Skip to main content

S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10656))

Abstract

Wireless sensor networks (WSNs) have recently gained a lot of attentions as a hot topic of research, with extensive applications being explored. In WSNs, bulk data dissemination protocols are responsible for reprogramming, which have been proposed for efficiency and security. However, few of them can simultaneously achieve both reliability and security. To address this problem, we propose an enhanced protocol entitled Secure Survival of the Fittest (S-SurF) based on SurF [6] in this paper. The proposed protocol is composed of four main phases: packet preprocessing, flooding, negotiation and data verification. Moreover, S-SurF incorporates a time-reliability model to predict the minimum completion time and hence seizes the most opportune moment to transit between flooding and negotiation schemes. In addition, extensive analysis proves the efficiency and security of S-SurF.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 38(4), 393–422 (2002)

    Google Scholar 

  2. Marco, A., Casas, R., Ramos, J.L.S., Coarasa, V., Asensio, A., Obaidat, M.S.: Synchronization of multihop wireless sensor networks at the application layer. IEEE Wirel. Commun. 18(1), 82–88 (2011)

    Article  Google Scholar 

  3. Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. (2017). https://doi.org/10.1109/TIFS.2017.2705620

  4. Yin, J., Madria, S.: SecRout: a secure routing protocol for sensor networks. In: International Conference on Advanced Information Networking and Applications, pp. 393–398 (2006)

    Google Scholar 

  5. Huang, L., Setia, S.: Reliable Bulk Data Dissemination in Sensor Networks, vol. 14, no. 3, pp. 115–124. George Mason University (2007)

    Google Scholar 

  6. Zheng, X., Wang, J., Dong, W., He, Y., Liu, Y.: Bulk data dissemination in wireless sensor networks: analysis, implications and improvement. IEEE Trans. Comput. 65(5), 1428–1439 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  7. He, D., Chan, S., Guizani, M., Yang, H., Zhou, B.: Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1129–1139 (2015)

    Article  Google Scholar 

  8. He, D., Chan, S., Guizani, M.: Small data dissemination for wireless sensor networks: the security aspect. IEEE Wirel. Commun. 21(3), 110–116 (2014)

    Article  Google Scholar 

  9. Iabbassen, D., Moussaoui, S.: Data dissemination protocols in wireless sensor networks client/server versus mobile agent paradigms. In: International Conference on Innovative Computing Technology, pp. 45–50 (2015)

    Google Scholar 

  10. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Trans. Dependable Secure Comput. (2017). https://doi.org/10.1109/TDSC.2017.2725953

  11. He, D., Chan, S., Zhang, Y., Yang, H.: Lightweight and confidential data discovery and dissemination for wireless body area networks. IEEE J. Biomed. Health Inform. 18(2), 440–448 (2014)

    Article  Google Scholar 

  12. Mavoungou, S., Kaddoum, J., Taha, M., Matar, G.: Survey on threats and attacks on mobile networks. IEEE Access 4, 4543–4572 (2016)

    Article  Google Scholar 

  13. Merkle, R.: Protocols for public key cryptosystems. In: IEEE Security Privacy, pp. 122–134 (1980)

    Google Scholar 

  14. Jose, J.: Secure data dissemination protocol in wireless sensor networks using XOR network coding. Int. J. Adv. Res. Comput. Commun. Eng. 3(27), 57–61 (2014)

    Google Scholar 

  15. Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener. Comput. Syst. (2016). https://doi.org/10.1016/j.future.2016.11.033

  16. Sasson, Y., Cavin, D., Schiper, A.: Probabilistic broadcast for flooding in wireless mobile ad hoc networks. Wirel. Commun. Netw. 2, 1124–1130 (2013)

    Google Scholar 

  17. Lou, W., Wu, J.: Toward broadcast reliability in mobile ad hoc networks with double coverage. IEEE Trans. Mob. Comput. 6(2), 148–163 (2007)

    Article  Google Scholar 

  18. Feng, J., Lu, Y., Jung, B., Peroulis, D., Hu, Y.: Energy-efficient data dissemination using beamforming in wireless sensor networks. ACM Trans. Sens. Netw. 9(3), 31 (2013)

    Article  Google Scholar 

  19. Li, Y., Bartos, R.: Efficient regional information dissemination protocol for intermittently connected mobile wireless sensor networks. In: Southeastcon, pp. 1–8 (2016)

