Cluster-Based Trusted Secure Information Transmission in Wireless Sensor Networks

International Journal of Electrical and Electronics Engineering
© 2025 by SSRG - IJEEE Journal
Volume 12 Issue 2
Year of Publication : 2025
Authors : Hemavathi Patil, Vishwanath Tegampure
pdf
How to Cite?

Hemavathi Patil, Vishwanath Tegampure, "Cluster-Based Trusted Secure Information Transmission in Wireless Sensor Networks," SSRG International Journal of Electrical and Electronics Engineering, vol. 12,  no. 2, pp. 54-62, 2025. Crossref, https://doi.org/10.14445/23488379/IJEEE-V12I2P107

Abstract:

WSN is a heterogeneous system that gives Sensor Nodes access to the communications networks to record and analyze events at many locations. There are currently a number of key managing mechanisms in place to protect communication among Sensor Nodes. At the very least, the key management technique for any secured application needs to provide safety features like trustworthiness. Diffie-Hellman Key Exchange (DHKE) is vulnerable to Man-in-the-Middle (MITM) attacks due to lack of authentication. The Diffie-Hellman with Sybil Attack Prevention method is given as a solution to this issue. The goal of this technique is to identify and remove Sybil nodes from the network in order to address the previously stated problem. Several performance parameters, including packet delivery ratio, delay, throughput, and detection rate, are considered while evaluating the proposed work’s effectiveness. The results show that the proposed work is far better than the conventional techniques and has a better Sybil node detection rate.

Keywords:

Heterogeneous systems, WSN, Key management, Sybil attack, Security, Diffie-Hellman.

References:

[1] Farah Kandah, Jesse Whitehead, and Peyton Ball, “Towards Trusted and Energy-Efficient Data Collection in Unattended Wireless Sensor Networks,” Wireless Networks, vol. 26, no. 7, pp. 5455-5471, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ahmad Ali et al., “A Comprehensive Survey on Real-Time Applications of WSN,” Future Internet, vol. 9, no. 4, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Ala’ Khalifeh et al., “Microcontroller Unit-Based Wireless Sensor Network Nodes: A Review,” Sensors, vol. 22, no. 22, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Rajwinder Kaur, and Jasminder Kaur Sandhu, “A Study on Security Attacks in Wireless Sensor Network,” International Conference on Advance Computing and Innovative Technologies in Engineering, Greater Noida, India, pp. 850-855, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Apip Miptahudin, Titiek Suryani, and Wirawan Wirawan, “Wireless Sensor Network Based Monitoring System: Implementation, Constraints, and Solution,” JOIV: International Journal on Informatics Visualization, vol. 6, no. 4, pp. 778-783, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Zainab Alansari et al., “A Systematic Review of Routing Attacks Detection in Wireless Sensor Networks,” PeerJ Computer Science, vol. 8, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Arthanareeswaran Angappan et al., “Novel Sybil Attack Detection Using RSSI and Neighbour Information to Ensure Secure Communication in WSN,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 6567-6578, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Yousif Hardan Sulaiman et al., “Hybrid Security in AOMDV Routing Protocol with Improved Salp Swarm Algorithm in Wireless Sensor Network,” Bulletin of Electrical Engineering and Informatics, vol. 11, no. 5, pp. 2866-2875, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Udaya Suriya Raj Kumar Dhamodharan, and Rajamani Vayanaperumal, “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method,” The Scientific World Journal, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Chris Karlof, and David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Jlassi Wadii, Haddad Rim, and Bouallegue Ridha, “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks,” IEEE 19th Mediterranean Microwave Symposium, Hammamet, Tunisia, pp. 1-5, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Mandala Mounica, R. Vijayasaraswathi, and R. Vasavi, “Detecting Sybil Attack in Wireless Sensor Networks Using Machine Learning Algorithms,” IOP Conference Series: Materials Science and Engineering, vol. 1042, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Zhukabayeva T.K., Mardenov E.M., and Abdildaeva A.A., “Sybil Attack Detection in Wireless Sensor Networks,” IEEE 14th International Conference on Application of Information and Communication Technologies, Tashkent, Uzbekistan, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Samir Athmani, Azeddine Bilami, and Djallel Eddine Boubiche, “EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for Heterogeneous WSNs,” Future Generation Computer Systems, vol. 92, pp. 789-799, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Shilpa Chaudhari, “A Survey on Multipath Routing Techniques in Wireless Sensor Networks,” International Journal of Networking and Virtual Organisations, vol. 24, no. 3, pp. 267-328, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Shahwar Ali et al., “An Efficient Cryptographic Technique Using Modified Diffie-Hellman in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 16, no. 6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] A. Jenice Prabhu, and D. Hevin Rajesh, “Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm,” Computer Systems Science & Engineering, vol. 45, no. 3, pp. 2363-2376, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Prashant Sangulagi, A.V. Sutagundar, and S.S. Manvi, “Agent Based Information Aggregation and Routing in WSN,” Computer Networks and Information Technologies, pp. 449-451, 2011.
[CrossRef] [Google Scholar] [Publisher Link]