Skip to main content

A Lightweight Security and Energy-Efficient Clustering Protocol for Wireless Sensor Networks

  • Conference paper
  • First Online:
Ad Hoc Networks (ADHOCNETS 2018)

Abstract

Most applications based on wireless sensor networks (WSN) have devices with constraints of limited energy and computational/storage capabilities. The traditional security mechanisms are not desirable to these applications. A lightweight security and energy-efficient clustering protocol was proposed in this paper to solve the security problem in the clustering-based sensor networks. Firstly, a lightweight security algorithm is proposed to meet the security requirements, which reduces the communication overload by using the transmission key index. Secondly, in the process of clustering, the base station (BS) and cluster head (CH) use lightweight authentication procedure to verify the identities hierarchically, to reduce the risk of attacks from malicious nodes posing as BS or CH. Thirdly, the proposed protocol is analyzed in the aspects of security and energy consumption. Simulation results show that the proposed protocol not only enhances the network security but also improves the energy efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference System Sciences, pp. 10–15 (2000)

    Google Scholar 

  2. Rahayu, T.M., Lee, S.G., Lee, H.J.: Survey on LEACH-based security protocols. In: Advanced Communication Technology (ICACT), pp. 304–309 (2014)

    Google Scholar 

  3. Zhu, S., Setia, S., Jajodia, S.: LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500–528 (2006)

    Article  Google Scholar 

  4. Ferreira, A.C., Vilaça, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3420, pp. 449–458. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31956-6_53

    Chapter  Google Scholar 

  5. Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: SecLEACH-A random key distribution solution for securing clustered sensor networks. In: Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, pp. 145–154 (2006)

    Google Scholar 

  6. El_Saadawy, M., Shaaban, E.: Enhancing S-LEACH security for wireless sen-sor networks. In: 2012 IEEE International Conference on Electro/Information Technology (EIT), pp. 1–6 (2012)

    Google Scholar 

  7. Jolfaei, A., Wu, X.W., Muthukkumarasamy, V.: A secure lightweight texture encryption scheme. In: Huang, F., Sugimoto, A. (eds.) PSIVT 2015. LNCS, vol. 9555, pp. 344–356. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30285-0_28

    Chapter  Google Scholar 

  8. Paverd, A.J., Martin, A.P.: Hardware security for device authentication in the smart grid. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol. 7823, pp. 72–84. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38030-3_5

    Chapter  Google Scholar 

  9. Wu, X.-W., Yang, E.-H., Wang, J.: Lightweight security protocols for the internet of things. In: Proceedings of the 28th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2017), Montreal, Canada, 8–13 October 2017

    Google Scholar 

  10. Yang, E.H., Wu, X.-W.: Information-theoretically secure key generation and management. In: Proceedings of 2017 IEEE International Symposium on Information Theory, pp. 1529–1533 (2017)

    Google Scholar 

  11. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)

    Article  Google Scholar 

Download references

Acknowledgement

This research is supported by Science Foundation of Fujian Province (No. 2015J01267), Training Program of FuJian Excellent Talents in University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin-Wen Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, G., Wu, XW. (2019). A Lightweight Security and Energy-Efficient Clustering Protocol for Wireless Sensor Networks. In: Zheng, J., Xiang, W., Lorenz, P., Mao, S., Yan, F. (eds) Ad Hoc Networks. ADHOCNETS 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 258. Springer, Cham. https://doi.org/10.1007/978-3-030-05888-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05888-3_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05887-6

  • Online ISBN: 978-3-030-05888-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy