International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

Archives

TuEngr+Logo
:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

http://TuEngr.com



ISSN 2228-9860
eISSN 1906-9642
CODEN: ITJEA8


FEATURE PEER-REVIEWED ARTICLE

Vol.13(7)(2022)

  • An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security

    R Priyanka (Department of Information Science and Engineering, Cambridge Institute of Technology, Bangalore, Affiliated to VTU, Belagavi, INDIA),
    K Satyanarayan Reddy (Cambridge Institute of Technology North Campus Bangalore, Affiliated to VTU, Belagavi, INDIA).

    Disciplinary: Computer Science & Engineering.

    ➤ FullText

    doi: 10.14456/ITJEMAST.2022.140

    Keywords: WSN; Security; Localization; ECDH; RSA; Cryptography.

    Abstract
    The demand for sensor Network-based communication has increased due to its wide range of applications. Reliability of data collection is a challenging task in these networks. There are two concerns about sensor placement. First, attackers may target the localization process to manipulate estimated positions. Second, because sensor nodes may get hacked, Base Station (BS) might not be able to trust the positions provided by sensor nodes. Researchers have proposed two techniques to address these two issues: secure localization and location verification. Routing in WSN is considered because it facilitates the transmission of data from any source node to the destinated nodes. Routing attacks have the potential to disrupt and degrade WSN functionality. Numerous experiments, including cryptographic approaches and centralized routing, have been done to enhance confidence between routing nodes. However, the generally utilized message transmission approaches are unsuitable in reality because of the difficulties they face in accurately recognizing hostile node activity. This study focuses on introducing a combined method where secure node localization, node authentication, and secure data exchange via cryptography are presented. The comparative analysis shows that the proposed approach can prevent a greater number of internal and external attacks when compared with state-of-art techniques.

    Paper ID: 13A7N

    Cite this article:

    Priyanka, R., Reddy, K. S. (2022). An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security. International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 13(7), 13A7N, 1-15. http://TUENGR.COM/V13/13A7N.pdf DOI: 10.14456/ITJEMAST.2022.140

