Skip to main content

Advertisement

Log in

SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

In this paper, we present secure energy-efficient routing protocol (SERP) for densely deployed wireless sensor networks which aims to achieve robust security for transmitted sensor readings with an energy-efficient network backbone. When the sensors with limited energy budgets are deployed in hazardous environment, ensuring energy efficiency and security of the sensor readings becomes a crucial task. Here, we address how to deal with such a deployment scenario. Our protocol ensures secure transmission of data from the source sensors to the base station in a way that it can best utilize the available amount of energy in the network. We use one-way hash chain and pre-stored shared secret keys for ensuring data transmission security. In SERP, first, a sink rooted tree structure is created as the backbone of the network. This energy-efficient network structure is used for authenticated and encrypted data delivery from the source sensors to the base station. To introduce data freshness, SERP includes an optional key refreshment mechanism which could be applied depending on the application at hand. Our analysis and simulation results show that SERP provides a good level of confidentiality and authenticity of data that are transmitted from the sensors to the base station. It also helps for energy-efficient structuring of the network so that the maximum lifetime of the network could be achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor net-works: a survey. Comput Networks 38:393–422

    Article  Google Scholar 

  2. Dai S, Jing X, Li L (2005) Research and analysis on routing protocols for wireless sensor networks. Proceedings of the International Conference on Communications, Circuits and Systems, volume 1, pp 407–411 (27–30 May)

  3. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, pp 293–315, (September)

  4. Pathan A-SK, Lee H-W, Hong CS (2006) Security in wireless sensor networks: issues and challenges. Proceedings of the 8th IEEE ICACT 2006, Volume II, Phoenix Park, Korea, pp 1043–1048, (20–22 February)

  5. Pathan A-SK, Hong CS (2007) A secure energy-efficient routing protocol for WSN. ISPA 2007, LNCS 4742, Springer, pp 407–418

  6. Çam H, Özdemir S, Muthuavinashiappan D, Nair P (2003) Energy efficient security protocol for wireless sensor networks. IEEE 58th Vehicular Technology Conference, 2003, VTC 2003-Fall 2003, volume 5, pp 2981–2984, (6–9 Oct)

  7. Çam H, Özdemir S, Nair P, Muthuavinashiappan D, Sanli HO (2006) Energy-efficient secure pattern based data aggregation for wireless sensor networks. Comput Commun 29(4):446–455

    Article  Google Scholar 

  8. Ye F, Luo H, Lu S, Zhang L (2005) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Area Commun 23(4):839–850 (April)

    Article  Google Scholar 

  9. Zhu S, Setia S, Jajodia S, Ning P (2004) An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. Proceedings of S&P, pp 259–271

  10. Lee HY, Cho TH (2006) Key inheritance-based false data filtering scheme in wireless sensor networks. Lecture notes in computer science, LNCS 4317, Springer, pp 116–127

  11. Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii Inter-national Conference on System Sciences (HICSS), pp 3005–3014

  12. Azzedine B, Xiuzhen C, Joseph L (2003) Energy-aware data-centric routing in microsensor networks. Proceedings of the 8th MSWiM 03, San Diego, pp 42–49

  13. Hyunh TT, Hong CS (2006) An energy delay efficient multi-hop routing scheme for wireless sensor networks. IEICE Trans Inf Syst E89-D(5):1654–1661 (May)

    Article  Google Scholar 

  14. Yin C, Huang S, Su P, Gao C (2003) Secure routing for large-scale wireless sensor networks. In Proceedings of IEEE ICCT 2003, volume 2, pp 1282–1286, (9–11 April)

  15. Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) SPINS: security protocols for sensor networks. Wirel Netw 8:521–534

    Article  MATH  Google Scholar 

  16. Xbow Sensor Networks. Available at: http://www.xbow.com/

  17. Hass ZJ (2001) Design methodologies for adaptive and multimedia networks. IEEE Commun Mag 39(11):106–107 (November)

    Article  Google Scholar 

  18. Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670 (October)

    Article  Google Scholar 

  19. Lamport L (1979) Constructing digital signatures from one-way function. Technical report SRI-CSL-98, SRI International, October

  20. The Network Simulator-ns-2. http://www.isi.edu/nsnam/ns/

  21. Coppersmith D, Jakobsson M (2002) Almost optimal hash sequence traversal. 6th International Financial Cryptography 2002, Bermuda, (March)

  22. Jakobsson M (2002) Fractal hash sequence representation and traversal. 2002 IEEE International Symposium on Information Theory, Switzerland (July)

  23. Sella Y (2003) On the computation-storage trade-offs of hash chain traversal. The 7th International Financial Cryptography Conference, Guadeloupe, (January)

  24. Ee CT, Bajcsy R (2004) Congestion control and fairness for many-to-one routing in sensor networks. Proceedings of ACM SenSys’04, 148-161

Download references

Acknowledgments

This research was supported by the MKE under the ITRC support program supervised by the IITA (IITA-2008-(C1090-0801-0016)). Dr. CS Hong is the corresponding author. We’d like to give special thanks to Md. Mamun-Or-Rashid for his generous help for this work. Also, special thanks to the reviewers for their valuable comments to improve this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Choong Seon Hong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Pathan, AS.K., Hong, C.S. SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Ann. Telecommun. 63, 529–541 (2008). https://doi.org/10.1007/s12243-008-0042-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-008-0042-5

Keywords

Navigation