Abstract
The economic part of farming to India’s Gross Domestic Product is steady refusing with the nation broad-based economical development. Therefore, developing agriculture field is the important factor. To solve this problem we propose precision farming solution using wireless sensor network (WSN) to gain farming production in India. We use WSN as a placement of Camera Sensors in crop field that can be used to monitor the environmental condition, detect the pest, and send the pest details to the corresponding former. The use of pesticides in crop growing is necessary to assert the quality of large-scale product. However, the attacker inserts the fake sensor for destruct the crop field from pests. In WSN, the sensors are equipped with irreplaceable batteries and qualified by limited computing ability. Thus, reducing the sensor energy depletion is an important factor. To overcome these problems we propose fake sensor detection and secure data transmission based on predictive parser in WSNs (FSD-PP). The main goal is the operation of a WSN for early snail pest detection to diminish the use of pesticides in crops and gain more productivity in the cultivation. Here, the predictive parser method is used to check the sensor authentication. Elliptical curve cryptography algorithm is used to remove the eaves dropping attack in the network. The sleep/awake scheduling algorithm is used to save the sensor energy. The simulation result demonstrates that the proposed scheme will enhance the network life span and secure data transmission from sensor to base station in WSN.
Similar content being viewed by others
References
Bhanu, B. B., Rao, K. R., Ramesh, J. V. N., & Hussain, M. A. (2014). Agriculture field monitoring and analysis using wireless sensor networks for improving crop production. In IEEE eleventh international conference on wireless and optical communications networks (pp. 1–7).
Adebayo, S., Akinwunmi, A. O., Aworinde, H. O., & Ogunti, E. O. (2015). Increasing agricultural productivity in nigeria using wireless sensor network (WSN). African Journal of Computing & ICT, 8(3), 121–128.
Hasan, K. A., Mondal, A., & Saha, A. (2010). A context free grammar and its predictive parser for bangla grammar recognition. In 13th international conference on computer and information technology (pp. 87–91). IEEE.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). Active trust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security,11(9), 2013–2027.
Mali, G., & Misra, S. (2016). TRAST: trust-Based distributed topology management for wireless multimedia sensor networks. IEEE Transactions on Computers,65(6), 1978–1991.
Tan, S., Li, X., & Dong, Q. (2016). A trust management system for securing data plane of ad hoc networks. IEEE Transactions on Vehicular Technology,65(9), 7579–7592.
Long, J. U. N., Dong, M., Ota, K., Liu, A., & Hai, S. (2015). Reliability guaranteed efficient data gathering in wireless sensor networks. IEEE Access,3, 430–444.
Zhou, Z., Du, C., Shu, L., Hancke, G., Niu, J., & Ning, H. (2016). An energy-balanced heuristic for mobile sink scheduling in hybrid WSNs. IEEE Transactions on Industrial Informatics,12(1), 28–40.
Sarma, H. K. D., Mall, R., & Kar, A. (2016). E2R2: Energy-efficient and reliable routing for mobile wireless sensor networks. IEEE Systems Journal,10(2), 604–616.
Chidean, M. I., Morgado, E., Sanromán-Junquera, M., Ramiro-Bargueno, J., Ramos, J., & Caamaño, A. J. (2016). Energy efficiency and quality of data reconstruction through data-coupled clustering for self-organized large-scale WSNs. IEEE Sensors Journal,16(12), 5010–5020.
Shaji, M., & Ajith, S. (2015). Distributed energy efficient heterogeneous clustering in wireless sensor network. In Fifth international conference on advances in computing and communications (pp. 130–134).
Sun, W., Song, X., & Wang, F. (2015). Energy-balanced clustering routing protocol based on task separation in wireless sensor networks. In 8th international conference on IEEE biomedical engineering and informatics (pp. 778–782).
Ren, J., Zhang, Y., Zhang, K., Liu, A., Chen, J., & Shen, X. S. (2016). Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Transactions on Industrial Informatics,12(2), 788–800.
Kenchannavar, H. H., Beedakar, S., & Kulkarni, U. P. (2015). Optimization techniques to improve lifetime of wireless sensor networks. In IEEE international conference on energy systems and applications (pp. 446–450).
Biason, A., & Zorzi, M. (2015). Transmission policies for an energy-harvesting device with a data queue. In IEEE international conference on computing networking and communications (pp. 189–195).
Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications,15(5), 3718–3731.
Yu, C. M., Lu, C. S., & Kuo, S. Y. (2016). Compressed sensing-based clone identification in sensor networks. IEEE Transactions on Wireless Communications,15(4), 3071–3084.
Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., & Willemson, J. (2016). Privacy protection for wireless medical sensor data. IEEE Transactions on Dependable and Secure Computing,13(3), 369–380.
Yu, H., & Bian, H. (2015). Probability forwarding method in mobile wireless sensor networks. International Journal of Future Generation Communication and Networking,8(6), 141–148.
Sun, B., Shan, X., Wu, K., & Xiao, Y. (2013). Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Systems Journal,7(1), 13–25.
Conti, M., Di Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing,8(5), 685–698.
Xie, W., Wang, L., & Wang, M. (2014). A bloom filter and matrix-based protocol for detecting node replication attack. JNW,9(6), 1471–1476.
Wang, G., Wang, T., Jia, W., Guo, M., & Li, J. (2009). Adaptive location updates for mobile sinks in wireless sensor networks. The Journal of Supercomputing,47(2), 127–145.
Guerroumi, M., Badache, N., & Moussaoui, S. (2012). Sink mobile for efficient data dissemination in wireless sensor networks. In Networked digital technologies (pp. 635–645).
Lingeshwari, S., & Natchadalingam, R. (2014). Provisioning of efficient authentication technique for implementing in large scale networks. International Journal of MC Square Scientific Research, 6(1), 34–42.
Huang, S. C., & Chang, H. Y. (2017). A farmland multimedia data collection method using mobile sink for wireless sensor networks. Multimedia Tools and Applications,76(19), 19463–19478.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Joseph Jeyakumar, D., Lingeshwari, S. Fake Sensor Detection and Secure Data Transmission Based on Predictive Parser in WSNs. Wireless Pers Commun 110, 531–544 (2020). https://doi.org/10.1007/s11277-019-06740-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06740-0