Secure and efficient data transmission for cluster-based wireless sensor networks
Technology Used: Dot Net
Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to illustrate the efficiency of the proposed protocols. The results show that, the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ The LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol is a widely known and effective one to reduce and balance the total energy consumption for CWSNs. In order to prevent quick energy consumption of the set of CHs, LEACH randomly rotates CHs among all sensor nodes in the network, in rounds. LEACH achieves improvements in terms of network lifetime.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Following LEACH, a number of protocols have been presented such as APTEEN and PEACH.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Digital signature is one of the most critical security services offered by cryptography in asymmetric key management systems, where the binding between the public key and the identification of the signer is obtained via a digital certificate.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ The Identity-Based digital Signature (IBS) scheme, based on the difficulty of factoring integers from Identity- Based Cryptography (IBC), is to derive an entityÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢s public key from its identity information, e.g., from its name or ID number.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Adding security to LEACH-like protocols is challenging, because they dynamically, randomly and periodically rearrange the networkÃƒÂ¢Ã¢â€šÂ¬Ã¢â€žÂ¢s clusters and data links.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Node-to-node trust relationships and common key distributions are inadequate for LEACH-like protocols.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Apply the symmetric key management for security, which suffers from a so-called orphan node problem. This problem occurs when a node does not share a pairwise key with others in its preloaded key ring. In order to mitigate the storage cost of symmetric keys, the key ring in a node is not sufficient for it to share pairwise symmetric keys with all of the nodes in a network. In such a case, it cannot participate in any cluster, and therefore, has to elect itself as a CH. Furthermore, the orphan node problem reduces the possibility of a node joining with a CH, when the number of alive nodes owning pairwise keys decreases after a longterm operation of the network.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Secure and Efficient data Transmission (SET) protocols for CWSNs is proposed, called SET-IBS and SETIBOOS, by using the IBS scheme and the IBOOS scheme, respectively.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ The key idea of both SET-IBS and SET-IBOOS is to authenticate the encrypted sensed data, by applying digital signatures to message packets, which are efficient in communication and applying the key management for security.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Secret keys and pairing parameters are distributed and preloaded in all sensor nodes by the BS initially, which overcomes the key escrow problem described in ID-based crypto-systems.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Secure communication in SET-IBS relies on the ID-based cryptography, in which, user public keys are their ID information. Thus, users can obtain the corresponding private keys without auxiliary data transmission, which is efficient in communication and saves energy.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ SET-IBOOS is proposed in order to further reduce the computational overhead for security using the IBOOS scheme, in which security relies on the hardness of the discrete logarithmic problem. Both SET-IBS and SETIBOOS solve the orphan node problem in the secure data transmission with a symmetric key management.
ÃƒÂ¯Ã‚ÂÃ‚Â¶ Less computation and communication
ÃƒÂ¯Ã‚ÂÃ‚Â¶ High security