Skip to main content

Advertisement

Log in

LSTR: Lightweight and Secure Tree-Based Routing for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper proposes a Lightweight and Secure Tree-based Routing protocol (LSTR) for Wireless Sensor Networks. The security of data routing from sensor nodes to the Base Station (BS) is achieved based on an efficient ID-based authenticated key-agreement protocol. LSTR reduces the number of required keys to a single permanent private-key preloaded in sensor nodes. This key is used subsequently to generate authenticated pairwise keys with other nodes without further digital signatures or certificates. As a result, LSTR achieves both node’s authenticity and confidentiality during data delivery at low cost and without involving the BS. In addition, a single message must be transmitted by the nodes for both the routing-tree construction and key-establishment at the same time, and which reduces the communication overheads. The performance analysis results show that LSTR reduces the storage requirements, the communication overheads and the energy dissipation compared to similar relevant works, particularly during the key-establishment. Additionally, the robustness of our scheme is highlighted through a security analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chang, J., & Shen, T. (2016). An efficient tree-based power saving scheme for wireless sensor networks with mobile sink. IEEE Sensors Journal, 16(20), 7545–7557.

    Article  Google Scholar 

  2. Liu, B., & Jhang, J. (2014). Efficient distributed data scheduling algorithm for data aggregation in wireless sensor networks. Computer Networks, 65, 73–83.

    Article  Google Scholar 

  3. Tunca, C., Isik, S., Donmez, M. Y., & Ersoy, C. (2015). Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink. IEEE Transactions on Mobile Computing, 14(9), 1947–1960.

    Article  Google Scholar 

  4. Ferng, H., & Rachmarini, D. (2012). A secure routing protocol for wireless sensor networks with consideration of energy efficiency. In 2012 IEEE network operations and management symposium, NOMS 2012, Maui, HI, USA, April 16–20, 2012 (pp. 105–112).

  5. Pathan, A. K., & Hong, C. S. (2008). SERP: Secure energy-efficient routing protocol for densely deployed wireless sensor networks. Annales des Télécommunications, 63(9–10), 529–541.

    Article  Google Scholar 

  6. Zhang, Y., Zheng, B., Ji, P., & Cao, J. (2015). A key management method based on dynamic clustering for sensor networks. International Journal of Distributed Sensor Networks, 11, 763675:1–763675:9.

    Google Scholar 

  7. Sr, A., & Baburaj, E. (2017). Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks. Computers & Electrical Engineering, 59, 274–290.

    Article  Google Scholar 

  8. Zhang, X., & Wang, J. (2015). An efficient key management scheme in hierarchical wireless sensor networks. In 2015 International conference on computing, communication and security (ICCCS) (pp. 1–7).

  9. Boneh, D., & Franklin, M. K. (2001). Identity-based encryption from the Weil pairing. In 21st annual international cryptology conference advances in cryptology—CRYPTO 2001, Santa Barbara, California, USA, August 19–23, 2001, Proceedings (pp. 213–229).

  10. Chen, L., & Kudla, C. (2003). Identity based authenticated key agreement protocols from pairings. In 16th IEEE computer security foundations workshop (CSFW-16 2003), 30 June–2 July 2003 (pp. 219–233). CA: Pacific Grove.

  11. Smart, N. P. (2001). An identity based authenticated key agreement protocol based on the weil pairing. IACR Cryptology ePrint Archive, 2001, 111.

    Google Scholar 

  12. Dhand, G., & Tyagi, S. (2016). Data aggregation techniques in WSN: Survey. Procedia Computer Science, 92, 378–384.

    Article  Google Scholar 

  13. Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. K. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE transactions on Dependable and Secure Computing, 12(1), 98–110.

    Article  Google Scholar 

  14. Zhong, H., Shao, L., Cui, J., & Xu, Y. (2018). An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks. Journal of Parallel and Distributed Computing, 111, 1–12.

    Article  Google Scholar 

  15. Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(3), 1040–1052.

    Article  Google Scholar 

  16. Wang, X., Bischoff, O., Laur, R., & Paul, S. (2009). Localization in wireless ad-hoc sensor networks using multilateration with RSSI for logistic applications. Procedia Chemistry, 1(1), 461–464.

    Article  Google Scholar 

  17. Kumar, M., & Dutta, K. (2015). A survey of security concerns in various data aggregation techniques in wireless sensor networks. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 1–15). New Delhi: Springer.

    Google Scholar 

  18. Khan, A. W., Abdullah, A. H., Razzaque, M. A., & Bangash, J. I. (2015). VGDRA: A virtual grid-based dynamic routes adjustment scheme for mobile sink-based wireless sensor networks. IEEE Sensors Journal, 15(1), 526–534.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khaled Hamouid.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hamouid, K., Othmen, S. & Barkat, A. LSTR: Lightweight and Secure Tree-Based Routing for Wireless Sensor Networks. Wireless Pers Commun 112, 1479–1501 (2020). https://doi.org/10.1007/s11277-020-07111-w

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07111-w

Keywords

Navigation