energy efficient data transmission schemes in wireless sensor networks

4

Click here to load reader

Upload: irjie

Post on 14-Sep-2015

7 views

Category:

Documents


1 download

DESCRIPTION

Efficient utilization of energy and security has been a core area of research in wireless sensor networks. Sensor nodes usedin a network are battery operated having low power capabilities. Batteries of these nodes cannot be recharged frequently inthe field setting, so energy optimization becomes paramount in increasing the battery-life and, consequently, the networklifetime. To design a secure sensor network, that has low energy consumption, is a challenging issue. In this paper, we willstudy about energy-efficient security protocols which provide strong security and decreases energy consumption.

TRANSCRIPT

  • ISSN: 2395-0560 International Research Journal of Innovative Engineering

    www.irjie.com Volume1, Issue 4 of April 2015

    __________________________________________________________________________________________2015 ,IRJIE-All Rights Reserved Page -1

    Energy Efficient Data Transmission Schemes in Wireless Sensor Networks

    Shilpy Ghai1, Prof. V.K.Katiyar2

    1M.M.Engineering College, Maharishi Markandeshwar University, Mullana, Haryana, India (Research Scholar) 2M.M.Engineering College, Maharishi Markandeshwar University, Mullana, Haryana, India (Professor, CSE Department)

    Abstract: Efficient utilization of energy and security has been a core area of research in wireless sensor networks. Sensor nodes used in a network are battery operated having low power capabilities. Batteries of these nodes cannot be recharged frequently in the field setting, so energy optimization becomes paramount in increasing the battery-life and, consequently, the network lifetime. To design a secure sensor network, that has low energy consumption, is a challenging issue. In this paper, we will study about energy-efficient security protocols which provide strong security and decreases energy consumption.

    Keywords: wireless sensor networks, sensor nodes, transmission, security, energy efficiency. Introduction A Wireless Sensor Network consists of a large number of sensors, each of which are physically small devices, and are equipped with the capability of sensing the physical environment, data processing, and communicating wirelessly with other sensors. Generally, we assume that each sensor in a wireless sensor network has certain constraints with respect to its energy source, power, memory, and computational capabilities.

    Wireless Sensor Networks (WSN) has emerged as one of the most exciting fields in Computer Science research over decades. Processors with on-board sensors are said to be nearing the size of a dust. Applications of WSN include military surveillance, habitat monitoring, structural monitoring and medical and health etc. Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. Several such wireless sensors in a region self-organize and form a WSN. Information based on sensed data can be used in agriculture and livestock, driving or even in providing security at home or in public places. A key requirement from both the technological and commercial point of view is to provide adequate security capabilities. Fulfilling privacy and security requirements in an appropriate architecture for WSNs offering pervasive services is essential for user acceptance. Five key features need to be considered when developing WSN solutions: scalability, security, reliability, self-healing and robustness. The security in wireless sensor networks (WSNs) is a critical issue due to the inherent limitations of computational capacity and power usage. Security is broadly used term encompassing the characteristics of authentication, integrity, privacy and non repudiation. The more the dependency on the information provided by the networks has been increased, the more the risk of secure transmission of information over the network has increased. For the secure transmission of various types of information over networks, several cryptographic, steganographic and other techniques are used.

    Review of literature In this paper, author explores various security issues in wireless sensor networks and tries to give a comparative note of various existing security approaches. Their contribution is therefore to provide a detailed yet concise analysis of various existing techniques which will enable the WSN implementers to approach security in an organised way [1].

    In this paper, therefore, it is proposed that a key establishment and a data encryption scheme for secure and energy-efficient data transmission in WSNs be used. The key establishment scheme is an advanced hybrid key establishment scheme which has not only the efficiency of using a unique secret key but also the security of using a random key of each pair nodes. The data encryption scheme which is suitable for WSNs uses only exclusive-OR (XOR) operation, message authentication code (MAC), and time-spacing key derivation function (TSDF) for efficiency and security [2]. This paper investigates the coalition-based cooperative data transmission mechanism (CCDTM), analyzes its entire energy consumption, and finds out the optimal number of sensor nodes needed in the cooperative data transmission. The condition under which CC-DTM is more energy-saving than the cluster approach is also deduced. Furthermore, an energy-load balanced node selection strategy is proposed. The results of simulation experiment show the validity of this energy efficient data transmission mechanism.

