Abstract
Accomplishing a robust security features to resists lethal attacks is still an open research area in wireless sensor network. The present paper review existing security techniques to find that there is still a trade-off between cryptographic-based security incorporations and communication performance. Moreover, we have identified that majority of the existing system has not emphasized on first line of defense i.e. security the route discovery process that can act as a firewall for all forms of illegitimate nodes existing in the network. The proposed study introduced RASK i.e. Request Authentication using Shared Key, which is a novel concept developed using simple quadratic formulation of generating keys for encrypting the message during data aggregation. The study outcome has been significantly benchmarked with recent studies and existing cryptographic standards to find RASK outperform existing techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hesselbach, J., Herrmann, C.: Glocalized Solutions for Sustainability in Manufacturing. Springer, Heidelberg (2011)
Athawale, R.P., Rana, J.G.: Wireless sensor network based environmental temperature monitoring system. In: International Conference on Information Engineering, Management, and Security (2015)
Mostafa, M., Azim, A., Jiang, X.: Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications, 279 p. CRC Press, Boca Raton (2015). Computers
Cagn Gungor, V., Hancke, G.P.: Industrial Wireless Sensor Networks: Applications, Protocols, and Standards. CRC Press, Boca Raton (2013)
Kumari, J., Prachi: A comprehensive survey of routing protocols in wireless sensor networks. In: 2nd IEEE-International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 325–330 (2015)
El-Aaasser, M., Ashour, M.: Energy aware classification for wireless sensor networks routing. In: 15th IEEE-International Conference on Advanced Communication Technology (ICACT), PyeongChang, pp. 66–71 (2013)
Chitnis, M., Pagano, P., Lipari, G., Liang, Y.: A survey on bandwidth resource allocation and scheduling in wireless sensor networks. In: IEEE-International Conference on Network-Based Information Systems, Indianapolis, IN, pp. 121–128 (2009)
Chelli, K.: Security issues in wireless sensor networks: attacks and countermeasures. In: Proceedings of the World Congress on Engineering (2015)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2006)
Wu, J., Ota, K., Dong, M., Li, C.: A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4, 2169–3536 (2016)
Fayed, N.S., Daydamoni, E.M., Atwan, A.: Efficient combined security system for wireless sensor network. Egypt. Inf. J. 13(3), 185–190 (2012)
Khan, S.U., Pastrone, C., Lavagno, L., Spirito, M.A.: An authentication and Key establishment scheme for the IP-based wireless sensor networks. Procedia Comput. Sci. 10, 1039–1045 (2012)
Cheikhrouhou, O., Koubâa, A., Dini, G., Alzaid, H., Abid, M.: LNT: a logical neighbor tree for secure group management in wireless sensor networks. Procedia Comput. Sci. 31(5), 198–207 (2011)
Guermazi, A., Abid, M.: An efficient key distribution scheme to secure data-centric routing protocols in hierarchical wireless sensor networks. Procedia Comput. Sci. 5, 208–215 (2011)
The Keccak Sponge Function Family. http://keccak.noekeon.org/. Retrieved 8 Feb 2017
Roy, S., Das, A.K.: Secure hierarchical routing protocol (SHRP) for wireless sensor network. In: Mauri, J.L., Thampi, S.M., Rawat, D.B., Jin, D. (eds.) SSCC 2014. CCIS, vol. 467, pp. 20–29. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44966-0_3
Tang, D., Li, T., Ren, J., Wu, J.: Cost-aware secure routing (CASER) protocol design for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26, 960–973 (2013)
Zheng, L.-Z., Gao, L., Yu, T.-G.: An energy-balanced clustering algorithm for wireless sensor networks based on distance and distribution. In: Qi, E. (ed.) Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation, pp. 229–240. Atlantis Press, Paris (2016). doi:10.2991/978-94-6239-145-1_23
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Metan, J., Narasimha Murthy, K.N. (2017). RASK: Request Authentication Using Shared Keys for Secured Data Aggregation in Sensor Network. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-57141-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57140-9
Online ISBN: 978-3-319-57141-6
eBook Packages: EngineeringEngineering (R0)