Data Security in Wireless Sensor Networks using an Efficient Cryptographic Technique to Protect Against Intrusion

International Journal of Electronics and Communication Engineering
© 2023 by SSRG - IJECE Journal
Volume 10 Issue 4
Year of Publication : 2023
Authors : S. Suma Christal Mary, S. Jothi Shri, E. Thenmozhi, K. Murugeswari
pdf
How to Cite?

S. Suma Christal Mary, S. Jothi Shri, E. Thenmozhi, K. Murugeswari, "Data Security in Wireless Sensor Networks using an Efficient Cryptographic Technique to Protect Against Intrusion," SSRG International Journal of Electronics and Communication Engineering, vol. 10,  no. 4, pp. 41-50, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I4P105

Abstract:

The ubiquitous nature of wireless sensor networks (WSNs) means that their underlying network architecture may be used to serve a broad range of use cases, from "smart cities" to "smart homes" and beyond. Other serious problems, such as energy use and security, have persisted. When it comes to WSN security, the blockchain might be the answer. Traditional blockchains have limitations, such as inefficient transaction processing and limited scalability. When Wireless Sensor Networks (WSNs) are deployed, most of the time, the nodes are left unmanaged and vulnerable to various security threats. Reliable data distribution in WSNs is nontrivial because of the limited resources and dynamic behavior of sensor nodes. Traditional cryptography and authentication-based methods have been shown to be unsuitable for countering node misbehavior attacks due to their high cost and incapability. The lightweight authentication encryption system was developed to solve the problems of sensor resource scarcity and data security (data integrity and secrecy). Current trust-based solutions, on the other hand, increase traffic congestion and decrease the network's lifespan due to the high costs associated with trust estimates and network-wide dissemination. As a result, the objective of this study is to present an intrusion prevention architecture for mobile Internet of Things devices, along with its integration into WSN, to ensure data security while simultaneously improving the network delivery ratio. The architecture that has been suggested is made up of two different discrete components. To begin, the ambiguity principle is used to construct non-overlapping and independently structured clusters, which are then used to preserve the clusters' stability. Second, based on the architecture of the blockchain, encrypted multi-hop routing pathways with end-to-end coverage are being established. By reducing end-to-end latency, time consumption, packet loss rate, and energy usage while increasing throughput, our recommended model's simulation results reveal good results and security gains.

Keywords:

Data security, WSN, Encryption, Cluster, Intrusion prevention.

References:

