Skip to main content
Log in

SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In wireless sensor networks (WSN), sensor nodes communicate with one another and transfer the sensed data to the sink over a wireless medium, making the network vulnerable to a variety of security flaws, including eavesdropping. To provide a secure communication, encryption techniques based on some keys need to be used, and the participating sensor nodes should agree with it. The sensor nodes are resource constrained in terms of energy, memory, and processing power. As a result, the key agreement technique in WSN is nontrivial. Therefore, many key agreement techniques have been developed, however most of them focus primarily on security, which is not considered a relevant concern in the context of energy efficiency. There is a compromise between energy usage and security, so we've proposed an algorithm to address it. Also, the nodes in WSN can be benefited by using symmetric based pairwise key establishment for efficient communication in the network. The proposed algorithm strikes a crucial balance between secure routing and energy consumption within wireless sensor networks, outperforming well-established routing algorithms by delivering optimal results. In this paper, we have proposed a Secure and Energy Efficient Protocol Based on Pairwise Key (SEE2PK) for WSN. In the proposed scheme, nodes need to store only one row of the secure matrix and establish secure communication after exchanging one column of a public matrix, which is based on the neighbor adjacency matrix of a cluster. This scheme benefits from using a mesh router as a Cluster Head (CH) due to more memory and computation power. The storage and computation costs are decreased by employing the adjacency matrix as a public matrix. The performance of secure routing is examined with the standard techniques, and the results indicate that: 1) nodes can establish pairwise communication with other nodes; 2) performance of the proposed scheme is better for network metrics: network lifetime, security, computation cost, scalability, and energy consumption; 3) communication cost and storage cost of the network are decreased.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data availability

Not Applicable.

References

  1. Hajipour Z, Barati H (2021) EELRP: energy efficient layered routing protocol in wireless sensor networks. Comput 2021:1–21. https://doi.org/10.1007/S00607-021-00996-W

    Article  MathSciNet  Google Scholar 

  2. Kiamansouri E, Barati H, Barati A (2022) A two-level clustering based on fuzzy logic and content-based routing method in the internet of things. Peer Peer Netw Appl 15:2142–2159. https://doi.org/10.1007/S12083-022-01342-3

    Article  Google Scholar 

  3. Sedighian Kashi S (2018) Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands. Computing 101(4):363–385. https://doi.org/10.1007/S00607-018-0623-8

    Article  MathSciNet  Google Scholar 

  4. Mohamed SM, Hamza HS, Saroit IA (2017) Coverage in mobile wireless sensor networks (M-WSN): A survey. Comput Commun 110:133–150. https://doi.org/10.1016/J.COMCOM.2017.06.010

    Article  Google Scholar 

  5. Ataei Nezhad M, Barati H, Barati A (2022) An authentication-based secure data aggregation method in internet of things. J. Grid Comput. 20:1–28. https://doi.org/10.1007/S10723-022-09619-W/METRICS

    Article  Google Scholar 

  6. Huang X (2022) A data-driven WSN security threat analysis model based on cognitive computing. J Sensors 2022. https://doi.org/10.1155/2022/5013905

  7. Mishra S, Yaduvanshi R, Dubey K, Rajpoot P (2021) ESS-IBAA: Efficient, short, and secure ID-based authentication algorithm for wireless sensor network. Int J Commun Syst 34:e4764. https://doi.org/10.1002/DAC.4764

    Article  Google Scholar 

  8. Sahay R, Geethakumari G, Mitra B (2020) A novel blockchain based framework to secure IoT-LLNs against routing attacks. Computing 102:2445–2470. https://doi.org/10.1007/S00607-020-00823-8

    Article  Google Scholar 

  9. Murugeshwari B, Sabatini SA, Jose L, Padmapriya S (2022) Effective data aggregation in WSN for enhanced security and data privacy. SSRG Int J Electr Electron Eng 9:1–10. https://doi.org/10.14445/23488379/IJEEE-V9I11P101

  10. Du W, Deng J, Han YS (2006) A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans Dependable Secur Comput 3:62–77. https://doi.org/10.1109/TDSC.2006.2

    Article  Google Scholar 

  11. Zhang Y, Xu L, Xiang Y, Huang X (2013) A matrix-based pairwise key establishment scheme for wireless mesh networks using per deployment knowledge. IEEE Trans Emerg Top Comput. https://doi.org/10.1109/TETC.2013.2287196

    Article  Google Scholar 

  12. Sharma V, Rajpoot P, Gupta A, Dubey K, Pandey N, Verma N (2019) Heterogeneous clustering for energy optimization in wireless sensor networks. 2019 Proc 9th Int Conf Cloud Comput Data Sci. Eng Conflu 92–99. https://doi.org/10.1109/CONFLUENCE.2019.8776933

  13. Jaworski J, Ren M, Rybarczyk K (2009) Random key predistribution for wireless sensor networks using deployment knowledge. Computing 85:57–76. https://doi.org/10.1007/S00607-009-0036-9

    Article  MathSciNet  Google Scholar 

  14. Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0494-4

    Article  Google Scholar 

  15. Dener M, Orman A (2023) BBAP-WSN: A new blockchain-based authentication protocol for wireless sensor networks. Appl Sci 13:1526. https://doi.org/10.3390/APP13031526

    Article  Google Scholar 

  16. Rajpoot P, Dwivedi P (2018) Optimized and load balanced clustering for wireless sensor networks to increase the lifetime of WSN using MADM approaches, Wirel. Networks 26:215–251. https://doi.org/10.1007/S11276-018-1812-2

    Article  Google Scholar 

  17. Saravanakumar P, Sundararajan TVP, Dhanaraj RK, Nisar K, Memon FH, Ibrahim AABA (2022) Lamport certificateless signcryption deep neural networks for data aggregation security in WSN. Intell Autom Soft Comput 33:1835–1847. https://doi.org/10.32604/IASC.2022.018953.

