Generic placeholder image

International Journal of Sensors, Wireless Communications and Control

Editor-in-Chief

ISSN (Print): 2210-3279
ISSN (Online): 2210-3287

Research Article

Energy Enhancement Techniques for Structure-Free Wireless Sensor Network with Encrypted Data

Author(s): Hussain K. Chaiel*, Zainab S.M. Al-Husseini and Khaldun I. Arif

Volume 10, Issue 3, 2020

Page: [402 - 412] Pages: 11

DOI: 10.2174/2210327909666190627155223

Price: $65

Abstract

Background: Nowadays, in military and border surveillance application, the WSNs become an effective part of the command and control system. This requires an efficient type of cryptography. Due to small size requirement, elliptic curve becomes the most suitable for such purpose.

Objective: The encryption operation, in turn, increases the power required to transmit data through the network. The aim of this work is to reduce such power.

Methods: This work suggests three methods to reduce the needed power. The first method is based on spread spectrum technology, which reduces the total number of levels in the network. The second method deals with algorithm used to choose the sensing node, while the third method suggests a cost function related directly to the available energy.

Results: Computer simulation tests show a reduction in the required energy by 40% when we apply the first method, while the second and third methods together reduce the energy by 12% of the total value of the whole network.

Conclusion: The energy required to transmit encrypted data can be reduced with the aid of routing algorithms. These algorithm increase the coverage radius of the node transmission.

Keywords: Wireless Sensor Networks (WSNs), structure-free, spread spectrum, Diffie-Hellman Elliptic Curves (DHEC), elliptic curve cryptography, computer simulation tests.

Graphical Abstract

[1]
Stojmenov I. Handbook of sensor networks algorithms and architectures. 1st ed. US: John Wiley & Sons, Inc. 2005.
[http://dx.doi.org/10.1002/047174414X]
[2]
Yick J, Mukherjee B, Ghosaal D. Wireless sensor network survey. Comput Netw 2008; 52(12): 2229-30.
[http://dx.doi.org/10.1016/j.comnet.2008.04.002]
[3]
Fermman S. Building wireless sensor networks- Application to routing and data diffusion, 1st ISTE press. Elsevier 2018.
[4]
Kuo Y, Li Ch. Design of a wireless sensor network-Based IoT platform for wide area and heterogeneous applications. IEEE Sens J 2018; 18(12): 5187-97.
[5]
Thayananthan V, Alzraanhi A. Enhancement of energy conservation technologies in wireless sensor network. Proc Comput Sci 2014; 34(1): 79-86.
[http://dx.doi.org/10.1016/j.procs.2014.07.052]
[6]
Amin F, Zubair M. Energy efficient clustering scheme for multipoint wireless sensor network. Proceedings IEEE International Multi-topic Conference (CINMT). Karachi, Pakistan.
[7]
Verma V, Singh S, Pathak N. Optimized battery models observation for static distance vector and on-demand based routing protocols over 802.11 enabled wireless sensor networks. Wireless Pers Commun 2015; 81(2): 503-17.
[8]
Tuba E, Simian D, Dolcanin E. Energy efficient sink placement in wireless sensor network by brain storm optimization algorithm. 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus
[9]
Jovanovic R, Bayram I, Vob S. Solving 2-connected m-dominating set problem using a GRASP approach for application in power systems. 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018), Doha, Qatar.
[10]
Liao W, Kao Y, Fan CH. Data aggregation in wireless sensor network using ant colony algorithm. J Netw Comput Appl 2008; 31(4): 387-401.
[http://dx.doi.org/10.1016/j.jnca.2008.02.006]
[11]
Afsar M, Mohmmad H, Tayarani N. Clustering in sensor networks: A literature survey. J Netw Comput Appl 2014; 46(11): 198-226.
[http://dx.doi.org/10.1016/j.jnca.2014.09.005]
[12]
Singh S, Sharma S. A survey on cluster based routing protocols in wireless sensor networks. Proc Comput Sci 2015; 45(1): 687-95.
[http://dx.doi.org/10.1016/j.procs.2015.03.133]
[13]
Fan K, Liiu SH, Shinha P. Structure-free data aggregation in sensor networks. IEEE T Mobile Comput 2007; 6(8): 929-42.
[14]
Chao CH, Hsiao T. Design of structure-free and energy-balanced data aggregation in wireless sensor networks. J Netw Comput Appl 2013; 37(1): 229-39.
[15]
Lu Y, Kuonen P, Hirsbrunner B. Benefits of data aggregation on energy consumption in wireless sensor network. IET Commun 2016; 11(8): 1216-23.
[16]
Sumen S, Sikdarm D, Roy S. A comparative study on routing schemes of IP based wireless sensor network. Proceedings of International Conference on Wireless and Optical Communication Networks (WOCN). Indore, India.
[17]
Mohnty P, Kabaat M. Energy efficient structure-free data aggregation and delivery in WSN. Egypt Inform J 2016; 17(3): 273-84.
[18]
Lee J, Kapitanov K, Son S. The price of security in wireless sensor networks. Comput Netw 2010; 34(17): 2967-78.
[http://dx.doi.org/10.1016/j.comnet.2010.05.011]
[19]
Pieetro R, Maciini L, Soriento C. Data security in unattended wireless sensor networks. IEEE T Comput 2009; 58(11): 1500-11.
[20]
Panda M. Data security in wireless sensor networks via AES algorithm. Proceedings IEEE 9th International Conference on Intelligent Systems and Control (ISCO), 2015 Coimbatore, India 2015.
[http://dx.doi.org/10.1109/ISCO.2015.7282377]
[21]
Singh S, Verma V, Pathak N. Sensor augmentation influence over trust and reputation models realization for dense wireless sensor networks. IEEE Sensors J 2015; 15(11): 6248-54.
[22]
Candino F, Ferroro R, Montrucchio B. Fast hierarchical key management scheme with transitory mater key wireless sensor networks. IEEE Internet Things J 2016; 3(6): 1334-45.
[http://dx.doi.org/10.1109/JIOT.2016.2599641]
[23]
Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wirel Commun 2004; 11: 62-7.
[http://dx.doi.org/10.1109/MWC.2004.1269719]
[24]
Zhang XI, Ma SH, Hn D. Implementation of elliptic curve Diffie- Hellman key agreement scheme on IRIS nodes. Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things,Harbin, China
[http://dx.doi.org/10.1109/ICAIOT.2015.7111560 ]
[25]
Liu Z, Huang XI, Hu Z. On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE T Depend Secure 2016; 14(3): 237-48.
[26]
Kozil B, Azarderkhsh R, Jao D. On secure implementation of quantum-resistant super singular isogency Diffie-Hellman. .2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA
[http://dx.doi.org/10.1109/HST.2017.7951824]
[27]
Hossaini MS, Saeedi E, Kong Y. Parallel point multiplication architecture using combined group operations for high speed cryptographic applications. Plos One 2017; 12(5): 1-18.
[28]
Liu Z, Liu D, Zou X. An efficient and flexible hardware implementation of the du-al-field elliptic curve cryptography processor. IEEE T Ind Electron 2017; 64(3): 2353-62.
[29]
Florees L, Sandovl M, Cumplido R. Compact FPGA hardware architecture for public key encryption in embedded devices. Plos One 2018; 13(51): 1-12.
[30]
Torrieri D. Principles of spread spectrum communication systems. 4th ed. Springer 2018.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy