scholarly journals TWO-WAY AUTHENTICATION FOR ENHANCING SECURITY IN HETEROGENEOUS WIRELESS SENSOR NETWORKS

Author(s):  
Văn Trường Nguyễn ◽  
Tuấn Anh Dương ◽  
Quý Sỹ Nguyễn

In wireless sensor networks, each sensor node nowadays is responsible for the exchange of sensory data with high performance in terms of QoS such as network throughput and delay under energy restrictions. Besides network performance, network security plays an important role in designing a wireless sensor network. One of current challenges is to design efficiently lightweight security methods to achieve highly secured transmissions and prolonged network lifetime. In this paper, we introduce an end-to-end two-way authentication scheme for WSNs under the heterogeneous assumption. By drawing on the benefit of lightweight homomorphic encryption and watermark data, numerical evaluations and security analysis show that our proposed method can prolong the network lifetime with the enhancement in network security.

2021 ◽  
Author(s):  
Ramdas Vankdothu ◽  
Hameed Mohd Abdul ◽  
Fatima Husnah ◽  
Subbarao Akkala

Abstract Heterogeneous wireless sensor networks (HWSNs) satisfy researchers' requirements for developing real-world solutions that handle unattended challenges. However, the primary constraint of researchers is the privacy of the sensor nodes. It safeguards the sensor nodes and extensions in the HWSNs. Therefore, it is necessary to develop secure operational systems. Multicast scaling with security and time efficiency is described in heterogeneous wireless sensor networks to maximize network performance while also successfully protecting network privacy. This study evaluates the initial security and time efficiency measures, such as execution time, transmission delay, processing delay, congestion level, and trust measure. Subsequently, the optimal location of the heterogeneous nodes is determined using sigmoid-based fuzzy c-means clustering. Finally, successful cluster routing was achieved via support-value-based particle swarm optimization. The experimental results indicate that the proposed strategy surpasses existing strategies in terms of network delivery ratio, end-to-end delay, throughput, packet delivery, and node remaining energy level.


Electronics ◽  
2018 ◽  
Vol 7 (12) ◽  
pp. 403 ◽  
Author(s):  
Goran Popovic ◽  
Goran Djukanovic ◽  
Dimitris Kanellopoulos

Clustering achieves energy efficiency and scalable performance in wireless sensor networks (WSNs). A cluster is formed of several sensor nodes, one of them selected as the cluster head (CH). A CH collects information from the cluster members and sends aggregated data to the base station or another CH. In such a hierarchical WSN, some nodes are possibly moveable or nomadic (relocated periodically), while others are static. The mobility of sensor nodes can improve network performance and prolong network lifetime. This paper presents the idea of mobile, solar-powered CHs that relocate themselves inside clusters in such a way that the total energy consumption in the network is reduced and the network lifetime is extended. The positioning of CHs is made in each round based on a selfish herd hypothesis, where the leader retreats to the center of gravity. Based on this idea, the CH-active algorithm is proposed in this study. Simulation results show that this algorithm has benefits in terms of network lifetime and in the prolongation of the duration of network stability period.


2012 ◽  
Vol 433-440 ◽  
pp. 3223-3229
Author(s):  
Davood Keykhosravi ◽  
Ali Hosseinalipour

Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. There are many algorithms for clustering. One of the cluster based algorithm in wireless sensor networks is LEACH algorithm. In this paper we proposed a new clustering method for increasing of network lifetime. In proposed method Clustering is done symmetrically and the best node with respect to remained energy and distance of other nodes in comparing with each that selected as a cluster head. Although in this protocol we didn’t use GPS but we could find geographical position nodes so easily. However, failures in higher level of hierarchy e.g. cluster-head cause more damage to the system because they also limit accessibility to the nodes that are under their supervision. In this paper we propose an efficient mechanism to recover sensors from a failed cluster. In this performance of the proposed algorithm via computer simulation was evaluated and compared with other clustering algorithms. The simulation results show the high performance of the proposed clustering algorithm.


2018 ◽  
Vol 7 (4) ◽  
pp. 2746
Author(s):  
Dr. G. Murugan

Wireless Sensor Networks (WSNs) have many potential applications. Multi-path routing is widely used in WSN to achieve reliability and perform Fault Tolerance. Multi-path routing determines and assigns multiple routes from a given sensor node to the sink. The transmission of data among the multi-path brings path redundancy, which increases the reliability and reduces the network congestion. In this research work, a dynamic redundancy management algorithm is proposed. To exploit multi-path routing in order to process the user request with existence of defective and malicious nodes. The objective of this work is to analyze the trade-off between energy consumption and Quality of Service (QoS) gain in security and reliability in order to increase the lifetime. The optimized redundancy level of multipath routing is determined dynamically which is used to improve the query response while extending the network lifetime and also for detecting intrusions and send alert to the system through Intrusion Detection System (IDS). Then, a voting-based distributed Intrusion Detection (ID) algorithm is proposed to detect and remove malicious nodes in a sensor network. The malicious node has been determined through number of voters using voting-based distributed ID algorithm. The efficient redundancy management of a clustered Heterogeneous Wireless Sensor Network (HWSN) is to increase the network lifetime in the presence of unreliable and malicious nodes. Therefore, the reliability improved dramatically.  


2012 ◽  
Vol 482-484 ◽  
pp. 252-255
Author(s):  
Xi Yuan Ma ◽  
Shu Mei Fan ◽  
Myong Soon Park

Wireless Sensor Networks (WSNs) are usually subjected to numerous threats and vulnerable to various attacks. Generally, the key management is considered to be the prerequisite for secure communication in WSNs. In this paper, we present a Localization-based Clustered Key Management (LCKM) which can efficiently enhance the network security and survivability for the clustered heterogeneous networks. LCKM utilizes the seeds to rekey and then localize the key materials, which protects the network from the compromised nodes by reducing the probability of the common key. The security analysis proves that LCKM can prevent more attacks than other protocols.


Sign in / Sign up

Export Citation Format

Share Document