References

  1. Gorgich, S., & Tabatabaei, S. (2021). Proposing an energy-aware routing protocol by using a fish swarm optimization algorithm in WSN (wireless sensor networks). Wireless Personal Communications, 119(3), 1935-1955.
  2. Nabavi, S. R., Eraghi, N. O., & Torkestani, J. A. (2021). WSN routing protocol using a multi-objective greedy approach. Wireless Communications and Mobile Computing, 2021.
  3. Khalifa, B., Al Aghbari, Z., & Khedr, A. M. (2021). A distributed self-healing coverage hole detection and repair scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 30, 100428.
  4. Mahajan, H. B., & Badarla, A. (2021). Cross-layer protocol for WSN-assisted IoT smart farming applications using a nature-inspired algorithm. Wireless Personal Communications, 121(4), 3125-3149.
  5. Tripathy, B. K., Jena, S. K., Reddy, V., Das, S., & Panda, S. K. (2021). A novel communication framework between MANET and WSN in an IoT-based smart environment. International Journal of Information Technology, 13(3), 921-931.
  6. Al-Mashhadani, M. A., Hamdi, M. M., & Mustafa, A. S. (2021). Role and challenges of the use of UAV-aided WSN monitoring system in large-scale sectors. In 2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1-5). IEEE.
  7. Lv, Y., Liu, W., Wang, Z., & Zhang, Z. (2020). WSN localization technology is based on a hybrid GA-PSO-BP algorithm for indoor three-dimensional space. Wireless Personal Communications, 114(1), 167-184.
  8. Zhu, Y., Yan, F., Zhao, S., Xing, S., & Shen, L. (2021). On improving the cooperative localization performance for IoT WSNs. Ad Hoc Networks, 118, 102504.
  9. Saad, E., Elhosseini, M., & Haikal, A. Y. (2018). Recent achievements in sensor localization algorithms. Alexandria engineering journal, 57(4), 4219-4228.
  10. Khriji, S., El Houssaini, D., Kammoun, I., Besbes, K., & Kanoun, O. (2019). Energy-efficient routing algorithm based on localization and clustering techniques for agricultural applications. IEEE Aerospace and Electronic Systems Magazine, 34(3), 56-66.
  11. Zhang, L., Yang, Z., Zhang, S., & Yang, H. (2019). Three-dimensional localization algorithm of WSN nodes based on RSSI-TOA and single mobile anchor node. Journal of Electrical and Computer Engineering, 2019.
  12. Shahra, E. Q., Sheltami, T. R., & Shakshuki, E. M. (2020). A comparative study of range-free and range-based localization protocols for wireless sensor network: Using cooja simulator. In Sensor Technology: Concepts, Methodologies, Tools, and Applications (pp. 1522-1537). IGI Global.
  13. Lu, Y., Li, L., Peng, H., & Yang, Y. (2016). An energy-efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors, 16(6), 837.
  14. Xiong, L., Peng, D., Peng, T., Liang, H., & Liu, Z. (2017). A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors, 17(11), 2681.
  15. Chen, J., Sackey, S. H., Anajemba, J. H., Zhang, X., & He, Y. (2021). Energy-efficient clustering and localization technique using genetic algorithm in wireless sensor networks. Complexity, 2021.
  16. Cao, Y., & Wang, Z. (2019). Improved DV-hop localization algorithm based on dynamic anchor node set for wireless sensor networks. IEEE Access, 7, 124876-124890.
  17. Jondhale, S. R., Maheswar, R., & Lloret, J. (2022). Target Localization and Tracking Using WSN. In Received Signal Strength Based Target Localization and Tracking Using Wireless Sensor Networks (pp. 21-48). Springer, Cham.
  18. Yun, W. K., & Yoo, S. J. (2021). Q-learning-based data-aggregation-aware energy-efficient routing protocol for wireless sensor networks. IEEE Access, 9, 10737-10750.
  19. Jung, J., Kim, J., Choi, Y., & Won, D. (2016). Anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks. Sensors, 16(8), 1299.
  20. Nguyen, N. T., Le, T. T., Nguyen, H. H., & Voznak, M. (2021). Energy-efficient clustering multi-hop routing protocol in a UWSN. Sensors, 21(2), 627.
  21. Aydin, M. A., Karabekir, B., & Zaim, A. H. (2021). Energy-efficient clustering-based mobile routing algorithm on WSNs. IEEE Access, 9, 89593-89601.
  22. Khan, T., & Singh, K. (2021). TASRP: a trust-aware secure routing protocol for wireless sensor networks. International Journal of Innovative Computing and Applications, 12(2-3), 108-122.
  23. Jerbi, W., Cheikhrouhou, O., Guermazi, A., Boubaker, A., & Trabelsi, H. (2021, June). A Novel Blockchain Secure to Routing Protocol in WSN. In 2021 IEEE 22nd International Conference on High-Performance Switching and Routing (HPSR) (pp. 1-6). IEEE.
  24. Nguyen, T. N., Le, V. V., Chu, S. I., Liu, B. H., & Hsu, Y. C. (2021). Secure localization algorithms against localization attacks in wireless sensor networks. Wireless Personal Communications, 1-26.
  25. Misra, S., & Ojha, T. (2021). SecRET: Secure range-based localization with evidence theory for underwater sensor networks. ACM Transactions on Autonomous and Adaptive Systems (TAAS) , 15(1), 1-26.
  26. Xie, N., Chen, Y., Li, Z., & Wu, D. O. (2021). Lightweight Secure Localization Approach in Wireless Sensor Networks. IEEE Transactions on Communications, 69(10), 6879-6893.
  27. Prashar, D., Rashid, M., Siddiqui, S. T., Kumar, D., Nagpal, A., AlGhamdi, A. S., & Alshamrani, S. S. (2021). SDSWSN-A Secure Approach for a Hop-Based Localization Algorithm Using a Digital Signature in the Wireless Sensor Network. Electronics, 10(24), 3074.
  28. Wang, C., Luo, J., Liu, X., & He, X. (2021). Secure and Reliable Indoor Localization Based on Multi-Task Collaborative Learning for Large-Scale Buildings. IEEE Internet of Things Journal.
  29. Kim, T. H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133-184144.
  30. Yuan, Y., Huo, L., Wang, Z., & Hogrefe, D. (2018). Secure APIT localization scheme against Sybil attacks in distributed wireless sensor networks. IEEE Access, 6, 27629-27636.
  31. Arshad, A., Hanapi, Z. M., Subramaniam, S., & Latip, R. (2021). A survey of Sybil attack countermeasures in IoT-based wireless sensor networks. Peer J Computer Science, 7, e673.
  32. Bhatt, S., & Ragiri, P. R. (2021). Security trends in Internet of Things: A survey. SN Applied Sciences, 3(1), 1-14.
  33. Kwon, D., Yu, S., Lee, J., Seung, S., & Park, Y. (2021). WSN-SLAP: Secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors, 21(3), 936.
  34. Hajian, R., & Erfani, S. H. (2021). CHESDA: continuous hybrid and energy-efficient secure data aggregation for WSN. The Journal of Supercomputing, 77(5), 5045-5075.
  35. Qureshi, S. G., & Shandilya, S. K. (2021). Novel fuzzy-based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wireless Personal Communications, 1-21.
  36. Gulganwa, P., & Jain, S. (2021). EES-WCA: energy-efficient and securely weighted clustering for WSN using a machine learning approach. International Journal of Information Technology, 1-10.
  37. Mehmood, G., Khan, M. S., Waheed, A., Zareei, M., Fayaz, M., Sadad, T., ... & Azmi, A. (2021). An efficient and secure session key management scheme in a wireless sensor network. Complexity, 2021.
  38. Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12(1), 547-566.
  39. Han, G., L. Liu, J. Jiang, L. Shu, and J. J. P. C. Rodrigues. (2016). A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors, 16(2), 229.
  40. Gaber, T., S. Abdelwahab, M. Elhoseny, and A. E. Hassanien. 2018. Trust-based secure clustering in WSN-based intelligent transportation systems. Comput. Netw., 146, 151 -158.
  41. Das, B. B., and S. K. Ram. (2016). Localization using beacon in wireless sensor networks to detect faulty nodes and accuracy improvement through DVHop algorithm,'' in Proc. Int. Conf. Inventive Comput. Technol., (ICICT), 1, 1 -5.
  42. Rathee, M., Kumar, S., Gandomi, A. H.; Dilip, K., Balusamy, B., Patan, R. (2019). Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks. IEEE Transactions on Engineering Management, 1 -13.
  43. Priyanka R, K. S. Reddy. (2022). GT-PSO- An Approach For Energy Efficient Routing in WSN. International Journal of Computer Science & Network Security (IJCSNS) , 22(4), 17-26.


Other issues:
Vol.13(6)(2022)
Vol.13(5)(2022)
Vol.13(4)(2022)
Archives




Call-for-Papers

Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ TuEngr.com (please see all detail from Instructions for Authors)



Publication and peer-reviewed process:
After the peer-review process, articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.