  • ISSN: 2395-0560 International Research Journal of Innovative Engineering

    www.irjie.com Volume1, Issue 4 of April 2015

    __________________________________________________________________________________________2015 ,IRJIE-All Rights Reserved Page -2

    In this paper, we analyze the entire energy consumption of coalition-based data transmission, including the part of date aggregation and broadcasting, compare the result with cluster approach, and draw some conclusions. Furthermore, an energy-load balanced node selection strategy is proposed [3]. This paper presents a password-based authenticated key agreement protocol that allows mutual authentication and secure data transmission between sensor network and user. The protocol is well-suited in the resource-constrained sensor nodes, secure and efficient compared to related security protocols in sensor networks. In this paper, the author designs a protocol for WSN that provides mutual authentication and secures data transmission between communicating entities. The design of protocol uses public key operations in such as way that the sensor node requires to compute only one public key operation to establish an authenticated session key for securing data transmissions [4]. In this paper, an improved energy-efficient security scheme is proposed for resource constrained sensor networks. The proposed scheme provides an improved security mechanism to detect energy consuming and useless packets that enemy injects into sensor network. Also, in this paper we present a simple wormhole detection for better security [5]. This paper mainly focus on minimizing end to end latency and energy efficiency as primary design objectives of routing protocols for WSN without overshadowing the other design factors. We present a survey of low latency, energy efficient and time critical routing protocols. TEEN (Threshold - sensitive Energy Efficient sensor Network protocol), a reactive network protocol which is well suited for time critical data sensing applications is quite efficient in terms of energy consumption and response time. APTEEN (Adaptive Periodic Threshold sensitive Energy Efficient sensor Network protocol), a hybrid network protocol which gives the overall picture of the network at periodic intervals in a very energy efficient manner. SPEED is a Stateless, highly efficient and scalable protocol for sensor networks which achieves end to end soft real time communication by maintaining a desired delivery speed across the network through a novel combination of feedback control and non deterministic geographic forwarding. RAP, a real -time communication architecture for large scale sensor networks which significantly reduces the end to end latency by using Velocity Monotonic Scheduling (VMS). RPAR, Real Time Power Aware Routing Protocol which supports energy efficient real - time communication by dynamically adapting transmission power and routing decisions. We also discuss the advantages and performance issues of each routing protocol [6]. This paper proposed an energy-aware mechanism to determine the most efficient set of packets to be processed according with the resource consumed and the packets delivery requirements. In this paper, the author propose a run-time mechanism to deal with the optimization of security while retaining the possibility to guarantee packet delivery; this is performed by providing an efficient priority-based delivery of packets towards a sink node, while optimizing packet security requirements subject to specific energy constraints. The solution increases WSN nodes lifetime at the cost of security or network latency degradation. Different strategies are used to favour either security or packet delivery. The strategy to be used and the way in which it will be applied depend on specific node energy conditions [7]. In this paper, the author proposed a Distributed and Energy efficient algorithm for Collection of Raw data in sensor networks called DECOR. DECOR exploits spatial correlation to reduce the communication energy in sensor networks with highly correlated data. In this approach, at each neighbourhood, one sensor shares its raw data as a reference with the rest of sensors without any suppression or compression. Other sensors use this reference data to compress their observations by representing them in the forms of mutual differences. In a highly correlated network, transmission of reference data consumes significantly more energy than transmission of compressed data. Thus, author first attempt to minimize the number of reference transmissions. Then, they try to minimize the size of mutual differences. The paper derive analytical lower bounds for both these phases and based on theoretical results, and propose a two step distributed data collection algorithm which reduces the communication energy significantly compared to existing methods. In addition, we modify our algorithm for lossy communication channels and evaluate its performance through simulation [8]. Based on homomorphic encryption technology and the non-repudiation transmission protocol, a novel approach to protect sensor data secure is proposed. Because of fully using symmetric encryption algorithm, the protocol is efficient. Security analysis shows that the proposed protocol can guarantee data end-to-end confidentiality and authentication [9]. It is a practical challenge to provide reliable and efficient communication for data transmission in wireless sensor networks. To recover from packet losses, conventional approaches tried to use retransmission or FEC mechanisms. However, these mechanisms may introduce excessive energy overhead for reliability guarantee. By exploiting the wireless broadcast nature and the node overhearing capability, we propose a novel cooperative communication scheme EECC to improve data transmission performance for wireless sensor networks. In this scheme, cooperative reply is performed at each hop by the best suited node elected from those that have successfully overheard the transmitted packet. EECC is not a routing protocol but rather works as an augment to minimize the impact of packet losses on network performance.

