, P., Tripathi, R.C.: A Survey on Wireless Sensor Networks Security. Int. J. Comput. Appl. 3(2), 43–49 (2010)Google Scholar
  5. 5.
    Yao, L., Cui, X., Wang, M.: An energy-balanced clustering routing algorithm for wireless sensor network. In: WRI World Congress on Computer Science and Information Engineering, Los Angeles, CA, pp 316–320 (2009)Google Scholar
  6. 6.
    Vaibhav, V.D., Bhagat, A.R.: Energy distributed clustering for improving lifetime of wireless sensor network. Int. J. Emerg. Sci. Eng. 1(7), 62–65 (2013)Google Scholar
  7. 7.
    Gupta, G., Younis, M.: Performance evaluation of load-balanced clustering of wireless sensor networks. In: 10th International Conference on Telecommunications, USA, pp. 1577–1853 (2003)Google Scholar
  8. 8.
    Chris, K., David, W.: Secure routing in wireless sensor networks. Ad Hoc Netw. 1, 293–315 (2003)CrossRefGoogle Scholar
  9. 9.
    Kuthadi, V.M., Selvaraj, R., Marwala, T.: An efficient web services framework for secure data collection in wireless sensor network. British J. Sci. 12(1), 18–31 (2015)Google Scholar
  10. 10.
    Cam, H., Ozdemir, S., Nair,P., and Muthuavinashiappan, D.: ESPDA: energy-efficient and secure pattern-based data aggregation for wireless sensor networks. In: 2nd IEEE Conference on Sensors, Toronto, Canada (2003)Google Scholar
  11. 11.
    Suat, O., Yang, X.: Secure data aggregation in wireless sensor networks. Comput. Netw. 53(12), 2022–2037 (2009)MATHCrossRefGoogle Scholar
  12. 12.
    Chan, H., Perrig, A., Przydatek, B., Song, B.: SIA: Secure Information Aggregation in Sensor Networks. J. Compu. Secur. 15(1), 69–102 (2007)Google Scholar
  13. 13.
    Nazir, B., Hasbullah, H.: Energy balanced clustering in wireless sensor network. In: International Symposium in Information Technology, Kuala Lumpur, pp. 569–574 (2010)Google Scholar
  14. 14.
    Zhou, G., He, T., Krishnamurthy, S., Stankovic, J.A.: Models and solutions for radio irregularity in wireless sensor Networks. ACM Trans. Sens. Netw. 2(2), 221–262 (2006)CrossRefGoogle Scholar
  15. 15.
    Kung, H., Hua, J., Chen, C.: Drought forecast model and framework using wireless sensor networks. J. Inform. Sci. Eng. 22, 751–769 (2006)Google Scholar
  16. 16.
    Chen, G., Li, C., Ye, M., Wu, J.: An unequal cluster- based routing strategy in wireless sensor networks. J. wirel. Netw. 15(2), 193–207 (2009)CrossRefGoogle Scholar
  17. 17.
    Cao, Q., He, T., Abdelzaher, T.: uCast: Unified Connectionless Multicast for Energy Efficient Content Distribution in Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 18(2), 240–250 (2007)CrossRefGoogle Scholar
  18. 18.
    Hu, L., Li, Y., Chen, Q., Liu, J.: A new energy-aware routing protocol for wireless sensor networks. In: International Conference on Wireless Communications, Net-working and Mobile Computing, Shanghai, pp. 2444–2447 (2007)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  • Venu Madhav Kuthadi
    • 1
  • Rajalakshmi Selvaraj
    • 2
  • Tshilidzi Marwala
    • 3
  1. 1.Department of AISUniversity of JohannesburgJohannesburgSouth Africa
  2. 2.Department of Computer ScienceBIUSTGaboroneBotswana
  3. 3.Faculty of Engineering and the Built EnvironmentUniversity of JohannesburgJohannesburgSouth Africa

Personalised recommendations