Skip to main content

Advertisement

Log in

Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A challenge in wireless sensor network (WSN) is to design an energy efficient and secure network protocol because sensors are the wireless device with limited resources. To overcome the problem of insecure transmission in WSNs, efficient and light weight key agreement protocol (LARK) with rekeying is designed in which sensed data is carried out through the gateway node. In this paper, a novel construction is largely deliberated to abolish the security issues. The novel method called fuzzy C means cluster based light weight social spider optimization (FLSO) protocol for improving secure transmission with less energy consumption. In FLSO protocol, fuzzy C means clustering is used for grouping the nodes based on individual cluster’s membership and cluster head selection is associated with the lowest ID of the corresponding nodes. Next to clustering, secure transmission is done with the help of light weight key agreement protocol (LARK) with rekeying technique. In addition to the symmetric key, another one session key is generated to improve security using the Diffie Hellman cryptographic algorithm. Then the secure routing is done with the help of social spider algorithm. Finally, the simulation is performed on the platform of MATLAB simulator. In which results are taken in terms of memory, communication overhead, end to end delay, transmission delay, packet delivery ratio, authentication analysis, computational time and energy consumption. Results indicate that FLSO protocol provides efficient transmission by reducing energy consumption and providing security over the path of the transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Al-Hamadi, H., & Chen, I. R. (2015). Integrated intrusion detection and tolerance in homogeneous clustered sensor networks. ACM Transactions on Sensor Networks, 11(3), 1–24.

    Article  Google Scholar 

  2. Pongaliur, K., & Xiao, L. (2013). Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks. ACM Transactions on Sensor Networks, 9(4), 1–26.

    Article  Google Scholar 

  3. Tang, D., Li, T., Ren, J., & Wu, J. (2015). Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 960–973.

    Article  Google Scholar 

  4. Gabrielli, A., Mancini, L. V., Setia, S., & Jajodia, S. (2011). Securing topology maintenance protocols for sensor networks. IEEE Transactions on Dependable and Secure Computing, 1–8(3), 450–465.

    Article  Google Scholar 

  5. Wang, Q. (2011). Dependable and secure sensor data storage with dynamic integrity assurance. ACM Transactions on Sensor Networks, 8, 1.

    Google Scholar 

  6. Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.

    Article  Google Scholar 

  7. Cho, Kwantae, Lee, Byung-Gil, & Dong, Hoon Lee. (2014). Low-priced and energy-efficient detection of replicas for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 1(15), 454–466.

    Article  Google Scholar 

  8. Dong, M., Ota, K., Yang, L. T., Liu, A., & Guo, M. (2016). LSCD: A low-storage clone detection protocol for cyber-physical systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35(5), 712–723.

    Article  Google Scholar 

  9. Tan, S., Li, X., & Dong, Q. (2015). A trust management system for securing data plane of ad hoc networks. IEEE Transactions on Vehicular Technology, 65(9), 7579–7592.

    Article  Google Scholar 

  10. Chan, A. C. F., & Castelluccia, C. (2011). A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Transactions on Sensor Networks, 7(4), 1–43.

    Article  Google Scholar 

  11. Klonowski, M., Kutyłowski, M., Ren, M., & Rybarczyk, K. (2015). Mixing in random digraphs with application to the forward-secure key evolution in wireless sensor networks. ACM Transactions on Sensor Networks, 11(2), 1–27.

    Article  Google Scholar 

  12. Choi, W., Ghidini, G., & Das, S. K. (2012). A novel framework for energy-efficient data gathering with random coverage in wireless sensor networks. ACM Transactions on Sensor Networks, 8(4), 1–30.

    Article  Google Scholar 

  13. Ayday, E., Delgosha, F., & Fekri, F. (2012). Data authenticity and availability in multihop wireless sensor networks. ACM Transactions on Sensor Networks, 8(2), 1–26.

    Article  Google Scholar 

  14. Liu, A., Zheng, Z., Zhang, C., Chen, Z., & Shen, X. (2012). Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Transactions on Vehicular Technology, 61(7–32), 55–65.

    Google Scholar 

  15. Roy, S., Conti, M., Setia, S., & Jajodia, S. (2012). Secure data aggregation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(3), 1040–1052.

    Article  Google Scholar 

  16. Proano, A., & Lazos, L. (2012). Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing, 9(1), 101–114.

    Article  Google Scholar 

  17. Abrardo, A., Balucanti, L., & Mecocci, A. (2013). A game theory distributed approach for energy optimization in WSNs. ACM Transactions on Sensor Networks, 9(4), 1–22.

    Article  Google Scholar 

  18. Selcuk Uluagac, A., Beyah, R. A., & Copeland, J. A. (2013). Secure source-based loose synchronization (SOBAS) for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 24(4), 803–813.

    Article  Google Scholar 

  19. Gu, Y., He, L., Zhu, T., & He, T. (2014). Achieving energy-synchronized communication in energy-harvesting wireless sensor networks. ACM Transactions on Embedded Computing Systems, 13(2), 1–26.

    Article  Google Scholar 

  20. Li, W., Delicato, F. C., & Zomaya, A. Y. (2013). Adaptive energy-efficient scheduling for hierarchical wireless sensor networks. ACM Transactions on Sensor Networks, 9(3), 1–34.

    Article  Google Scholar 

  21. Nabi, M., Geilen, M., Basten, T., & Blagojevic, M. (2014). Efficient cluster mobility support for TDMA-based MAC protocols in wireless sensor networks. ACM Transactions on Sensor Networks, 10(4), 1–32.

    Article  Google Scholar 

  22. Deng, Y., Wang, L., Elkashlan, M., Nallanathan, A., & Mallik, R. (2016). Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach. IEEE Transactions on Information Forensics and Security, 11(6), 1128–1138.

    Article  Google Scholar 

  23. Pourazarm, S., & Cassandras, C. (2015). Energy-based lifetime maximization and security of wireless sensor networks with general non-ideal battery models. IEEE Transactions on Control of Network Systems, 99(1), 323–335.

    MATH  Google Scholar 

  24. Tseng, C. H., Wang, S.-H., & Tsaur, W.-J. (2015). Hierarchical and dynamic elliptic curve cryptosystem based self-certified public key scheme for medical data protection. IEEE Transactions on Reliability, 64(3), 1078–1085.

    Article  Google Scholar 

  25. Mali, G., & Misra, S. (2016). TRAST: Trust-based distributed topology management for wireless multimedia sensor networks. IEEE Transactions on Computers, 65(6), 1978–1991.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Uma Meena.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meena, U., Sharma, A. Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor Network. Wireless Pers Commun 101, 1177–1199 (2018). https://doi.org/10.1007/s11277-018-5755-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5755-9

Keywords

Navigation