Abstract
Authenticated data transmission is a vital concern in wireless sensor networks (WSNs). Clustering approach in WSNs assists in improving the performance of resource-constrained sensor networks. In this paper, we propose an authenticated variation of LEACH (Sig-LEACH) for cluster-based WSNs (CWSNs). The cluster head node is chosen on a random rotation basis. The proposed protocol uses certificateless digital signature for node authentication. The security of the signature relies on elliptic curve discrete logarithm (ECDLP) hardness assumption. Sig-LEACH is. The simulation results illustrate the efficiency of the proposed protocol. In terms of energy consumption and security overhead, the results calculated from the propose protocols illustrated better performance than other existing protocols to secure CWSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
I.F. Akyildiz, W. Su, Y. Sankara Subramaniam, E. Cayirci, Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
J.P. Walters, Z. Liang, W. Shi, V. Chaudhary, Wireless sensor network security: a survey. Secur. Distrib. Grid Mob. Pervasive Comput. 1, 367 (2007)
A.A. Abbasi, M. Younis, A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 30(14), 2826–2841 (2007)
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000, IEEE (Jan 2000), p. 10
A. Manjeshwar, Q.A. Zeng, D.P. Agrawal, An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol. IEEE Trans. Parallel Distrib. Syst. 13(12), 1290–1302 (2002)
P. Banerjee, D. Jacobson, S.N. Lahiri, Security and performance analysis of a secure clustering protocol for sensor networks, in Sixth IEEE International Symposium on Network Computing and Applications, IEEE (NCA 2007) (July 2007), pp. 145–152
L.B. Oliveira, A. Ferreira, M.A. Vilaça, H.C. Wong, M. Bern, R. Dahab, A.A. Loureiro, SecLEACH—on the security of clustered sensor networks. Sig. Process. 87(12), 2882–2895 (2007)
K. Zhang, C. Wang, C. Wang, A secure routing protocol for cluster-based wireless sensor networks using group key management, in 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE (Oct 2008), pp. 1–5
S. Sharma, S.K. Jena, A survey on secure hierarchical routing protocols in wireless sensor networks, in Proceedings of the 2011 International Conference on Communication, Computing & Security, ACM (Feb 2011), pp. 146–151
A. Liu, P. Ning, TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks, in International Conference on Information Processing in Sensor Networks, 2008. IPSN’08, IEEE (Apr 2008), pp. 245–256
A. Shamir, Identity-based cryptosystems and signature schemes, in Proceedings of CRYPTO’84 on Advances in Cryptology (1984), pp. 47–53
S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, Berlin Heidelberg, Nov 2003), pp. 452–473
J.L. Tsai, N.W. Lo, T.C. Wu, Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int. J. Commun. Syst. 27(7), 1083–1090 (2014)
Y. Wang, X. Peng, J. Bian, Key management mechanism for authentication security in wireless sensor network. Appl. Math. 9(2), 711–719 (2015)
R. Yasmin, E. Ritter, W.A.N.G. Guilin, An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation. IEICE Trans. Inf. Syst. 95(1), 126–133 (2012)
H. Lu, J. Li, M. Guizani, Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3), 750–761 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhalla, M., Sharma, A. (2020). Signature-Based Data Reporting in Wireless Sensor Networks. In: Mandal, J., Bhattacharya, D. (eds) Emerging Technology in Modelling and Graphics. Advances in Intelligent Systems and Computing, vol 937. Springer, Singapore. https://doi.org/10.1007/978-981-13-7403-6_22
Download citation
DOI: https://doi.org/10.1007/978-981-13-7403-6_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7402-9
Online ISBN: 978-981-13-7403-6
eBook Packages: EngineeringEngineering (R0)