  • ISSN: 2395-0560 International Research Journal of Innovative Engineering

    www.irjie.com Volume1, Issue 4 of April 2015

    __________________________________________________________________________________________2015 ,IRJIE-All Rights Reserved Page -3

    Extensive analytical and experimental results confirm that our scheme is very effective in improving both energy efficiency and end-to-end delay for data transmission in lossy networks [10]. Intrusion detection plays an important role in the area of security in WSN. Detection of any type of intruder is essential in case of WSN. WSN consumes a lot of energy to detect an intruder. Therefore, an algorithm for energy efficient external and internal intrusion detection is derived. This paper also analyse the probability of detecting the intruder for heterogeneous WSN. This paper considers single sensing and multi sensing intruder detection models [11]. This paper proposed a way to apply full encryption to image transmission over WSNs by offloading the computational workload of sensors to a server. Based on the experimental results, the proposed approach can ensure both the higher security level and the energy-efficiency at a sensor with acceptable image quality [12]. This paper focused on the security issue of WSNs and proposed a protocol based on public key cryptography for external agent authentication and session key establishment. The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs [13]. This paper analyzes security requirements in wireless sensor networks and summarizes key issues, attacks and threats that should be solved for achieving the ad hoc security. We also present some secure solutions for achieving the security in wireless sensor networks [14]. SPIN, Sensor Protocol for Information via Negotiation, is one of the widely used efficient routing protocol in WSNs that completely ignores the security aspect. SPIN overcome the performance deficiencies of conventional protocols by implementing data negotiation, nodes communicating with each other about the data that they have send already and also the data they still need to obtain, and resource adaption, that is, nodes monitor and adapting to changes in their own energy resources [15]. This paper mainly propose an alternate routing protocol which routes the data similar to SPIN, but with additional security features. The energy performance characteristics, large number of nodes and percentage of malicious nodes are compared with SPIN and MS-SPIN in NS2. This paper proposes a secure data transmission scheme based on digital watermarking technique. The sensor node calculates the hash value of sensitive data, which collected at two different times. Then, the sensitive data are embedded into the hash value as watermark information according to the digital watermark algorithm. The target node extracts the watermark information from the hash sequence exactly. It calculates the hash value in the same way as source nodes did, and compares to the remaining part of hash sequence which not changed during the extraction operation to verify whether the data have been tampered with. Analysis shows that our scheme can effectively prevent the data eavesdropping and verify whether the data to be tampered with during transmission process [16]. This paper proposed Encompression (encryption + compression) as a strategy to achieve low-energy secure data transmission in sensor networks. This proposal combines, compressive sensing (CS), a powerful and general approach for exploiting sparsity of sensor data, with encryption and integrity checking of the compressively sensed data. This paper presents an evaluation of a hardware implementation of encompression, wherein the CS, encryption, and integrity checking algorithms are realized using a 65-nm CMOS technology. The results also demonstrate that the total sensor node energy consumption with encompression may even be less than the case where neither cryptography nor compression is employed (for a compression ratio of 10, this energy bonus can be upto 14%). These results suggest that the use of CS may be a game changer in enabling state-of-the-art cryptography to be employed in highly energy-constrained sensor networks [17]. This paper proposed a novel scheme for efficiently and securely preserving source nodes location privacy. This scheme uses efficient cryptographic operations to change the packets appearance at each hop to prevent packet correlation. It also creates a cloud with irregular shape of fake traffic to enable the real source node to send its data anonymously to a fake source node to send to the sink and to camouflage the real source node in the nodes creating the cloud. To reduce the energy cost, clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud to reduce the number of fake packets and boost privacy preservation. Simulation and analytical results demonstrate that this scheme can provide stronger privacy preservation than routing-based schemes and requires much less energy cost than global-adversary-based schemes [18]. Research methodology To study existing protocols related to security and energy efficiency in Wireless Sensor Networks and propose some mechanisms for data aggregation to reduce redundancy. We will study to design an energy efficient protocol that provides scalable network support on Wireless Sensor Networks. As the energy efficient data transmission increases the lifetime of each sensor node, we will propose a system which provides reliable and secure data transmission. In wireless sensor network, the original message is splitted into packets and then transmitted in form of packets between nodes. For efficient and secure transmission, we will use data compression with tag. In our approach, we first compress the data and then transmit it to the other node. With the help of compression, the energy consumption of the nodes can be decreased because less amount of data will be sent to another node.

