DOI QR코드

DOI QR Code

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman (Computer Science Department, College of Computer and Information Sciences, Prince Sultan University) ;
  • Saadeh, Maha (Computer Science Department, King Abdullah II School for Information Technology, The University of Jordan)
  • Received : 2017.07.27
  • Accepted : 2017.11.15
  • Published : 2018.04.30

Abstract

Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

Keywords

References

  1. Guoru Ding, Jinlong Wang, Qihui Wu and, Yu-Dong Yao, "Robust Spectrum Sensing With Crowd Sensors," IEEE Transactions on Communications, vol. 62, no. 9, pp. 3129-3143, September, 2014. https://doi.org/10.1109/TCOMM.2014.2346775
  2. Iman Almomani and Maha Saadeh, "FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks," International Journal of Communications, Network and System Sciences, vol. 4, no. 6, pp. 403-415, June 2011. https://doi.org/10.4236/ijcns.2011.46048
  3. M. Kocakulak and I. Butun, "An Overview of Wireless Sensor Networks towards Internet of Things," in Proc. of IEEE 7th Annual on Computing and Communication Workshop and Conference (CCWC), pp.1-6, January 9-11, 2017.
  4. Priyanka Rawat, Kamal Deep Singh, Hakima Chaouchi and Jean Marie Bonnin, "Wireless Sensor Networks: A Survey on Recent Developments and Potential Synergies," Journal of Supercomputing, vol. 68, no. 1, pp. 1-48, April, 2014. https://doi.org/10.1007/s11227-013-1021-9
  5. Sanjeev Kumar Gupta and Poonam Sinha, "Overview of Wireless Sensor Network: A Survey," International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 1, pp. 5201-5207, January, 2014.
  6. MR. Ahmed, X. Huang, D. Sharma and H. Cui, "Wireless Sensor Networks: Characteristics and Architectures," International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 6, no. 12, pp. 1398-1401, 2012.
  7. IEEE 802.15.4, "ZigBee Specification Version 1.0", ZigBee Alliance, 2005.
  8. Yongsuk Park and Eun-Sun Jung, "Plus-Tree: A Routing Protocol for Wireless Sensor Networks," Lecture Notes in Computer Science, LNCS, vol. 4413, pp. 638-646, 2006.
  9. Wanzhi Qiu, Efstratios Skafidas and Peng Hao, "Enhanced Tree Routing for Wireless Sensor Networks," Ad Hoc Networks, vol.7, no.3, pp. 638-65, May, 2009. https://doi.org/10.1016/j.adhoc.2008.07.006
  10. M. Al-Harbawi, MFA. Rasid, and NK. Noordin, "Improved Tree Routing (ImpTR) Protocol for ZigBee Network," International Journal of Computer Science and Network Security, vol.9, no.10, pp. 146-152, October, 2009.
  11. MA. Abuhelaleh, TM. Mismar, and AA. Abuzneid, "Armor-LEACH - Energy Efficient, Secure Wireless Networks Communication", in Proc. of 17th International Conference on Computer Communications and Networks (ICCCN '08), pp.1-7, August 3-7, 2008.
  12. Eleni Klaoudatou, Elisavet Konstantinou, Georgios Kambourakis, and Stefanos Gritzalis, "A Survey on Cluster-Based Group Key Agreement Protocols for WSNs," IEEE Communications Surveys & Tutorials, vol. 13, no. 3, pp. 429-442, Third Quarter, 2011. https://doi.org/10.1109/SURV.2011.061710.00109
  13. Al-Sakib Khan Pathan, Choong Seon Hong, "A Secure Energy-Efficient Routing Protocol for WSN," Lecture Notes in Computer Science, vol. 4742, pp. 407-418, 2007.
  14. Anthonis Papadimitriou, Fabrice Le Fessant, Aline Carneiro Viana and Cigdem Sengul, "Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks," in Proc. of 5th Workshop on Secure Network Protocols (NPSec 2009), pp.43-48, October 13-13, 2009.
  15. Rickard Soderlund, Stefan Svensson, Tomas Lennvall, "Energy Efficient Authentication in Wireless Sensor Networks," in Proc. of IEEE Conference on Emerging Technologies and Factory Automation, pp. 1412-1416, September 25-28, 2007.
  16. Kui Ren, Member, Wenjing Lou, Kai Zeng, and Patrick J. Moran, "On Broadcast Authentication in Wireless Sensor Networks," IEEE Transaction on Wireless Communication, vol. 6, no. 11, pp. 4136-4144, November, 2007. https://doi.org/10.1109/TWC.2007.060255
  17. Hsiu-Lien Yeh, Tien-Ho Chen, Pin-Chuan Liu, Tai-Hoo Kim and Hsin-Wen Wei, "A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography," Sensors, vol. 11, no. 5, pp. 4767-4779, May, 2011. https://doi.org/10.3390/s110504767
  18. Sunil Gupta, Harsh Kumar Verma and AL Sangal, "Authentication Protocol for Wireless Sensor Networks," International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 4, no. 6, pp. 947-953, 2010.
  19. Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Djotio, Olivier Festor, "Fuzzy-based Routing Metrics Combination for RPL," Doctoral Consortium Sensornets, pp.1-8, 2014.
  20. Seyed Hassan Mosakazemi Mohammadi and Reza sabbaghi-Nadooshan, "A Novel Comprehensive Taxonomy of Intelligent-Based Routing Protocols in Wireless Sensor Networks," International Journal of Smart Electrical Engineering, vol. 2, no. 2, pp. 103-109, Spring, 2013.
  21. Amarappa Pagi, Abdul Lateef Haroon, Manjunath K M and Ulaganathan J., "Fuzzy Energy Aware Graph Based Routing (FEAGR) in Wireless Sensor Networks," International Journal of Research in Engineering and Technology, vol. 4, no. 5, pp. 133-139, May, 2015.
  22. Ajai Kumar Mishra, Rakesh Kumar and Rakesh Kumar, "A Novel Cluster Head Selection Scheme Using Fuzzy Logic in Wireless Sensor Networks," in Proc. of IEEE International Conference on Green Computing and Internet of Things (ICGCIoT), pp.203-208, October 8-10, 2015.
  23. Aarti Jain, "Betweenness Centrality Based Connectivity Aware Routing Algorithm for Prolonging Network Lifetime in Wireless Sensor Networks," Wireless Network, vol. 22, no. 5, pp. 1605-1624, July, 2016. https://doi.org/10.1007/s11276-015-1054-5
  24. A. B. Pagi, V. R. Budyal, and M.J. Sataraddi, "Fuzzy Based Energy Aware Flat Routing (FEAFR) in Wireless Sensor Networks," International Journal of Emerging Technology and Advanced Engineering, pp. 108-115, July, 2014.
  25. A. Arya, A. Malik, and S. Kumar, "A Routing Protocol for Detecting Holes in Wireless Sensor Networks with Multiple Sinks," in Proc. of Third ACM International Symposium on Women in Computing and Informatics, pp.103-108, August 10-13, 2015.
  26. Patrick-Olivier Kamgueu, Emmanuel Nataf and Thomas Ndie Djotio, "On Design and Deployment of Fuzzy-Based Metric for Routing in Low-Power and Lossy Networks," in Proc. of IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp.789-795, October 26-29, 2015.
  27. Ajai Kumar Mishra, Rakesh Kumar and Jitendra Singh, "A Review on Fuzzy Logic Based Clustering Algorithms for Wireless Sensor Networks," in Proc. of IEEE International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), pp.489-494, February 25-27, 2015.
  28. Veenu Mor and Harish Kumar, "Energy efficient wireless mobile networks: A review," in Proc. of IEEE International Conference on Optimization, Reliability, and Information Technology (ICROIT), pp.281-285, February 6-8, 2014.
  29. E. Golden Julie and S. Tamilselvi, "CDS-Fuzzy Opportunistic Routing Protocol for Wireless Sensor Networks," Wireless Personal Communications, vol. 90, no. 2, pp. 903-922, September 2016. https://doi.org/10.1007/s11277-016-3250-8
  30. Firoj Ahamad and Rakesh Kumar, "Energy Efficient Region Based Clustering Algorithm for WSN using Fuzzy Logic," in Proc. of IEEE International Conference on Recent Trends in Electronics Information Communication Technology, pp.1020-1024, May 20-21, 2016.
  31. Ajai Kumar Mishra, Rakesh Kumar, Vimal Kumar and Jitendra Singh, "A Grid-Based Approach to Prolong Lifetime of WSNs Using Fuzzy Logic," Advances in Intelligent Systems and Computing Book Series, Springer, pp.11-22, 2017.
  32. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," in Proc. of 33rd Hawaii International Conference on System Sciences (HICSS '00), Vol. 8. IEEE Computer Society, pp.3005-3014, January 7-7, 2000.
  33. Iman Almomani, and Maha Saadeh, "Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation," KSII Transaction on Internet and Information System, pp. 1223-1247, vol. 6, no. 4, April, 2012. https://doi.org/10.3837/tiis.2012.04.016
  34. Advanced Encryption Standard, National Institute of Standards and Technology (NIST), 1997.
  35. ISO/IEC 9797-1, "Information technology - Security techniques -Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher," International Standardization Organization (ISO), 2011.
  36. Jongdeog Lee, Krasimira Kapitanova and Sang H. Son, "The Price of Security in Wireless Sensor Network," Computer Networks, vol. 54, no. 17, June, 2010.
  37. P. Trakadas, T. Zahariadis, H.C. Leligou, S. Voliotis and K. Papadopoulos, "Analyzing Energy and Time Overhead of Security Mechanisms in Wireless Sensor Networks," in Proc. of 15th International Conference on Systems, Signals and Image Processing (IWSSIP 2008), pp.137-140, June 25-28, 2008.
  38. Qualnet 5.0, Qualnet Network Simulator, (Accessed 31 May 2017).

Cited by

  1. Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks vol.20, pp.5, 2018, https://doi.org/10.3390/s20051375