    Google Scholar 

  20. Ni, S., Tseng, Y., Chen, Y., Sheu, J.: The broadcast storm problem in a mobile ad hoc network. In: Proceedings of ACM MobiCom (1999)

    Google Scholar 

  21. Sabbineni, H., Chakrabarty, K.: Location-aided flooding: an energy-efficient data dissemination protocol for wireless-sensor networks. IEEE Trans. Comput. 54(1), 36–46 (2005)

    Article  Google Scholar 

  22. Kifah, S., Abdullah, S.: An adaptive non-linear great deluge algorithm for the patient-admission problem. Inf. Sci. 295, 573–585 (2015)

    Article  MathSciNet  Google Scholar 

  23. Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy, p. 56 (2000)

    Google Scholar 

  24. Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: International Conference on Information Processing in Sensor Networks, pp. 245–256 (2008)

    Google Scholar 

  25. Hui, J., Culler, D.: The dynamic behavior of a data dissemination protocol for network programming at scale. In: The ACM Conference on Embedded Networked Sensor Systems, pp. 81–94 (2004)

    Google Scholar 

  26. Huang, L., Setia, S.: Cord: energy-efficient reliable bulk data dissemination in sensor networks. In: Proceedings of IEEE FOCOM, vol. 14, no. 3, pp. 115–124 (2008)

    Google Scholar 

  27. Zhao, Z., Bu, J., Dong, W., Gu, T., Xu, X.: CoCo+: exploiting correlated core for energy efficient dissemination in wireless sensor networks. Ad Hoc Netw. 37, 404–417 (2016)

    Article  Google Scholar 

  28. Shen, J., Wang, C., Castiglione, A., Liu, D., Esposito, C.: Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks. IEEE Trans. Big Data (2017). https://doi.org/10.1109/TBDATA.2017.2710347

  29. Bagga, N., Sharma, S., Jain, S., Sahoo, T.: A cluster-tree based data dissemination routing protocol. Proc. Comput. Sci. 54, 7–13 (2015)

    Article  Google Scholar 

  30. Yu, Z., Wei, Y., Ramkumar, B., Guan, Y.: An efficient signature-based scheme for securing network coding against pollution attacks. In: IEEE International Conference on Computer, pp. 1409–1417 (2008)

    Google Scholar 

  31. Murugadoss, G., Sivakumar, P., Manikandan, R.: Secure and scattered data sighting and dissemination in wireless sensor networks. Aust. J. Basic Appl. Sci. 10(2), 114–124 (2016)

    Google Scholar 

  32. Shen, J., Liu, D., Liu, Q., Sun, X., Zhang, Y.: Secure authentication in cloud big data with hierarchical attribute authorization structure. IEEE Trans. Big Data (2017). https://doi.org/10.1109/TBDATA.2017.2705048

  33. Farooq, M., Zhu, Q.: Secure and reconfigurable network design for critical information dissemination in the internet of battlefield things (IoBT). In: International Symposium on Modeling and Optimization in Mobile (2017)

    Google Scholar 

  34. Li, X., Xu, J., Dai, H., Zhao, Q., Cheang, C., Wang, Q.: On modeling eavesdropping attacks in wireless networks. J. Comput. Sci. 11, 196–204 (2015)

    Article  MathSciNet  Google Scholar 

  35. Shrivastava, A., Dubey, R.: Wormhole attack in mobile ad-hoc network: a survey. Int. J. Secur. Appl. 9(7), 293–298 (2015)

    Google Scholar 

  36. Kulik, J., Heinzelman, W., Balakrishnan, H.: Negotiation-based protocols for disseminating information in wireless sensor networks. Wirel. Netw. 8(2–3), 169–185 (2002)

    Article  MATH  Google Scholar 

  37. Kyasanur, P., Choudhury, R., Gupta, I.: Smart gossip: an adaptive gossip-based broadcasting service for sensor networks. In: IEEE International Conference on Mobile AdHoc and Sensor Systems, pp. 91–100 (2006)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant Nos. 61672295, 61672290 and U1405254, the State Key Laboratory of Information Security under Grant No. 2017-MS-10, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sai Ji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shen, J., Miao, T., Liu, Q., Ji, S., Wang, C., Liu, D. (2017). S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72389-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72388-4

  • Online ISBN: 978-3-319-72389-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics