Energy-efficient and reliable data collection in wireless sensor networks

Energy-efficient and reliable data collection in wireless sensor networks

Ensuring energy efficiency, data reliability, and security is important in wireless sensor networks (WSNs). A combination of variants from the cryptographic secret sharing technique and the disjoint multipath routing scheme is an effective strategy to address these requirements. Although Shamir's secret sharing (SSS) provides the desired reliability and information-theoretic security, it is not energy efficient. Alternatively, Shamir's ramp secret sharing (SRSS) provides energy efficiency and data reliability, but is only computationally secure. We argue that both these approaches may suffer from a compromised node (CN) attack when a minimum number of nodes is compromised. Hence, we propose a new scheme that is energy efficient, provides data reliability, and is secure against CN attacks. The core idea of our scheme is to combine SRSS and a round-reduced AES cipher, which we call split hop AES (SHAES)". Both the simulation results and the theoretical analysis are employed to validate the near-sink CN attack, and a secure reliable scheme using SHAES is proposed.

___

  • [1] Li Y, Chen D, Li W, Wang G, Smith P. A hybrid authenticated group key agreement protocol in wireless sensor networks. Int J Distrib Sens N 2013; 9: 716265.
  • [2] Zhou J. Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks. Int J Distrib Sens N 2013; 9: 108968.
  • [3] Liu A, Yang LT, Sakai M, Dong M. Secure and energy-efficient data collection in wireless sensor networks. Int J Distrib Sens N 2013; 9: 565076.
  • [4] Pan Y, Yu Y, Yan L. An improved trust model based on interactive ant algorithms and its applications in wireless sensor networks. Int J Distrib Sens N 2013; 9: 764064.
  • [5] Gu L, Pan Y, Dong M, Ota K. Noncommutative lightweight signcryption for wireless sensor networks. Int J Distrib Sens N 2013; 9: 818917.
  • [6] Liu RP, Rosberg Z, Collings IB, Wilson C, Dong AY, Jha S. Energy efficient reliable data collection in wireless sensor networks with asymmetric links. Int J Wirel Inf N 2009; 16: 131-141.
  • [7] Dong M, Ota K, Liu A. RMER: Reliable and energy-efficient data collection for large-scale wireless sensor networks. IEEE Internet Things 2016; 3: 511-519.
  • [8] Lou W, Kwon Y. H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE T Veh Technol 2006; 55: 1320-1330.
  • [9] Shu T, Krunz M, Liu S. Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE T Mobile Comput 2010; 9: 941-954.
  • [10] Liu A, Zheng Z, Zhang C, Chen Z, Shen X. Secure and energy-efficient disjoint multipath routing for WSNs. IEEE T Veh Technol 2012; 61: 3255-3265.
  • [11] Challal Y, Ouadjaout A, Lasla N, Bagaa M, Hadjidj A. Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. J Netw Comput Appl 2011; 34: 1380-1397.
  • [12] Shi E, Perrig A. Designing secure sensor networks. IEEE Wirel Commun 2004; 11: 38-43.
  • [13] Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing for wireless sensor networks. Comput Commun 2006; 29: 216-230.
  • [14] Lou W, Liu W, Zhang Y. Performance optimization using multipath routing in mobile ad hoc and wireless sensor networks. In: Cheng MX, Li Y, Du DZ, editors. Combinatorial Optimization in Communication Networks. Boston, MA, USA: Springer, 2006. pp. 117-146.
  • [15] Claveirole T, De Amorim MD, Abdalla M, Viniotis Y. Securing wireless sensor networks against aggregator compromises. IEEE Commun Mag 2008; 46: 134-141.
  • [16] Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: security protocols for sensor networks. Wirel Netw 2002; 8: 521-534.
  • [17] Shaheen J, Ostry D, Sivaraman V, Jha S. Con dential and secure broadcast in wireless sensor networks, In: IEEE 2007 International Symposium on Personal, Indoor and Mobile Radio Communications; 3{7 September 2007; Athens, Greece. New York, NY, USA: IEEE. pp. 1-5.
  • [18] Hsu CF, Cui GH, Cheng Q, Chen J. A novel linear multi-secret sharing scheme for group communication in wireless mesh networks. J Netw Comput Appl 2011; 34: 464-468.
  • [19] Bouillaguet C, Derbez P, Dunkelman O, Fouque PA, Keller N, Rijmen V. Low-data complexity attacks on AES. IEEE T Inform Theory 2012; 58: 7002-7017.
  • [20] Stinson DR. Cryptography: Theory and Practice. 3rd ed. Boca Raton, FL, USA: Chapman & Hall/CRC, 2006.
  • [21] Biham E, Keller N. Cryptanalysis of reduced variants of Rijndael. In: AES 2000 Conference; 13{14 April 2000; New York, NY, USA. Gaithersburg, MD, USA: National Institute for Standards and Technology.
  • [22] Daemen J, Rijmen V. The Design of Rijndael. Secaucus, NJ, USA: Springer-Verlag, 2002.