Skip to main content

Advertisement

Log in

Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The development of smart cities and their fast-paced deployment leads to the creation of massive amount of data at exceptional rates. Due to the data gathering and tracking nature of wireless sensor networks (WSN), it finds applications in various domains. Presently, security is considered as an important design issue of developing multipath routing protocols in WSN. The existing routing techniques either concentrate on energy efficiency or security issues with maximum resource utilization. This paper focuses on the idea of incorporating encryption algorithms on multihop routing mechanism in WSN. Here, routing takes place by the Augmented Tree Based Routing (ATR) which is a tree-based multipath routing method. To attain higher level of security, two encryption algorithms namely lightweight encryption algorithm (LEA) and two phase hybrid cryptography algorithm (THCA) are employed based on the data dependability. The encryption algorithms are utilized based on data dependability where general data is encrypted by LEA and other confidential data are encrypted by THCA. i.e. the LEA is used to send proactive data and the important reactive data is encrypted by THCA. For routing purposes, Augmented Tree Based Routing (ATR) is used. From experimentation, it is evident that the presented method exhibits enhanced performance by means of throughput, control overhead and network lifetime even though there exist some misbehaving nodes in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen CP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf Sci 275:314–347

    Article  Google Scholar 

  2. Pathan ASK e (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press

  3. Yasin D, Saghar K, Younis S (2016, January) Formal modeling and verification of rumor routing protocol. In 2016 13th international Bhurban conference on applied sciences and technology (IBCAST) (pp. 318–323). IEEE

  4. Ali A, Ming Y, Chakraborty S, Iram S (2017) A comprehensive survey on real-time applications of WSN. Future internet 9(4):77

    Article  Google Scholar 

  5. Pathan ASK ed. (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC Press

  6. Hasan MZ, Al-Rizzo H, Al-Turjman F (2017) A survey on multipath routing protocols for QoS assurances in real-time wireless multimedia sensor networks. IEEE COMMUN SURV TUT19(3):1424–1456

  7. Kohno E, Okazaki T, Takeuchi M, Ohta T, Kakuda Y, Aida M (2012) Improvement of assurance including security for wireless sensor networks using dispersed data transmission. J Comput Syst Sci 78:1703–1715

    Article  MathSciNet  Google Scholar 

  8. Nasser N, Chen Y (2007) SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput Commun 30(11–12):2401–2412

    Article  Google Scholar 

  9. Jing C, Ruiying D, Qian W, Shixiong Y (2013) Secure routing based on network coding in wireless sensor networks. In: Proceedings of the 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom); p. 5864

  10. Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330

    Article  Google Scholar 

  11. Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: a survey. IEEE COMMUN SURV TUT 10:6–28

  12. Khalil I, Bagchi S, Rotaru CN, Shroff NB (2010) UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw 8:148–164

    Article  Google Scholar 

  13. Brandl M, Kellner KH, Posnicek T, Kos A, Mayerhofer C, Fabian C (2009) An efficient source initiated on-demand data forwarding scheme for wireless sensor networks. In: Proceedings of the 7th international conference on information, communications and signal processing (ICICS 2009). Macau Fisherman's Wharf, Macau. p. 17

  14. Intanagonwiwat C, Govindan R, Estrin D, (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proceedings of ACM Mobicom, Boston, MA

  15. Dutta AK, Elhoseny M, Dahiya V, Shankar K (2019. In Press) An efficient hierarchical clustering protocol for multihop internet of vehicles communication. Trans. Emerg. Telecommun. Technol. https://doi.org/10.1002/ett.3690

  16. Mohamed Elhoseny and K. Shankar, Reliable data transmission model for Mobile ad hoc network using Signcryption technique, IEEE Transactions on Reliability, page(s): 1-10, 2019. In Press. https://doi.org/10.1109/TR.2019.2915800

  17. Uma Maheswari P, Manickam P, Kumar KS, Maseleno A, Shankar K (2019. In Press) Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for Named Data Networking (NDN). J. Intell. Fuzzy Syst. https://doi.org/10.3233/JIFS-179086

  18. Senthil Ragavan VK, Mohamed Elhoseny KS (2019) An enhanced whale optimization algorithm for vehicular communication networks. Int J Commun Syst. https://doi.org/10.1002/dac.3953

  19. Gupta D, Khanna A, SK L, Shankar K, Furtado V, Rodrigues JJPC (2018) Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3524

  20. Akkaya K, Younis M (2005) A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks Journal 3(3):325–349

    Article  Google Scholar 

  21. A. Hac, Wireless sensor network designs, Wiley, 2003, ISBN 0-470- 86736-1

  22. Perrig A, Szewczyk R, Wen V, Culler D, Tygar J, (2001) SPINS: security protocols for sensor networks, in: Proceedings of Mobile networking and computing 2001, Rome, Italy

  23. Biswas K, Muthukkumarasamy V, Sithirasenan E, Singh K (2014) A simple lightweight encryption scheme for wireless sensor networks. In: International conference on distributed computing and networking. Springer, Berlin, Heidelberg, pp 499–504

    Chapter  Google Scholar 

  24. Rizk R, Alkady Y (2015) Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology 2(3):296–313

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Brindha.

Additional information

This article is part of the Topical Collection: Special Issue on Future Networking Applications Plethora for Smart Cities

Guest Editors: Mohamed Elhoseny, Xiaohui Yuan, and Saru Kumari

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Brindha, P., Senthilkumar, A. Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks. Peer-to-Peer Netw. Appl. 13, 1142–1151 (2020). https://doi.org/10.1007/s12083-019-00813-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00813-4

Keywords

Navigation