  18. Li X, Liu S, Kumari S, Chen CM (2022) PSAP-WSN: A provably secure authentication protocol for 5g-based wireless sensor networks. Comput Model Eng Sci 135:711–732. https://doi.org/10.32604/CMES.2022.022667

  19. Mosavifard A, Barati H (2020) An energy-aware clustering and two-level routing method in wireless sensor networks. Computing 102(7):1653–1671. https://doi.org/10.1007/S00607-020-00817-6

    Article  MathSciNet  Google Scholar 

  20. Tahir S, Ruj S, Rahulamathavan Y, Rajarajan M, Glackin C (2017) A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Trans Emerg Top Comput 6750:30–33. https://doi.org/10.1109/TETC.2017.2737789

    Article  Google Scholar 

  21. Shukla AS, Tripathi S (2019) A matrix-based pair-wise key establishment for secure and energy efficient WSN-assisted IoT. Int J Inf Secur Priv 13:91–105. https://doi.org/10.4018/ijisp.201907010106

    Article  Google Scholar 

  22. Shukla A, Tripathi S (2020) An effective relay node selection technique for energy efficient WSN-assisted IoT. Wirel Pers Commun 112:2611–2641. https://doi.org/10.1007/s11277-020-07167-8

    Article  Google Scholar 

  23. Shukla A, Tripathi S (2018) An optimal relay node selection technique to support green internet of things. J Intell Fuzzy Syst 35:1301–1314. https://doi.org/10.3233/JIFS-169674

    Article  Google Scholar 

  24. Shukla A, Tripathi S (2020) A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network, Wirel. Networks 26:3471–3493. https://doi.org/10.1007/s11276-020-02277-4

    Article  Google Scholar 

  25. Shukla A, Singh D, Sajwan M, Verma A, Kumar A (2022) A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission, Wirel. Networks 28:827–852. https://doi.org/10.1007/S11276-021-02876-9/METRICS

    Article  Google Scholar 

  26. Shukla A, Singh D, Sajwan M, Kumar M, Kumari D, Kumar A, Panthi M (2022) SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks. Multimed Tools Appl 81:11145–11185. https://doi.org/10.1007/S11042-022-12157-Y/METRICS

    Article  Google Scholar 

  27. Younis O, Fahmy S (2004) HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans Mob Comput 3:366–379. https://doi.org/10.1109/TMC.2004.41

    Article  Google Scholar 

  28. Alimoradi P, Barati A, Barati H (2022) A hierarchical key management and authentication method for wireless sensor networks. Int J Commun Syst 35:e5076. https://doi.org/10.1002/DAC.5076

    Article  Google Scholar 

  29. Yadav AK, Rajpoot P, Kumar P, Dubey K, Singh SH, Verma KR (2019) Multi parameters based heterogeneous clustering algorithm for energy optimization in WSN. 2019 Proc 9th Int Conf Cloud Comput Data Sci Eng Conflu 587–592. https://doi.org/10.1109/CONFLUENCE.2019.8776966

  30. Blom R (1985) An optimal class of symmetric key generation systems. In: Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics), Springer Verlag pp 335–338. https://doi.org/10.1007/3-540-39757-4_22

  31. Du W, Deng J, Han YS, Varshney PK (2005) A pairwise key pre-distribution scheme for wireless sensor networks*

  32. Parakh A, Kak S (2011) Matrix based key agreement algorithms for sensor networks. Int Symp Adv Networks Telecommun Syst ANTS. https://doi.org/10.1109/ANTS.2011.6163684

    Article  Google Scholar 

  33. Yousefpoor E, Barati H, Barati A (2021) A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks. Peer-to-Peer Netw Appl 14:1917–1942. https://doi.org/10.1007/S12083-021-01116-3

    Article  Google Scholar 

  34. Zhang X, Wang J (2016) An efficient key management scheme in hierarchical wireless sensor networks. 2015 Int Conf Comput Commun Secur ICCCS. https://doi.org/10.1109/CCCS.2015.7374122

  35. Sukumar S (2013) Computational analysis of modified Blom’s scheme. arXiv:1303.7457

  36. Shahbaz AN, Barati H, Barati A (2021) Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks. Peer Peer Netw Appl 14:541–558. https://doi.org/10.1007/S12083-020-01004-2/METRICS

    Article  Google Scholar 

  37. Hasheminejad E, Barati H (2021) A reliable tree-based data aggregation method in wireless sensor networks. Peer Peer Netw Appl 14:873–887. https://doi.org/10.1007/S12083-020-01025-X

    Article  Google Scholar 

  38. Preeth SKSL, Dhanalakshmi R, Kumar R, Shakeel PM (2018) An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-1154-z

    Article  Google Scholar 

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Anurag found the research problem, and did the simulation in matlab. Sarsij provided the guidance about the research area and help to set up the simulation parameters. Mohit prepared the figures and graphs. Deepak review the english grammar and correct it. All authors reviewed the manuscript.

Corresponding author

Correspondence to Anurag Shukla.

Ethics declarations

Ethics approval

This study was conducted in accordance with the ethical guidelines and regulations set forth by our institution and springer. All necessary approvals were obtained from the appropriate ethics committee before initiating the research. Informed consent was obtained from all participants included in the study.

Consent to publish

All participants provided consent for the publication of their data, ensuring the protection of their identity and confidentiality.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy

Guest Editor: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shukla, A., Tripathi, S., Sajwan, M. et al. SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network. Peer-to-Peer Netw. Appl. 17, 701–721 (2024). https://doi.org/10.1007/s12083-023-01587-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01587-6

Keywords

Navigation