Skip to main content

Signature-Based Data Reporting in Wireless Sensor Networks

  • Conference paper
  • First Online:
Emerging Technology in Modelling and Graphics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 937))

  • 2658 Accesses

Abstract

Authenticated data transmission is a vital concern in wireless sensor networks (WSNs). Clustering approach in WSNs assists in improving the performance of resource-constrained sensor networks. In this paper, we propose an authenticated variation of LEACH (Sig-LEACH) for cluster-based WSNs (CWSNs). The cluster head node is chosen on a random rotation basis. The proposed protocol uses certificateless digital signature for node authentication. The security of the signature relies on elliptic curve discrete logarithm (ECDLP) hardness assumption. Sig-LEACH is. The simulation results illustrate the efficiency of the proposed protocol. In terms of energy consumption and security overhead, the results calculated from the propose protocols illustrated better performance than other existing protocols to secure CWSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I.F. Akyildiz, W. Su, Y. Sankara Subramaniam, E. Cayirci, Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. J.P. Walters, Z. Liang, W. Shi, V. Chaudhary, Wireless sensor network security: a survey. Secur. Distrib. Grid Mob. Pervasive Comput. 1, 367 (2007)

    Google Scholar 

  3. A.A. Abbasi, M. Younis, A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 30(14), 2826–2841 (2007)

    Article  Google Scholar 

  4. W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000, IEEE (Jan 2000), p. 10

    Google Scholar 

  5. A. Manjeshwar, Q.A. Zeng, D.P. Agrawal, An analytical model for information retrieval in wireless sensor networks using enhanced APTEEN protocol. IEEE Trans. Parallel Distrib. Syst. 13(12), 1290–1302 (2002)

    Article  Google Scholar 

  6. P. Banerjee, D. Jacobson, S.N. Lahiri, Security and performance analysis of a secure clustering protocol for sensor networks, in Sixth IEEE International Symposium on Network Computing and Applications, IEEE (NCA 2007) (July 2007), pp. 145–152

    Google Scholar 

  7. L.B. Oliveira, A. Ferreira, M.A. Vilaça, H.C. Wong, M. Bern, R. Dahab, A.A. Loureiro, SecLEACH—on the security of clustered sensor networks. Sig. Process. 87(12), 2882–2895 (2007)

    Article  Google Scholar 

  8. K. Zhang, C. Wang, C. Wang, A secure routing protocol for cluster-based wireless sensor networks using group key management, in 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE (Oct 2008), pp. 1–5

    Google Scholar 

  9. S. Sharma, S.K. Jena, A survey on secure hierarchical routing protocols in wireless sensor networks, in Proceedings of the 2011 International Conference on Communication, Computing & Security, ACM (Feb 2011), pp. 146–151

    Google Scholar 

  10. A. Liu, P. Ning, TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks, in International Conference on Information Processing in Sensor Networks, 2008. IPSN’08, IEEE (Apr 2008), pp. 245–256

    Google Scholar 

  11. A. Shamir, Identity-based cryptosystems and signature schemes, in Proceedings of CRYPTO’84 on Advances in Cryptology (1984), pp. 47–53

    Google Scholar 

  12. S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, Berlin Heidelberg, Nov 2003), pp. 452–473

    Chapter  Google Scholar 

  13. J.L. Tsai, N.W. Lo, T.C. Wu, Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. Int. J. Commun. Syst. 27(7), 1083–1090 (2014)

    Article  Google Scholar 

  14. Y. Wang, X. Peng, J. Bian, Key management mechanism for authentication security in wireless sensor network. Appl. Math. 9(2), 711–719 (2015)

    MathSciNet  Google Scholar 

  15. R. Yasmin, E. Ritter, W.A.N.G. Guilin, An authentication framework for wireless sensor networks using identity-based signatures: implementation and evaluation. IEICE Trans. Inf. Syst. 95(1), 126–133 (2012)

    Article  Google Scholar 

  16. H. Lu, J. Li, M. Guizani, Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(3), 750–761 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajay Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhalla, M., Sharma, A. (2020). Signature-Based Data Reporting in Wireless Sensor Networks. In: Mandal, J., Bhattacharya, D. (eds) Emerging Technology in Modelling and Graphics. Advances in Intelligent Systems and Computing, vol 937. Springer, Singapore. https://doi.org/10.1007/978-981-13-7403-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7403-6_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7402-9

  • Online ISBN: 978-981-13-7403-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics