LSSCW: A lightweight security scheme for cluster based Wireless Sensor Network

被引:0
作者
Pathak G.R. [1 ,2 ]
Premi M.S.G. [3 ]
Patil S.H. [4 ]
机构
[1] Department of Computer Science and Engineering, Satyabhama Institute of Science and Technology (Deemed to be University), Jeppiaar Nagar, Rajiv Gandhi Road, Chennai, Tamilnadu
[2] Sinhgad College of Engineering, Vadgaon (Bk), Pune
[3] School of Electrical and Electronics Engineering, Satyabhama Institute of Science and Technology (Deemed to be University), Jeppiaar Nagar, Rajiv Gandhi Road, Chennai, Tamilnadu
[4] Department of Computer Engineering, Bharati Vidyapeeth (Deemed to be University), Pune-Satara Road, Katraj, Pune, Maharashtra
来源
International Journal of Advanced Computer Science and Applications | 2019年 / 10卷 / 10期
关键词
Authentication; Automated Validation of Internet Security Protocols and Applications tool; Internet of Things (IoT); Key management; Security; Wireless Sensor Network (WSN);
D O I
10.14569/ijacsa.2019.0101062
中图分类号
学科分类号
摘要
In last two decades, Wireless Sensor Network (WSN) is used for large number of Internet of Things (IoT) applications, such as military surveillance, forest fire detection, healthcare, precision agriculture and smart homes. Because of the wireless nature of communication, Wireless Sensor Network suffers from various attacks such as Denial of Service (DoS) attack and replay attack. Dealing with scalability and security issues is the challenging task in WSN. In this paper, we have presented a Lightweight Security Scheme for Cluster based Wireless Sensor Network (LSSCW). LSSCW has two phases: Initialization phase and data transfer phase. The work focuses on secured data aggregation in wireless sensor network with the help of symmetric and session key generation technique. Data from sensor nodes are securely transferred to base station. LSSCW is lightweight and satisfies security requirements including authenticity, confidentiality and integrity. The performance of LSSCW is verified using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Results shows that LSSCW is secured and is efficient in terms of computation and communication overhead. © 2019 International Journal of Advanced Computer Science and Applications.
引用
收藏
页码:448 / 460
页数:12
相关论文
共 50 条
[41]   A Lightweight Secure Provenance Scheme for Wireless Sensor Networks [J].
Sultana, Salmin ;
Ghinita, Gabriel ;
Bertino, Elisa ;
Shehab, Mohamed .
PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, :101-108
[42]   Security in Wireless Sensor Network and IoT: An Elliptic Curves Cryptosystem based Approach [J].
Teguig, E. H. ;
Touati, Y. .
2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, :526-530
[43]   An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network [J].
Moghadam, Mostafa Farhadi ;
Nikooghadam, Mahdi ;
Al Jabban, Maytham Azhar Baqer ;
Alishahi, Mohammad ;
Mortazavi, Leili ;
Mohajerzadeh, Amirhossein .
IEEE ACCESS, 2020, 8 :73182-73192
[44]   A trust enhancement scheme for cluster-based wireless sensor networks [J].
Wang, Tianshu ;
Hu, Kongfa ;
Xichen Yang ;
Gongxuan, Zhang ;
Wang, Yongli .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (05) :2761-2788
[45]   A Novel Identity-based Security Scheme for Wireless Sensor Networks [J].
Qin, Zhongyuan ;
Feng, Kerong ;
Hu, Shuaiqi ;
Tao, Lei ;
Hu, Zunli ;
Zhang, Xinshuai ;
Huang, Jie .
2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, :662-666
[46]   ESF: an efficient security framework for wireless sensor network [J].
Tripathy, Somanath .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2013, 10 (02) :176-194
[47]   Enhancing Wireless Sensor Network Security with Machine Learning [J].
Van Nguyen Nhu Tam ;
Cao Tien Thanh .
CYBERNETICS AND CONTROL THEORY IN SYSTEMS, VOL 2, CSOC 2024, 2024, 1119 :604-626
[48]   Fuzzy-based cluster routing in wireless sensor network [J].
AliReza Naderloo ;
Seyed Ali Fatemi Aghda ;
Mahdi Mirfakhraei .
Soft Computing, 2023, 27 :6151-6158
[49]   Fuzzy-based cluster routing in wireless sensor network [J].
Naderloo, AliReza ;
Fatemi Aghda, Seyed Ali ;
Mirfakhraei, Mahdi .
SOFT COMPUTING, 2023, 27 (10) :6151-6158
[50]   Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network [J].
Dixit, Sameer ;
Qureshi, Shaima .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)