Secure Data Collection in Clustered Wireless Sensor Networks using Fuzzy based scheme to detect Malicious Data Collector

Secure Data Collection in Clustered Wireless Sensor Networks using Fuzzy based scheme to detect Malicious Data Collector

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-11
Year of Publication : 2022
Authors : Y. Akshatha, A. S. Poornima, M. B. Nirmala
DOI : 10.14445/22315381/IJETT-V70I11P226

How to Cite?

Y. Akshatha, A. S. Poornima, M. B. Nirmala, "Secure Data Collection in Clustered Wireless Sensor Networks using Fuzzy based scheme to detect Malicious Data Collector," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 240-248, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I11P226

Abstract
Energy efficiency in a resource-constrained network like Wireless Sensor Network is one of the essential goals to be met for the successful adaptability of any new scheme proposed. Secure Data collection is one of the critical tasks in the wireless sensor network. This paper address a novel energy-efficient scheme for secure data collection in the clustered wireless sensor network. The proposed scheme ensures the confidentiality of the data from the point it is sensed until it reaches the central point, that is Base station. Also, the scheme offers a lightweight authentication method to detect malicious data collectors. The proposed authentication scheme first classifies the node using Fuzzy logic. If a classification is inconclusive, it invokes second-level authentication using ECC public key cryptosystem. The experimental results show that around 50% of the time, during multiple MDC visits, it is possible to complete the authentication without using second-level authentication, which involves computing intense cryptographic algorithms. Also, the time complexity experiments reveal that ECC-based authentication is efficient in terms of involved computations.

Keywords
Authentication, Mobile data Collector, Fuzzy rule, Malicious Node, Clustered WSN.

