Open Access Open Access  Restricted Access Subscription or Fee Access

Energy Efficient Secure Packet Transmission with Intrusion Detection in Wireless Sensor Network

L. Sheeba, V. S. Meenakshi

Abstract


Over the last few decades, Cluster-Based Wireless Sensor Networks (CBWSNs) have played a crucial role in handling various challenges such as load balancing, routing, network lifetime, etc. of large scale Wireless Sensor Networks (WSNs) [1-3].  The sensed data are transmitted through the network which may get altered maliciously by an attacker.  Especially when nodes in the cluster selfishly behave, e.g., not forwarding other nodes’ data, to save their limited resources.  However, the security becomes a big problem for CBWSNs. To overcome this problem, various cryptographic keys are used and these keys should be managed and maintained properly with optimum resources [4]. However, it does not provide satisfactory performance interms of encryption time and security.  In the previous phase of this research work, the Prioritization Based Delay Avoided Secured and Reliable Data Transmission Method (PBDASRDT) are designed. However, this research method doesn’t focus on the energy conservation parameters. And also the previous phase of the research work does not discuss about the security provisioning methods.  

To solve this problem the proposed system designed an Energy Efficient Secure Packet Transmission with Intrusion Detection (EESPT-ID) system for transmitting packets with higher efficiency. In this work, clustering is computed for achieving higher energy efficiency. The security of the system is enhanced by introducing the dynamic key based encryption technique. Here the dynamic key generation process is done in the cluster head and the encryption is done by using AES technique. This methodology can improve the network performance considerably by detecting the attacks more accurately with reduced delay.  


Full Text:

PDF

References


Lu, H., Li, J., & Guizani, M. (2013). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE transactions on parallel and distributed systems, 25(3), pp.750-761.

Neamatollahi, P., Abrishami, S., Naghibzadeh, M., Moghaddam, M. H. Y., & Younis, O. (2017). Hierarchical clustering-task scheduling policy in cluster-based wireless sensor networks. IEEE Transactions on Industrial Informatics, 14(5), 1876-1886.

Osamy, W., & Khedr, A. M. (2018). An algorithm for enhancing coverage and network lifetime in cluster-based Wireless Sensor Networks. International Journal of Communication Networks and Information Security, 10(1), 1-9.

Mezrag, F., Bitam, S., & Mellouk, A. (2017, December). Secure routing in cluster- based wireless sensor networks. In GLOBECOM 2017-2017 IEEE Global Communications Conference (pp. 1-6). IEEE.

Yogarajan, G., & Revathi, T. (2018). Improved cluster based data gathering using ant lion optimization in wireless sensor networks. Wireless Personal Communications, 98(3), 2711-2731.

S. Ozdemir and Y. Xiao, “Secure data aggregation in wireless sensor networks: a comprehensive overview,” Computer Networks, vol. 53, no. 12, pp. 2022–2037, 2009.

R. Rajagopalan and P. K. Varshney, “Data aggregation techniques in sensor networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 8, no. 4, pp. 48–63, 2006.

J. He, S. Ji, Y. Pan, and Y. Li, “Greedy construction of load balanced virtual backbones in wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 14, no. 7, pp. 673–688, 2014.

K. Maraiya, K. Kant, and N. Gupta, “Wireless sensor network: a review on data aggregation,” International Journal of Scientific & Engineering Research, vol. 2, no. 4, pp. 1–7, 2011.

S. Lee, M. Younis, and M. Lee, “Connectivity restoration in a partitioned wireless sensor network with assured fault tolerance,” Ad Hoc Networks, vol. 24, pp. 1–19, 2015.

S. H. Lee, S. Lee, H. Song, and H. S. Lee, “Gradual cluster head election for high network connectivity in large-scale sensor networks,” in Proceedings of the 13th International Conference on Advanced Communication Technology: Smart Service Innovation through Mobile Interactivity (ICACT ’11), pp. 168–172, February 2011.

Jan, B., Farman, H., Javed, H., Montrucchio, B., Khan, M., & Ali, S. (2017). Energy efficient hierarchical clustering approaches in wireless sensor networks: A survey. Wireless Communications and Mobile Computing, 2017.

Haneef, M., & Zhongliang, D. (2012). Design challenges and comparative analysis of cluster based routing protocols used in wireless sensor networks for improving network life time. Advances in Information Sciences and Service Sciences, 4(1).

He, X., Niedermeier, M., & De Meer, H. (2013). Dynamic key management in wireless sensor networks: A survey. Journal of network and computer applications, 36(2), 611-622.

Goyal, P., Kumar, M., & Sharma, R. (2012). A novel and efficient dynamic key management technique in wireless sensor network. International Journal of Advanced Networking and Applications, 4(1), 1462.

Sheeba, L. and Meenakshi V.S, “Latency and Power Aware Reliable Intrusion Detection System for Ensuring Network Security in Military Applications”, International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue-2S11, September 2019.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.