  • ISSN: 2395-0560 International Research Journal of Innovative Engineering

    www.irjie.com Volume1, Issue 4 of April 2015

    __________________________________________________________________________________________2015 ,IRJIE-All Rights Reserved Page -4

    Conclusion Security of wireless sensor network is main issue in WSNs. Routing, QoS, Provisioning, energy efficiency, security and multicasting are challenges in wireless sensor networks. We will study to design an energy efficient protocol that provides scalable network support on Wireless Sensor Networks. This paper represents various security issues and energy efficient data transmission so that the life time of each sensor node can be increased. REFERENCES

    1. Kalpana Sharma. (2010). A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks. International Journal of Advanced Science and Technology, Vol. 17.

    2. Sang-Eon Lee. (2008). Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. 7th Computer Information Systems and Industrial Management Applications.

    3. Na Xia. (2008). Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks. International Symposium on Computer Science and Computational Technology.

    4. Manik Lal Das (2008). Efficient User Authentication and Secure Data Transmission in Wireless Sensor Networks. ICON.

    5. Akbar Abbasi. (2009). Better Security for Wireless Sensor Networks, 2009 International Conference on Future Networks.

    6. D.Baghyalakshmi; J. Ebenezer; S.A.V. Satyamurty. (2010). Low Latency and Energy Efficient Routing Protocols for Wireless Sensor Networks, ICWCSC.

    7. A.V Taddeo; A. Ferrante. (2010). Security and Packets Delivery Trade-off for WSN. IEEE CCNC. 8. S.Sharafkandi; David H.C Du; Alireza Razavi. (2010). A Distributed and Energy Efficient Algorithm for Data

    Collection in Sensor Networks. 39th International Conference on Parallel Processing Workshops, pp 571-580. 9. Z. Peng; YU Jian-ping. (2010). Secure Data Aggregation for Sensor Networks. ICSP, pp 1853-1856. 10. W. Fang et al. (2010). Energy-Efficient Cooperative Communication for Data Transmission in Wireless

    Sensor Networks. IEEE Transactions on Consumer Electronics, Vol. 56, No. 4, November2010, pp 2185-2192. 11. Mohamed Mubarak T; et al. (2011). Intrusion detection: An Energy efficient approach in Heterogeneous

    WSN. PROCEEDINGS OF ICETECT 2011, pp 1092-1096. 12. S. Lee; et al. (2011). Secure and Energy-Efficient Image Transmission for Wireless Sensor Networks, IEEE

    Computer Society, pp 137-140. 13. V.C Sekhar; M. Sarvabhatla. (2012). Security in Wireless Sensor Networks with Public Key Techniques.

    International Conference on Computer Communication and Informatics, Jan. 10 12, 2012. 14. Abhishek Jain; Kamal Kant; M. R. Tripathy. (2012). Security Solutions for Wireless Sensor Networks. Second

    International Conference on Advanced Computing & Communication Technologies, pp430-433. 15. L Arivazhagan; R. Kurunjimalar.(2012).Secure Data Transmission Routing Protocol For Multicasting. IEEE-

    International Conference on Advances In Engineering, Science And Management, 2012, pp 586-591. 16. L.Zhou; Z. Zhang. (2012). A Secure Data Transmission Scheme for Wireless Sensor Networks Based on

    Digital Watermarking, 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp 2097-2102.

    17. M. Zhang; etal. (2013). Energy-efficient and Secure Sensor Data Transmission Using Encompression. 26th International Conference on VLSI Design and the 12th International Conference on Embedded Systems, pp 31-36.

    18. M. E Mahmoud; X. Shen. (2012). Secure and Efficient Source Location Privacy-Preserving Scheme for Wireless Sensor Networks. IEEE ICC 2012 - Communication and Information Systems Security Symposium, pp 1123-1127.