Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking

被引:29
作者
Babaeer, Huda A. [1 ]
Al-Ahmadi, Saad A. [1 ]
机构
[1] King Saud Univ, Comp Sci Dept, Riyadh 11362, Saudi Arabia
关键词
Wireless sensor networks; Sensors; Routing; Energy consumption; Intrusion detection; Watermarking; Clustered protocol; TEEN protocol; watermarking; wireless sensor network; security; sinkhole attack; DESIGN; ALGORITHM; ATTACKS;
D O I
10.1109/ACCESS.2020.2994587
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a wireless sensor network, the sensors periodically transmit sensed data from a specific environment to a centralized station by wireless communication. Deployment in an open environment leads to the potential of security attacks. A sinkhole attack is a destructive attack aimed at the network layer, where the sinkhole node attracts other nodes by advertising itself as the best path to the base station. Subsequently receiving other sensor node packets and compromising network security. Hence, this work proposes a lightweight, secure method based on the Threshold Sensitive Energy Efficient Sensor Network protocol and watermarking techniques to ensure data integrity during transmission. The homomorphic encryption used in this scheme is to provide fast and efficient and consumes less energy while identifying sensor nodes for the purpose of sinkhole detection and prevention. The proposed work has been evaluated using OMNET++ simulation environment to measure the proposed work performance in the following metrics: delay, packet delivery ratio, throughput, and average energy consumption. Compared with previous works, the proposed work shows better results in these metrics. In addition, the proposed scheme consumes less energy compared with similar works due to the use of lightweight watermarking and authentication techniques. The results show that the proposed scheme enhances security by detecting the sinkhole attacker node before the attack is even activated. In addition, the proposed method ensures the integrity and authenticity of the sensed data while transmitting them from the sensor node until receiving it in the base station, and it can detect any tampering of the data.
引用
收藏
页码:92098 / 92109
页数:12
相关论文
共 36 条
  • [1] Abasikelec-Turgut I., 2016, INT J ELECT ELECT EN, V4, P74
  • [2] Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
    Abdalzaher, Mohamed S.
    Seddik, Karim
    Elsabrouty, Maha
    Muta, Osamu
    Furukawa, Hiroshi
    Abdel-Rahman, Adel
    [J]. SENSORS, 2016, 16 (07)
  • [3] Abdullah Md Ibrahim, 2015, International Journal of Computer Network and Information Security, V7, P50, DOI 10.5815/ijcnis.2015.03.07
  • [4] An imperceptible spatial domain color image watermarking scheme
    Abraham, Jobin
    Paul, Varghese
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (01) : 125 - 133
  • [5] Akyildiz I. F., 2011, WIRELESS SENSOR NETW, P18
  • [6] A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications
    Alromih, Arwa
    Al-Rodhaan, Mznah
    Tian, Yuan
    [J]. SENSORS, 2018, 18 (12)
  • [7] [Anonymous], 6151 RFC INT ENG TAS
  • [8] Bahi J. M., 2010, Proceedings of the Second International Conference on Evolving Internet (INTERNET 2010). First International Conferences on Access Networks, Services and Technologies (ACCESS 2010), P125, DOI 10.1109/INTERNET.2010.30
  • [9] Buragohain M, 2018, INT CONF COMMUN SYST, P198, DOI 10.1109/COMSNETS.2018.8328198
  • [10] Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks
    Castelluccia, Claude
    Chan, Aldar C-F
    Mykletun, Einar
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) : 1 - 36