Skip to main content

Advertisement

Log in

SERA: a secure energy reliability aware data gathering for sensor networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Wireless sensor networks are used in many applications in military, ecology, health, and other areas. These applications often include the monitoring of sensitive information making the security issue one of the most important aspects to consider in this field. However, most of protocols optimize for the limited capabilities of sensor nodes and the application specific nature of the networks, but they are vulnerable to serious attacks. In this paper, a Secure Energy and Reliability Aware data gathering protocol (SERA) is proposed, which provides energy efficiency and data delivery reliability as well as security. The proposed protocol’s security was confirmed by a formal verification carried out using the AVISPA tool and analysis of the most common network layer attacks such as selective forwarding, sinkhole, Sybil, wormhole, HELLO flood, and acknowledgment spoofing attacks. Additionally, a visual simulation environment was developed to evaluate the performance of the proposed protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Al Shidhani A, Leung V (2009) Pre-authentication schemes for UMTS-WLAN interworking. EURASIP J Wireless Commun Netw. doi:10.1155/2009/806563

    Google Scholar 

  2. Braginsky D, Estrin D (2002) Rumor Routing Algorithm For Sensor Networks. Proc 1st ACM international workshop on wireless sensor networks and applications. doi: 10.1145/570738.570742

  3. Cam H, Ozdemir S, Muthuavinashiappan D, Nair P (2003) Energy efficient security protocol for wireless sensor networks. IEEE Veh Technol Conf. doi:10.1109/VETECF.2003.1286170

    MATH  Google Scholar 

  4. Capkun S, Hubaux J (2005) Secure positioning of wireless devices with application to sensor networks. Proc IEEE INFOCOM. doi:10.1109/INFCOM.2005.1498470

    Google Scholar 

  5. Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Selected Areas Commun. doi:10.1109/JSAC.2005.861380

    Google Scholar 

  6. Carlson J, Han R, Lao S, Narayan C, Ghani S (2003) Rapid prototyping of mobile input devices using wireless sensor nodes. Proc WMCSA’03, pp 21–29

  7. Conti M, Di Pietro R, Mancini L, Mei A (2008) Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. Proc of the first ACM conference on Wireless network security. doi: 10.1145/1352533.1352568

  8. Douceur J (2002) The Sybil attack. In First International Workshop on Peer-to-Peer Systems, vol 2429 of LNCS

  9. Giruka V, Singhal M, Royalty J, Varanasi S (2008) Security in wireless sensor network. Wireless Comm Mobile Comp 8(1):1–24

    Article  Google Scholar 

  10. Heinzelman W, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. Proc of the 33rd Hawaii International Conference on System Sciences

  11. Heinzelman W, Chandrakasan A, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wireless Commun 1(4):660–670. doi:10.1109/TWC.2002.804190

    Article  Google Scholar 

  12. Hill J et al (2000) System architecture directions for networked sensors. Architectural Support for Programming Languages and Operating Systems, pp 93–104, 2000

  13. Hodjat A, Verbauwhede I (2002) The energy cost of secrets in ad-hoc networks. Proc IEEE Circuits and Systems Workshop on Wireless Communications and Networking, pp 4

  14. Hu Y, Perrig A, Johnson DB (2002) Wormhole detection in wireless ad hoc networks. Technical Report TR01-384. Department of Computer Science, Rice University

  15. Hu YC, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. Proc IEEE Infocom 3:1976–1986

    Google Scholar 

  16. Hung L et al (2009) SCODE: a secure coordination-based data dissemination to mobile sinks in sensor networks. IEICE Trans Commun E92-B(1):131–142

    Article  Google Scholar 

  17. Intanagonwiwat C, Govindan R, Estrin D, Heidemann J, Silva F (2003) Directed diffusion for wireless sensor networking. IEEE/ACM Trans Netw. doi:10.1109/TNET.2002.808417

    Google Scholar 

  18. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Proc IEEE Int Workshop Sensor Netw Protoc Appl. doi:10.1109/SNPA.2003.1203362

    Google Scholar 

  19. Kim M et al (2008) An energy-aware multipath routing algorithm in wireless sensor networks. IEICE Trans Inf Syst E91-D:2419–2427

    Article  Google Scholar 

  20. Lindsey S, Raghavendra CS (2002) PEGASIS: Power-efficient gathering in sensor information systems. IEEE Aerospace Conference Proc, pp 3-1125–3-1130. doi: 10.1109/AERO.2002.1035242

  21. Mainwaring A, Polastre J, Szewczyk R, Culler D, Anderson J (2002) Wireless sensor networks for habitat monitoring. Proc of the 1st ACM international workshop on wireless sensor networks and applications. doi: 10.1145/570738.570751

  22. Manjeshwar A, Agrawal DP (2001) TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. IEEE International Parallel Distributed Processing Symposium, pp 2009–2015

  23. Manjeshwar A, Agrawal DP (2002) APTEEN: A hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks. IEEE International Parallel Distributed Processing Symposium, pp 195–202

  24. Otto C, Milenkovic A, Sanders C, Jovanov E (2006) System architecture of a wireless body area sensor network for ubiquitous health monitoring. J Mobile Multimed 1(4):307–326

    Google Scholar 

  25. Park T, Shin K (2004) LiSP: a lightweight security protocol for wireless sensor networks. ACM Trans Embedded Comput Syst. doi:10.1145/1015047.1015056

    Google Scholar 

  26. Perrig A et al (2002) SPINS: security protocols for sensor networks. Wireless Netw. doi:10.1023/A:1016598314198

    MATH  Google Scholar 

  27. Pura M, Patriciu V, Bica I (2009) Modeling and formal verification of implicit on-demand secure ad hoc routing protocols in HLPSL and AVISPA. Int J Comput Commun 2(3):25–32

    Google Scholar 

  28. The AVISPA project (2010) Automated Validation of Internet Security Protocols http://www.avispa-project.org. Accessed 17 December 2010

  29. U.A.F. (2009) ARGUS advanced remote ground unattended sensor systems. Department of Defense. http://www.globalsecurity.org/ intell/systems/arguss.htm. Accessed 15 June 2010

  30. Xu Y, Heidemann J, Estrin D (2001) Geography-informed energy conservation for ad hoc routing. Proc Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2001). doi: 10.1145/381677.381685

  31. Ye M, Li C, Chen G, Wu J (2005) EECS: an energy efficient clustering scheme in wireless sensor networks. Proc IPCCC 2005. doi: 10.1109/PCCC.2005.1460630

  32. Younis O, Fahmy S (2004) HEED: a hybrid, energy-efficient. Distributed clustering approach for Ad Hoc sensor networks. IEEE Trans Mob Comput. doi:10.1109/TMC.2004.41

    Google Scholar 

  33. Zhou Y, Fang Y, Zhang Y (2008) Securing wireless sensor network: a survey. IEEE Commun Surv Tutorial. doi:10.1109/COMST.2008.4625802

    Google Scholar 

Download references

Acknowledgment

Sang Guun Yoo likes to take this opportunity to thank Overseas Korean Foundation (OKF) for its scholarship support. He had the privilege to be the recipient of this award from 2007 to 2010.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juho Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yoo, S.G., Kang, Sh. & Kim, J. SERA: a secure energy reliability aware data gathering for sensor networks. Multimed Tools Appl 73, 617–646 (2014). https://doi.org/10.1007/s11042-011-0735-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0735-z

Keyword

Navigation