Skip to main content
Log in

Fake Sensor Detection and Secure Data Transmission Based on Predictive Parser in WSNs

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The economic part of farming to India’s Gross Domestic Product is steady refusing with the nation broad-based economical development. Therefore, developing agriculture field is the important factor. To solve this problem we propose precision farming solution using wireless sensor network (WSN) to gain farming production in India. We use WSN as a placement of Camera Sensors in crop field that can be used to monitor the environmental condition, detect the pest, and send the pest details to the corresponding former. The use of pesticides in crop growing is necessary to assert the quality of large-scale product. However, the attacker inserts the fake sensor for destruct the crop field from pests. In WSN, the sensors are equipped with irreplaceable batteries and qualified by limited computing ability. Thus, reducing the sensor energy depletion is an important factor. To overcome these problems we propose fake sensor detection and secure data transmission based on predictive parser in WSNs (FSD-PP). The main goal is the operation of a WSN for early snail pest detection to diminish the use of pesticides in crops and gain more productivity in the cultivation. Here, the predictive parser method is used to check the sensor authentication. Elliptical curve cryptography algorithm is used to remove the eaves dropping attack in the network. The sleep/awake scheduling algorithm is used to save the sensor energy. The simulation result demonstrates that the proposed scheme will enhance the network life span and secure data transmission from sensor to base station in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Bhanu, B. B., Rao, K. R., Ramesh, J. V. N., & Hussain, M. A. (2014). Agriculture field monitoring and analysis using wireless sensor networks for improving crop production. In IEEE eleventh international conference on wireless and optical communications networks (pp. 1–7).

  2. Adebayo, S., Akinwunmi, A. O., Aworinde, H. O., & Ogunti, E. O. (2015). Increasing agricultural productivity in nigeria using wireless sensor network (WSN). African Journal of Computing & ICT, 8(3), 121–128.

    Google Scholar 

  3. Hasan, K. A., Mondal, A., & Saha, A. (2010). A context free grammar and its predictive parser for bangla grammar recognition. In 13th international conference on computer and information technology (pp. 87–91). IEEE.

  4. Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). Active trust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security,11(9), 2013–2027.

    Article  Google Scholar 

  5. Mali, G., & Misra, S. (2016). TRAST: trust-Based distributed topology management for wireless multimedia sensor networks. IEEE Transactions on Computers,65(6), 1978–1991.

    Article  MathSciNet  Google Scholar 

  6. Tan, S., Li, X., & Dong, Q. (2016). A trust management system for securing data plane of ad hoc networks. IEEE Transactions on Vehicular Technology,65(9), 7579–7592.

    Article  Google Scholar 

  7. Long, J. U. N., Dong, M., Ota, K., Liu, A., & Hai, S. (2015). Reliability guaranteed efficient data gathering in wireless sensor networks. IEEE Access,3, 430–444.

    Article  Google Scholar 

  8. Zhou, Z., Du, C., Shu, L., Hancke, G., Niu, J., & Ning, H. (2016). An energy-balanced heuristic for mobile sink scheduling in hybrid WSNs. IEEE Transactions on Industrial Informatics,12(1), 28–40.

    Article  Google Scholar 

  9. Sarma, H. K. D., Mall, R., & Kar, A. (2016). E2R2: Energy-efficient and reliable routing for mobile wireless sensor networks. IEEE Systems Journal,10(2), 604–616.

    Article  Google Scholar 

  10. Chidean, M. I., Morgado, E., Sanromán-Junquera, M., Ramiro-Bargueno, J., Ramos, J., & Caamaño, A. J. (2016). Energy efficiency and quality of data reconstruction through data-coupled clustering for self-organized large-scale WSNs. IEEE Sensors Journal,16(12), 5010–5020.

    Article  Google Scholar 

  11. Shaji, M., & Ajith, S. (2015). Distributed energy efficient heterogeneous clustering in wireless sensor network. In Fifth international conference on advances in computing and communications (pp. 130–134).

  12. Sun, W., Song, X., & Wang, F. (2015). Energy-balanced clustering routing protocol based on task separation in wireless sensor networks. In 8th international conference on IEEE biomedical engineering and informatics (pp. 778–782).

  13. Ren, J., Zhang, Y., Zhang, K., Liu, A., Chen, J., & Shen, X. S. (2016). Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Transactions on Industrial Informatics,12(2), 788–800.

    Article  Google Scholar 

  14. Kenchannavar, H. H., Beedakar, S., & Kulkarni, U. P. (2015). Optimization techniques to improve lifetime of wireless sensor networks. In IEEE international conference on energy systems and applications (pp. 446–450).

  15. Biason, A., & Zorzi, M. (2015). Transmission policies for an energy-harvesting device with a data queue. In IEEE international conference on computing networking and communications (pp. 189–195).

  16. Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications,15(5), 3718–3731.

    Article  Google Scholar 

  17. Yu, C. M., Lu, C. S., & Kuo, S. Y. (2016). Compressed sensing-based clone identification in sensor networks. IEEE Transactions on Wireless Communications,15(4), 3071–3084.

    Article  Google Scholar 

  18. Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., & Willemson, J. (2016). Privacy protection for wireless medical sensor data. IEEE Transactions on Dependable and Secure Computing,13(3), 369–380.

    Article  Google Scholar 

  19. Yu, H., & Bian, H. (2015). Probability forwarding method in mobile wireless sensor networks. International Journal of Future Generation Communication and Networking,8(6), 141–148.

    Article  Google Scholar 

  20. Sun, B., Shan, X., Wu, K., & Xiao, Y. (2013). Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Systems Journal,7(1), 13–25.

    Article  Google Scholar 

  21. Conti, M., Di Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing,8(5), 685–698.

    Article  Google Scholar 

  22. Xie, W., Wang, L., & Wang, M. (2014). A bloom filter and matrix-based protocol for detecting node replication attack. JNW,9(6), 1471–1476.

    Article  Google Scholar 

  23. Wang, G., Wang, T., Jia, W., Guo, M., & Li, J. (2009). Adaptive location updates for mobile sinks in wireless sensor networks. The Journal of Supercomputing,47(2), 127–145.

    Article  Google Scholar 

  24. Guerroumi, M., Badache, N., & Moussaoui, S. (2012). Sink mobile for efficient data dissemination in wireless sensor networks. In Networked digital technologies (pp. 635–645).

  25. Lingeshwari, S., & Natchadalingam, R. (2014). Provisioning of efficient authentication technique for implementing in large scale networks. International Journal of MC Square Scientific Research, 6(1), 34–42.

    Article  Google Scholar 

  26. Huang, S. C., & Chang, H. Y. (2017). A farmland multimedia data collection method using mobile sink for wireless sensor networks. Multimedia Tools and Applications,76(19), 19463–19478.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Joseph Jeyakumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Joseph Jeyakumar, D., Lingeshwari, S. Fake Sensor Detection and Secure Data Transmission Based on Predictive Parser in WSNs. Wireless Pers Commun 110, 531–544 (2020). https://doi.org/10.1007/s11277-019-06740-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06740-0

Keywords

Navigation