S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

被引:2
作者
Almomani, Iman [1 ,2 ]
Saadeh, Maha [2 ]
机构
[1] Prince Sultan Univ, Coll Comp & Informat Sci, Comp Sci Dept, POB 66833, Riyadh 11586, Saudi Arabia
[2] Univ Jordan, King Abdullah II Sch Informat Technol, Comp Sci Dept, POB 13835, Amman 11942, Jordan
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2018年 / 12卷 / 04期
关键词
Wireless Sensor Network; S-FEAR; Energy; Tree; Routing Protocols; Network Security; AUTHENTICATION; LIFETIME;
D O I
10.3837/tiis.2018.04.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.
引用
收藏
页码:1436 / 1457
页数:22
相关论文
共 50 条
  • [21] A Secure and Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks
    Zhang, Yuquan
    Wei, Lei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 302 - 308
  • [22] A segment transmission secure routing protocol for wireless sensor networks
    Wen, Song
    Du, Ruiying
    Zhang, Huanguo
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1579 - 1582
  • [23] Energy Aware Routing Protocol for Low Energy Sensor Networks
    Elrahim, Adel Gaafar A.
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013,
  • [24] Energy Aware Classification for Wireless Sensor Networks Routing
    El-Aaasser, Minar
    Ashour, Mohamed
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 66 - 71
  • [25] Tree Based Energy Efficient and Congestion Aware Routing Protocol for Wireless Sensor Networks
    Mohajerzadeh, Arnir Hossein
    Yaghmaee, Mohammad Hossien
    Eskandari, Zahra
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1705 - 1709
  • [26] Choice of Secure Routing Protocol for Applications in Wireless Sensor Networks
    Du, Jiang
    Peng, Su
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 470 - 473
  • [27] Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks
    Khalil, Enan A.
    Attea, Bara'a A.
    SWARM AND EVOLUTIONARY COMPUTATION, 2011, 1 (04) : 195 - 203
  • [28] SECURE ENERGY EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
    Das, Ayan Kumar
    Chaki, Rituparna
    Dey, Kashi Nath
    FOUNDATIONS OF COMPUTING AND DECISION SCIENCES, 2016, 41 (01) : 3 - 27
  • [29] A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
    Rahayu, Triana Mugia
    Lee, Sang-Gon
    Lee, Hoon-Jae
    SENSORS, 2015, 15 (07) : 15127 - 15158
  • [30] Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm
    Han, Youjia
    Hu, Huangshui
    Guo, Yuxin
    IEEE ACCESS, 2022, 10 : 11538 - 11550