Abstract
This paper proposes a Lightweight and Secure Tree-based Routing protocol (LSTR) for Wireless Sensor Networks. The security of data routing from sensor nodes to the Base Station (BS) is achieved based on an efficient ID-based authenticated key-agreement protocol. LSTR reduces the number of required keys to a single permanent private-key preloaded in sensor nodes. This key is used subsequently to generate authenticated pairwise keys with other nodes without further digital signatures or certificates. As a result, LSTR achieves both node’s authenticity and confidentiality during data delivery at low cost and without involving the BS. In addition, a single message must be transmitted by the nodes for both the routing-tree construction and key-establishment at the same time, and which reduces the communication overheads. The performance analysis results show that LSTR reduces the storage requirements, the communication overheads and the energy dissipation compared to similar relevant works, particularly during the key-establishment. Additionally, the robustness of our scheme is highlighted through a security analysis.
Similar content being viewed by others
References
Chang, J., & Shen, T. (2016). An efficient tree-based power saving scheme for wireless sensor networks with mobile sink. IEEE Sensors Journal, 16(20), 7545–7557.
Liu, B., & Jhang, J. (2014). Efficient distributed data scheduling algorithm for data aggregation in wireless sensor networks. Computer Networks, 65, 73–83.
Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2015). Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink. IEEE Transactions on Mobile Computing, 14(9), 1947–1960.
Ferng, H., & Rachmarini, D. (2012). A secure routing protocol for wireless sensor networks with consideration of energy efficiency. In 2012 IEEE network operations and management symposium, NOMS 2012, Maui, HI, USA, April 16–20, 2012 (pp. 105–112).
Pathan, A. K., & Hong, C. S. (2008). SERP: Secure energy-efficient routing protocol for densely deployed wireless sensor networks. Annales des Télécommunications, 63(9–10), 529–541.
Zhang, Y., Zheng, B., Ji, P., & Cao, J. (2015). A key management method based on dynamic clustering for sensor networks. International Journal of Distributed Sensor Networks, 11, 763675:1–763675:9.
Sr, A., & Baburaj, E. (2017). Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. Computers & Electrical Engineering, 59, 274–290.
Zhang, X., & Wang, J. (2015). An efficient key management scheme in hierarchical wireless sensor networks. In 2015 International conference on computing, communication and security (ICCCS) (pp. 1–7).
Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In 21st annual international cryptology conference advances in cryptology—CRYPTO 2001, Santa Barbara, California, USA, August 19–23, 2001, Proceedings (pp. 213–229).
Chen, L., & Kudla, C. (2003). Identity based authenticated key agreement protocols from pairings. In 16th IEEE computer security foundations workshop (CSFW-16 2003), 30 June–2 July 2003 (pp. 219–233). CA: Pacific Grove.
Smart, N. P. (2001). An identity based authenticated key agreement protocol based on the weil pairing. IACR Cryptology ePrint Archive, 2001, 111.
Dhand, G., & Tyagi, S. (2016). Data aggregation techniques in WSN: Survey. Procedia Computer Science, 92, 378–384.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. K. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE transactions on Dependable and Secure Computing, 12(1), 98–110.
Zhong, H., Shao, L., Cui, J., & Xu, Y. (2018). An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks. Journal of Parallel and Distributed Computing, 111, 1–12.
Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(3), 1040–1052.
Wang, X., Bischoff, O., Laur, R., & Paul, S. (2009). Localization in wireless ad-hoc sensor networks using multilateration with RSSI for logistic applications. Procedia Chemistry, 1(1), 461–464.
Kumar, M., & Dutta, K. (2015). A survey of security concerns in various data aggregation techniques in wireless sensor networks. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 1–15). New Delhi: Springer.
Khan, A. W., Abdullah, A. H., Razzaque, M. A., & Bangash, J. I. (2015). VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based wireless sensor networks. IEEE Sensors Journal, 15(1), 526–534.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Hamouid, K., Othmen, S. & Barkat, A. LSTR: Lightweight and Secure Tree-Based Routing for Wireless Sensor Networks. Wireless Pers Commun 112, 1479–1501 (2020). https://doi.org/10.1007/s11277-020-07111-w
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07111-w