Abstract
The development of smart cities and their fast-paced deployment leads to the creation of massive amount of data at exceptional rates. Due to the data gathering and tracking nature of wireless sensor networks (WSN), it finds applications in various domains. Presently, security is considered as an important design issue of developing multipath routing protocols in WSN. The existing routing techniques either concentrate on energy efficiency or security issues with maximum resource utilization. This paper focuses on the idea of incorporating encryption algorithms on multihop routing mechanism in WSN. Here, routing takes place by the Augmented Tree Based Routing (ATR) which is a tree-based multipath routing method. To attain higher level of security, two encryption algorithms namely lightweight encryption algorithm (LEA) and two phase hybrid cryptography algorithm (THCA) are employed based on the data dependability. The encryption algorithms are utilized based on data dependability where general data is encrypted by LEA and other confidential data are encrypted by THCA. i.e. the LEA is used to send proactive data and the important reactive data is encrypted by THCA. For routing purposes, Augmented Tree Based Routing (ATR) is used. From experimentation, it is evident that the presented method exhibits enhanced performance by means of throughput, control overhead and network lifetime even though there exist some misbehaving nodes in the network.
Similar content being viewed by others
References
Chen CP, Zhang CY (2014) Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf Sci 275:314–347
Pathan ASK e (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press
Yasin D, Saghar K, Younis S (2016, January) Formal modeling and verification of rumor routing protocol. In 2016 13th international Bhurban conference on applied sciences and technology (IBCAST) (pp. 318–323). IEEE
Ali A, Ming Y, Chakraborty S, Iram S (2017) A comprehensive survey on real-time applications of WSN. Future internet 9(4):77
Pathan ASK ed. (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC Press
Hasan MZ, Al-Rizzo H, Al-Turjman F (2017) A survey on multipath routing protocols for QoS assurances in real-time wireless multimedia sensor networks. IEEE COMMUN SURV TUT19(3):1424–1456
Kohno E, Okazaki T, Takeuchi M, Ohta T, Kakuda Y, Aida M (2012) Improvement of assurance including security for wireless sensor networks using dispersed data transmission. J Comput Syst Sci 78:1703–1715
Nasser N, Chen Y (2007) SEEM: secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput Commun 30(11–12):2401–2412
Jing C, Ruiying D, Qian W, Shixiong Y (2013) Secure routing based on network coding in wireless sensor networks. In: Proceedings of the 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom); p. 5864
Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330
Yun Z, Yuguang F, Yanchao Z (2008) Securing wireless sensor networks: a survey. IEEE COMMUN SURV TUT 10:6–28
Khalil I, Bagchi S, Rotaru CN, Shroff NB (2010) UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw 8:148–164
Brandl M, Kellner KH, Posnicek T, Kos A, Mayerhofer C, Fabian C (2009) An efficient source initiated on-demand data forwarding scheme for wireless sensor networks. In: Proceedings of the 7th international conference on information, communications and signal processing (ICICS 2009). Macau Fisherman's Wharf, Macau. p. 17
Intanagonwiwat C, Govindan R, Estrin D, (2000) Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proceedings of ACM Mobicom, Boston, MA
Dutta AK, Elhoseny M, Dahiya V, Shankar K (2019. In Press) An efficient hierarchical clustering protocol for multihop internet of vehicles communication. Trans. Emerg. Telecommun. Technol. https://doi.org/10.1002/ett.3690
Mohamed Elhoseny and K. Shankar, Reliable data transmission model for Mobile ad hoc network using Signcryption technique, IEEE Transactions on Reliability, page(s): 1-10, 2019. In Press. https://doi.org/10.1109/TR.2019.2915800
Uma Maheswari P, Manickam P, Kumar KS, Maseleno A, Shankar K (2019. In Press) Bat optimization algorithm with fuzzy based PIT sharing (BF-PIT) algorithm for Named Data Networking (NDN). J. Intell. Fuzzy Syst. https://doi.org/10.3233/JIFS-179086
Senthil Ragavan VK, Mohamed Elhoseny KS (2019) An enhanced whale optimization algorithm for vehicular communication networks. Int J Commun Syst. https://doi.org/10.1002/dac.3953
Gupta D, Khanna A, SK L, Shankar K, Furtado V, Rodrigues JJPC (2018) Efficient artificial fish swarm based clustering approach on mobility aware energy-efficient for MANET. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3524
Akkaya K, Younis M (2005) A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks Journal 3(3):325–349
A. Hac, Wireless sensor network designs, Wiley, 2003, ISBN 0-470- 86736-1
Perrig A, Szewczyk R, Wen V, Culler D, Tygar J, (2001) SPINS: security protocols for sensor networks, in: Proceedings of Mobile networking and computing 2001, Rome, Italy
Biswas K, Muthukkumarasamy V, Sithirasenan E, Singh K (2014) A simple lightweight encryption scheme for wireless sensor networks. In: International conference on distributed computing and networking. Springer, Berlin, Heidelberg, pp 499–504
Rizk R, Alkady Y (2015) Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology 2(3):296–313
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection: Special Issue on Future Networking Applications Plethora for Smart Cities
Guest Editors: Mohamed Elhoseny, Xiaohui Yuan, and Saru Kumari
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Brindha, P., Senthilkumar, A. Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks. Peer-to-Peer Netw. Appl. 13, 1142–1151 (2020). https://doi.org/10.1007/s12083-019-00813-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00813-4