Reference
[1] Ari A.A.A, Gueroui A, Labraoui N and Yenke B.O, “Concepts and Evolution of Research in the Field of Wireless Sensor Networks,” International Journal of Computer Networks & Communications, vol. 7, no. 1, pp. 81-98, 2015. Crossref, https://doi.org/10.48550/arXiv.1502.03561
[2] Rawat P, Singh K.D, Chaouchi H and Bonnin J.M, “Wireless Sensor Networks: A Survey on Recent Developments and Potential Synergies,” The Journal of Supercomputing, vol. 68, pp. 1-48, 2014. Crossref, https://doi.org/10.1007/s11227-013-1021-9
[3] Srinivasa Rao, P.C. and Banka H, “Energy Efficient Clustering Algorithms for Wireless Sensor Networks: Novel Chemical Reaction Optimization Approach,” Wireless Networks, vol. 23, pp. 433-452, 2017. Crossref, https://doi.org/10.1007/s11276-015-1156-0
[4] Pratyay Kuila and Prasanta K. Jana, “A Novel Differential Evolution Based Clustering Algorithm for Wireless Sensor Networks,” Applied Soft Computing, vol. 25, pp. 414-425, 2014. Crossref, https://doi.org/10.1016/j.asoc.2014.08.064
[5] Liu Y, Xiong N, Zhao Y, Vasilakos A. V, Gao J and Jia Y, “Multi-Layer Clustering Routing Algorithm for Wireless Vehicular Sensor Networks,” IET Communications, vol. 4, no. 7, pp. 810-816, 2010 Crossref, https://doi.org/10.1049/iet-com.2009.0164
[6] Mann P.S and Singh S, “Improved Metaheuristic Based Energy-Efficient Clustering Protocol for Wireless Sensor Networks,” Engineering Applications of Artificial Intelligence, vol. 57, pp. 142-152, 2017. Crossref, https://doi.org/10.1016/j.engappai.2016.10.014
[7] Diongue D and Thiare O, “ALARM: An Energy Aware Sleep Scheduling Algorithm for Lifetime Maximization in Wireless Sensor Networks,” In Proceedings of the 2013 IEEE Symposium on Wireless Technology and Applications (ISWTA), Kuching, Malaysia, pp. 74-79, 2013. Crossref, https://doi.org/10.1109/ISWTA.2013.6688821
[8] Li G, Chen H, Peng S, Li X, Wang C, Yu S and Yin P, “A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks,” Sensors, vol. 18, no. 8, pp. 2487, 2018. Crossref, https://doi.org/10.3390/s18082487
[9] Randhawa S and Jain S, “Data Aggregation in Wireless Sensor Networks: Previous Research, Current Status and Future Directions,” Wireless Personal Communications, vol. 97, pp. 3355-3425, 2017. Crossref, https://doi.org/10.1007/s11277-017-4674-5
[10] Jung W. S, Lim K. W, Ko Y. B and Park S. J, “Efficient Clustering-Based Data Aggregation Techniques for Wireless Sensor Networks,” Wireless Networks, vol. 17, no. 5, pp. 1387-1400, 2011. Crossref, https://doi.org/10.1007/s11276-011-0355-6
[11] Paul, T., Stanley and K. G, “Data Collection from Wireless Sensor Networks Using a Hybrid Mobile Agent Based Approach,” In Proceedings of the 2014 IEEE 39th Conference on Local Computer Networks (LCN2014), pp. 288-295, 2014. Crossref, https://doi.org/10.1109/LCN.2014.6925783
[12] Gupta G. P, Misra M and Garg K, “Energy and Trust-Aware Mobile Agent Migration Protocol for Data Aggregation in Wireless Sensor Networks,” Journal of Network and Computer Applications, vol. 41, pp. 300-311, 2014. Crossref, https://doi.org/10.1016/j.jnca.2014.01.003
[13] Dong M, Ota K, Yang L. T, Chang S, Zhu H and Zhou Z, “Mobile Agent-Based Energy-Aware and User Centric Data Collection in Wireless Sensor Networks,” Computer Networks, vol. 74, pp. 58-70, 2014. Crossref, https://doi.org/10.1016/j.comnet.2014.06.019
[14] Ang K.L.M, Seng J.K.P and Zungeru A.M, “Optimizing Energy Consumption for Big Data Collection in Large-Scale Wireless Sensor Networks With Mobile Collectors,” IEEE Systems Journal, vol. 12, no. 1, pp. 616-626, 2018. Crossref, https://doi.org/10.1109/JSYST.2016.2630691
[15] Takaishi D, Nishiyama H, Kato N and Miura R, “Toward Energy Efficient Big Data Gathering in Densely Distributed Sensor Networks,” IEEE Transactions on Emerging Topics in Computing, vol. 2, no. 3, pp. 388-397, 2014. Crossref, https://doi.org/10.1109/TETC.2014.2318177
[16] Di Francesco M, Das S.K and Anastasi G, “Data Collection Wireless Sensor Networks with Mobile Elements: A Survey,” ACM Transactions on Sensor Networks (TOSN), vol. 8, no. 1, pp. 1-31, 2011. Crossref, https://doi.org/10.1145/1993042.1993049