[1] Md. Mokammel Haque et al., “An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks,” KSII Transactions on Internet and Information Systems, vol. 2, no. 5, pp. 265–279, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Yih-Chun Hu, David B. Johnson, and Adrian Perrig, “SEAD: Secure Efficient Distance Vector Routing For Mobile Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 1, no. 1, pp. 175–192, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Yih-Chun Hu, Adrian Perrig, and David B. Johnson, “Ariadne: A Secure on-Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, vol. 11, no. 1– 2, pp. 21–38, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Kun Zhang, Cong Wang, and Cuirong Wang, “A Secure Routing Protocol For Cluster-Based Wireless Sensor Networks Using Group Key Management,” 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Abedelaziz Mohaisen et al., “On the Insecurity of Asymmetric Key-Based Architecture in Wireless Sensor Networks,” KSII Transactions on Internet and Information Systems, vol. 3, no. 4, pp. 376–384, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Rafik Hamza et al., “A Privacy-Preserving Cryptosystem for IoT Ehealthcare,” Information Sciences, vol. 527, pp. 493-510, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Jared Cordasco, and Susanne Wetzel, “Cryptographic Versus Trust-Based Methods for MANET Routing Security,” Electronic Notes in Theoretical Computer Science, vol. 197, no. 2, pp. 131–140, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Manik Lal Das, “Two-Factor User Authentication in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp.1086–1090, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[9] S. Gavaskar, E. Ramaraj, and R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,” International Journal of Computer Science and Network Security, vol. 12, no. 11, pp. 137-140, 2012.
[Google Scholar] [Publisher Link]
[10] Alexander Becher, Zinaida Benenson, and Maximillian Dornseif, “Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks,” Technical Report, Springer Berlin, Heidelberg, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Juan Chen et al., “A Lossless Watermarking for 3D STL Model Based on Entity Rearrangement and Bit Mapping,” International Journal of Digital Crime and Forensics, vol. 9, no. 2, pp. 25–37, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Yao-Hsien Huang, and Yuan-Yu Tsai, “A Reversible Data Hiding Scheme for 3D Polygonal Models Based on Histogram Shifting with High Embedding Capacity,” 3D Research, vol. 6, no. 2, pp. 1–12, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[13] IIoan-Catalin Dragoi, and Dinu Coltuc, “Local-Prediction-Based Difference Expansion Reversible Watermarking,” IEEE Transaction on Image Processing, vol. 23, no. 4, pp. 1779–1790, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Xinpeng Zhang, and Shuozhong Wang, “Fragile Watermarking with Error-Free Restoration Capability,” IEEE Transaction on Multimedia, vol. 10, no. 8, pp. 1490–1499, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[15] R. Surendiran, and K. Alagarsamy, "Privacy Conserved Access Control Enforcement in MCC Network with Multilayer Encryption," International Journal of Engineering Trends and Technology, vol. 4, no. 5, pp.2217-2224, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[16] C. De Vleeschouwer, J.-F. Delaigle, and B. Macq, “Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management,” IEEE Transactions on Multimedia, vol. 5, no. 1, pp. 97–105, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Jun Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transaction on Circuits and Systems, vol. 13, no. 8, pp. 890–896, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Yongjian Hu et al., “Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions,” IEEE Transaction on Multimedia, vol. 10, no. 8, pp. 1500– 1512, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Kumar Vasantha, and S V P K Satya Devu, "An Efficient and Reliable Data Transfer Protocol in Wireless Sensor Networks," International Journal of P2P Network Trends and Technology, vol. 9, no. 2, pp. 10-13, 2019.
[Publisher Link]
[20] Ante Poljicak, Lidija Mandic, and Darko Agic, “Discrete Fourier Transform–Based Watermarking Method with an Optimal Implementation Radius,” Journal of Electronic Imaging, vol. 20, no. 3, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Beijing Chen et al., “Full 4- D Quaternion Discrete Fourier Transform Based Watermarking for Color Images,” Digital Signal Processing, vol. 28, pp. 106–119, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Bo Ou et al., “Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding,” IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 5010–5021, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Xiao Wei Li, and Seok Tae Kim, “Optical 3D Watermark Based Digital Image Watermarking for Telemedicine,” Optics and Lasers in Engineering, vol. 51, no. 12, pp. 1310–1320, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Blessey.P.M, R.Geetha "Fuzzy Logic Based Technique Using Trust Authentication for a Secure Data Exchange in Wireless Sensor Networks," International Journal of P2P Network Trends and Technology, vol. 5, no. 3, pp. 5-11, 2015.
[CrossRef] [Publisher Link]
[25] Zhicheng Ni et al., “Reversible Data Hiding,” IEEE Transaction on Circuits Systems for Video Technology, vol. 16, no. 3, pp. 354– 362, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Piyu Tsai, Yu-Chen Hu, and Hsiu-Lien Yeh, “Reversible Image Hiding Scheme Using Predictive Coding And Histogram Shifting,” Signal Processing, vol. 89, no. 6, pp. 1129–1143, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Ching-Yung Lin, and Shih-Fu Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” Proceeding of Electronic Imaging, vol. 3971, pp. 140–151, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[28] C. Karlof, and D. Wagner, “Secure Routing in Sensor Networks: Attacks and Countermeasures,” Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Roberto Di Pietro et al., “Data Security in Unattended Wireless Sensor Networks,” IEEE Transactions on Computers, vol. 58, no. 11, pp. 1500– 1511, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Ch. Mounika, Ch. Suresh Babu, "A Novel Security Based Data Transmission Protocol for Cluster Based Wireless Sensor Networks," International Journal of Computer & organization Trends, vol. 6, no. 1, pp. 1-7, 2016.
[CrossRef] [Publisher Link]
[31] Laurent Eschenauer, and Virgil D. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Hui Song, Sencun Zhu, and Guohong Cao, “Attack-Resilient Time Synchronization for Wireless Sensor Networks,” IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Tao Shu, Marwan Krunz, and Sisi Liu, “Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes,” IEEE Transactions on Mobile Computing, Vol. 9, no. 7, pp. 941–954, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Xiaojiang Du et al., “Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks,” IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2387–2394, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Wensheng Zhang, Sencun Zhu, and Guohong Cao, “Pre-Distribution and Local Collaboration-Based Group Rekeying for Wireless Sensor Networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1229–1242, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Nils Gura et al., “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs,” 2004 Workshop on Cryptographic Hardware and Embedded Systems, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Ronald Watro et al., “Tinypk: Securing Sensor Networks with Public Key Technology,” Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks (SASN ’04), ACM Press, pp. 59–64, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Mihaela Cardei, Yinying Yang, and Jie Wu, “Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks,” International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–8, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Yinying Yang, and Mihaela Cardei, “Movement-Assisted Sensor Redeployment Scheme for Network Lifetime Increase,” Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[40] M.Supriya, and Dr.T.Adilakshmi, "Secure Routing using ISMO for Wireless Sensor Networks," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 12, pp. 14-20, 2021.
[CrossRef] [Publisher Link]
[41] Amit Dvir et al., “STWSN: A Novel Secure Distributed Transport Protocol for Wireless Sensor Networks,” International Journal of Communication System, vol. 31, no. 18, p. e3827, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Alakananda Tripathy et al., “Hybrid Cryptography for Data Security in Wireless Sensor Network,” Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing, V. Bhateja, S. C. Satapathy, C. M. TraviesoGonzález, V. N. M. Aradhya, Eds., Springer, Singapore, vol. 1407, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[43] L. Sachin, S. Bhushan, and Surender, “Hybrid Encryption Algorithm to Detect Clone Node Attack in Wireless Sensor Network,” Proceedings of the International Conference on Innovative Computing & Communications, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Md. Navid Bin Anwar, and Maherin Mizan Maha, “AMPC: A Lightweight Hybrid Cryptographic Algorithm for Wireless Sensor Networks,” International Journal of Innovative Science and Research Technology, vol. 5, no. 6, pp. 1142-1146, 2020.
[Google Scholar] [Publisher Link]
[45] Xiao Zhenghong, and Chen Zhigang, “A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks,” International Forum on Information Technology and Applications, 2010.
[CrossRef] [Google Scholar] [Publisher Link
[46] Ali Modirkhazeni, NorafidaIthnin, and Othman Ibrahim, “Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis,” Second International Conference on Network Applications, Protocols and Services, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Shanshan Chen, Geng Yang, and Shengshou Chen, “A Security Routing Mechanism against Sybil Attack for Wireless Sensor Networks,” International Conference on Communications and Mobile Computing, 2010.
[CrossRef] [Google Scholar] [Publisher Link]