DOI QR코드

DOI QR Code

Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation

  • Almomani, Iman (Computer Science Department, King Abdullah II School for Information Technology) ;
  • Saadeh, Maha (Computer Science Department, King Abdullah II School for Information Technology)
  • Received : 2012.01.21
  • Accepted : 2012.03.27
  • Published : 2012.04.30

Abstract

The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristics of wireless networks should be taken into consideration when applying security techniques to these networks. In this paper, energy efficient Security Model for Tree-based Routing protocols (SMTR) is proposed. In SMTR, different attacks that could face any tree-based routing protocol in WSNs are studied to design a security reference model that achieves authentication and data integrity using either Message Authentication Code (MAC) or Digital Signature (DS) techniques. The SMTR communication and processing costs are mathematically analyzed. Moreover, SMTR evaluation is performed by firstly, evaluating several MAC and DS techniques by applying them to tree-based routing protocol and assess their efficiency in terms of their power requirements. Secondly, the results of this assessment are utilized to evaluate SMTR phases in terms of energy saving, packet delivery success ratio and network life time.

Keywords

References

  1. M. Abuhelaleh, T. Mismar and A. Abuzneid, "Armor-leach - energy efficient, secure wireless networks communication," in Proc. of 17th International Conference on Computer Communications and Networks, St. Thomas, Aug.2008.
  2. E. Klaoudatou, E. Konstantinou, G. Kambourakis and S. Gritzalis, "Clustering oriented architectures in medical sensor environments," in Proc. of Third International Conference on Availability, Reliability and Security, pp.929 -934, Mar.2008.
  3. M.R. Kanjee, K. Divi and L. Hong. "A Physiological Authentication Scheme in Secure Healthcare Sensor Networks," in Proc. of 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks, Jun.2010.
  4. R. Mukesh, A. Damodaram and V. S. Bharathi, "Energy Efficient Security Architecture for Wireless BioMedical Sensor Networks," International Journal of Computer Science and Information Security, vol.6, no.1, pp.116-122, 2009.
  5. T. Dimitriou and K. Ioannis, "Security issues in biomedical wireless sensor networks," in Proc. of First International Symposium on Applied Sciences on Biomedical and Communication Technologies, Oct.2008.
  6. R. Söderlund, Energy Efficient Authentication in Wireless Sensor Network. Ph.D. Thesis, 2006.
  7. A.-S. Pathan and C. Hong, "A secure energy-efficient routing protocol for WSN," In Parallel and Distributed Processing and Applications, pp.407-418, 2007.
  8. A. Papadimitriou, F. Le Fessant, A. Viana and C. Sengul, "Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks," in Proc. of 5th IEEE Workshop on Secure Network Protocols, pp.43-48, Oct.2009.
  9. R. Soderlund, S. Svensson and T. Lennvall, "Energy efficient authentication in wireless sensor networks," in Proc. of IEEE Conference on Emerging Technologies and Factory Automation, pp.1412 -1416, Sep.2007.
  10. K. Ren, W. Lou, K. Zeng and P. Moran, "On broadcast authentication in wireless sensor networks," IEEE Transactions on Wireless Communications, vol.6, no.11, pp.4136-4144, Nov.2007. https://doi.org/10.1109/TWC.2007.060255
  11. H.-L.Yeh, T.-H. Chen, P.-C. Liu, T.-H. Kim and H.-W. Wei, "A secured authentication protocol for wireless sensor networks using elliptic curves cryptography," Sensors, vol.11, no.5, pp.4767-4779, May.2011. https://doi.org/10.3390/s110504767
  12. S. Gupta, H. Verma and A. Sangal, "Authentication protocol for wireless sensor networks," World Academy of Science, Engineering and Technology, 66, pp.643-649, 2010.
  13. L. Liu, Z. Ling and Y. Zuo, "Low-delay Node-disjoint Multi-path Routing using Complementary Trees for Industrial Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, vol.5, no.11, pp.2052-2067, Nov.2011.
  14. M. Al-Harbawi, M. Rasid and N. Noordin, "Improved Tree Routing (ImpTR) Protocol For ZigBee Network," International Journal of Computer Science and Network Security, vol.9, no.10, pp.146-152, Oct.2009.
  15. W. Qiu, E. Skafidas and P. Hao, P. "Enhanced tree routing for wireless sensor networks," Ad Hoc Networks, vol.7, no.3, pp.638-650, May.2009. https://doi.org/10.1016/j.adhoc.2008.07.006
  16. Y. Park, E.-S. Jung, "Plus-tree: A routing protocol for wireless sensor networks," In Advances in Hybrid Information Technology, 2007.
  17. I. Almomani and M. Saadeh, M. "FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks," International Journal of Communications, Network and System Sciences, vol.4, no.6, pp.403-415, Jun.2011. https://doi.org/10.4236/ijcns.2011.46048
  18. IEEE. ZigBee Specification Version 1.0, ZigBee Alliance, 2005.
  19. NIST, the National Institute of Standards and Technology. Federal Information Processing Standards Publication-Announcing the ADVANCED ENCRYPTION STANDARD (AES), 2001.
  20. Rivest, R. L. The RC5 Encryption Algorithm. Springer-Verlag, pp.86-96, 1995.
  21. NIST, The National Institute of Standards and Technology, Skipjack and KEA algorithms specifications, version 2 1998.
  22. D. Wheeler and R. Needham. Correction to XTEA. Cambridge University, 1998.
  23. J. Lee, K. Kapitanova and S. H. Son, "The price of security in wireless sensor networks," Computer Networks, vol.54, no.17, pp.2967-2978, Dec.2010. https://doi.org/10.1016/j.comnet.2010.05.011
  24. R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems" Communication ACM, vol.21, no.2, pp.120-126, Feb.1978. https://doi.org/10.1145/359340.359342
  25. D. Johnson, A. Menezes and S. Vanstone, "The Elliptic Curve Digital Signature Algorithm (ECDSA)," International Journal of Information Security, vol.1, no.1, pp.1, 36-63, Aug.2001.
  26. E. Mamdani, "Application of fuzzy logic to approximate reasoning using linguistic synthesis," IEEE Transactions on Computers, vol.C-26, no. 2, pp.1182-1191, 1977.
  27. W. Heinzelman, A. Sinha, A. Wang and A. Chandrakasan, "Energy-scalable algorithms and protocols for wireless microsensor networks," in Proc. of the 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '00), pp.3722-3725, Jun.2000.
  28. P. Trakadas, T. Zahariadis, H. Leligou, S. Voliotis and K. Papadopoulos, "Analyzing energy and time overhead of security mechanisms in wireless sensor networks," in Proc. of the 15th International Conference on Systems, Signals and Image Processing, pp.137 -140, Jun.2008.
  29. Crossbow Technology, Inc., http://www.xbow.com/.

Cited by

  1. Logic-Based Security Architecture for Systems Providing Multihop Communication vol.9, pp.1, 2012, https://doi.org/10.1155/2013/768489