Abstract:An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wire… Show more
“…Vaseghi et al (2017) used the chaos synchronization technique and applied a sliding mode controller to obtain the true synchronization value between the chaotic oscillators from both the base station and the sensor nodes. Another work carried out by Manjunath and Rao (2018, 2019) where the authors have used hash-based authentication and lightweight encryption mechanism to perform balancing trade-off between data security and energy thereby enabling secure communication in WSN to resist maximum security threats. Yu (2013) proposed a scheme based on asymmetric encryption to perform the authentication process as well as symmetric keys and encryption for key management operations.…”
PurposeIn the past recent years, wireless sensor network (WSN) has progressively grown as an emerging technology. Various research efforts have been made in the literature to address the problem associated with WSN security. Based on the review analysis, it is found that the existing methods are mostly associated with complex security operations that are not suitable for resource constraint sensor nodes. The proposed paper has presented cost-effective modeling of the security framework that addresses the problem of security and energy in WSN.Design/methodology/approachThe proposed security framework implements two different protocols to attain maximum security services and optimizes the security operation of the proposed security models to achieve higher energy efficiency and privacy preservation against a majority of the lethal attacks. The first security model introduces a novel cost-efficient pairwise key-based authentication mechanism to identify the availability of optimal routes under the presence of adversary in the network. The second security model introduces an integrated part of the first security model that optimizes security operation to perform secure communication using a lightweight encryption mechanism.FindingsBased on the experimental outcome and analysis, the proposed system attains a 60% performance improvement in terms of security and computational efficiency compared to the existing Sec-LEACH. The second security model has achieved a 50% improvement in terms of overall aspects like reduction in transmission delay, packet delivery ratio, remaining energy and communication performance.Originality/valueThe proposed study has presented a computationally efficient model that provides lightweight security operations based on secure hash function. It also focuses on the security associations between WSN nodes and the selection of reliable routes for secure data transmission. The design of the proposed security model is best suited for homogeneous and heterogeneous sensor networks, which will be robust to any attacking scenario.
“…Vaseghi et al (2017) used the chaos synchronization technique and applied a sliding mode controller to obtain the true synchronization value between the chaotic oscillators from both the base station and the sensor nodes. Another work carried out by Manjunath and Rao (2018, 2019) where the authors have used hash-based authentication and lightweight encryption mechanism to perform balancing trade-off between data security and energy thereby enabling secure communication in WSN to resist maximum security threats. Yu (2013) proposed a scheme based on asymmetric encryption to perform the authentication process as well as symmetric keys and encryption for key management operations.…”
PurposeIn the past recent years, wireless sensor network (WSN) has progressively grown as an emerging technology. Various research efforts have been made in the literature to address the problem associated with WSN security. Based on the review analysis, it is found that the existing methods are mostly associated with complex security operations that are not suitable for resource constraint sensor nodes. The proposed paper has presented cost-effective modeling of the security framework that addresses the problem of security and energy in WSN.Design/methodology/approachThe proposed security framework implements two different protocols to attain maximum security services and optimizes the security operation of the proposed security models to achieve higher energy efficiency and privacy preservation against a majority of the lethal attacks. The first security model introduces a novel cost-efficient pairwise key-based authentication mechanism to identify the availability of optimal routes under the presence of adversary in the network. The second security model introduces an integrated part of the first security model that optimizes security operation to perform secure communication using a lightweight encryption mechanism.FindingsBased on the experimental outcome and analysis, the proposed system attains a 60% performance improvement in terms of security and computational efficiency compared to the existing Sec-LEACH. The second security model has achieved a 50% improvement in terms of overall aspects like reduction in transmission delay, packet delivery ratio, remaining energy and communication performance.Originality/valueThe proposed study has presented a computationally efficient model that provides lightweight security operations based on secure hash function. It also focuses on the security associations between WSN nodes and the selection of reliable routes for secure data transmission. The design of the proposed security model is best suited for homogeneous and heterogeneous sensor networks, which will be robust to any attacking scenario.
“…The results obtained from the study show that there is no overhead for the developed scheme with less processing time making it suitable for the application of sensors with limited resources. A novel methodology comprising a secure paradigm is developed by author [21] in order to provide tradeoff between data security and energy model. Research Methodology An efficient cluster head selection algorithm along with efficient data routing will be developed in this research to ensure secure, fast data transfer from source to destination node between or within cluster members.…”
Wireless Sensor Networks (WSN) includes numerous sensor nodes that are connected to each other through the use of wireless short distance links. The transfer of data between the individual nodes is found to be energy-constrained and the energy-efficient protocol in WSNs is a huge requirement. In addition, the deployment of large numbers of sensor nodes increases the size of the network, which in turn increases the energy consumption rate. An efficient protocol is developed in this research that includes grid-based mobile communication network formation, efficient path selection through cluster head selection and data communication. In addition, multi-stage authentication is implemented to provide security from source node to destination node for the transfer of data. Implementation is performed via NS2-based platform and the result obtained shows that the proposed system outperforms other existing techniques in terms of packet delivery and use of energy through network lifetime.
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.