[17] Yogeswari R and Subathra V, “A Survey on Efficient Data Collection in Wireless Sensor Networks,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 9, pp. 2181, 2013.
[18] Eti Walia, Vinay Bhatia and Gurdeep Kaur, "Detection of Malicious Nodes in Flying Ad-HOC Networks (FANET)," SSRG International Journal of Electronics and Communication Engineering, vol. 5, no. 9, pp. 6-12, 2018. Crossref, https://doi.org/10.14445/23488549/IJECE-V5I9P102
[19] Poornima A. S, and B. B. Amberker, “Secure Data Collection using Mobile Data Collector in Clustered Wireless Sensor Networks,” IET Wireless Sensor Systems, vol. 1, no. 2, pp. 85-95, 2011. Crossref, https://doi.org/10.1049/iet-wss.2010.0086
[20] Puthal, Deepak and Bibhudatta Sahoo, “Secure Data Collection and Critical Data Transmission in Mobile Sink WSN,” Secure and Energy-Efficient Data Collection Technique, 2012.
[21] Renold, A. Pravin, and A. Balaji Ganesh, “Energy Efficient, Secure Data Collection with Path-Constrained Mobile Sink in Duty-Cycled Unattended Wireless Sensor Network,” Pervasive and Mobile Computing, vol. 55, pp. 1-12, 2019. Crossref, https://doi.org/10.1016/j.pmcj.2019.02.002
[22] Rajesh, D. Hevin, and B. Paramasivan, “Fuzzy Logic Based Performance Optimization with Data Aggregation in Wireless Sensor Networks,” Procedia Engineering, vol. 38, pp. 3331-3336, 2012. Crossref, https://doi.org/10.1016/j.proeng.2012.06.385
[23] Yang, Hongyu, Xugao Zhang and Fang Cheng, “A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks,” Mobile Networks and Applications, vol. 26, pp. 1564-1573, 2021. Crossref, https://doi.org/10.1007/s11036-019-01492-4
[24] Prathap, U., P. Deepa Shenoy and K. R. Venugopal, “CMNTS: Catching Malicious Nodes with Trust Support in Wireless Sensor Networks,” In 2016 IEEE Region 10 Symposium (TENSYMP), IEEE, pp. 77-82, 2016. Crossref, https://doi.org/10.1109/TENCONSpring.2016.7519381
[25] Nadeem, Aamer and M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms,” In 2005 International Conference on Information and Communication Technologies, IEEE, pp. 84-89. 2005. Crossref, https://doi.org/10.1109/ICICT.2005.1598556
[26] Doomun, M. Razvi and K. M. S. Soyjaudah, “Analytical Comparison of Cryptographic Techniques for Resource-Constrained Wireless Security,” International Journal of Network Security, vol. 9, no. 1, pp. 82-94, 2009.
[27] Kapoor, Vivek, Vivek Sonny Abraham and Ramesh Singh, “Elliptic Curve Cryptography,” Ubiquity, vol. 9 no. 20, pp. 1-8, 2008. Crossref, https://doi.org/10.1145/1386853.1378356
[28] Wang F and Liu, J, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 673-687, 2011. Crossref, https://doi.org/10.1109/SURV.2011.060710.00066
[29] Korada Kishore Kumar and Konni Srinivasa Rao, "An Efficient users Authentication and Secure Data Transmission of Cluster-based Wireless Sensor Network," SSRG International Journal of Computer Science and Engineering, vol. 5, no. 1, pp. 1-5, 2018. Crossref, https://doi.org/10.14445/23488387/IJCSE-V5I1P101
[30] Shu, Tao, Marwan Krunz, and Sisi Liu, “Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes,” IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 941-954, 2010. Crossref, https://doi.org/10.1109/TMC.2010.36
[31] Zhang, Ping, Shaokai Wang, Kehua Guo and Jianxin Wang, “A Secure Data Collection Scheme Based on Compressive Sensing in Wireless Sensor Networks,” Ad Hoc Networks, vol. 70, pp. 73-84, 2018. Crossref, https://doi.org/10.1016/j.adhoc.2017.11.011
[32] W.R.Heinzelman, A.Chandrakasan, and H.Balakrishnan, “Energy Efficient Communication Protocol for Wireless Micro Sensor Networks,” In Proceedings of IEEE Hawaii International Conference on System Sciences, vol. 2, pp. 10, 2000. Crossref, https://doi.org/10.1109/HICSS.2000.926982
[33] Dindayal Mahto and Dilip Kumar Yadav, “Performance Analysis of RSA and Elliptic Curve Cryptography,” International Journal of Network Security, vol. 20, no. 4, pp. 625-635, 2018. Crossref, https://doi.org/10.6633/IJNS.201807
[34] Jain S, Shah R.C, Brunette W and Borriello G, Roy S, “Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks,” Mobile Networks and Applications, vol. 11, pp. 327-339, 2006. Crossref, https://doi.org/10.1007/s11036-006-5186-9
[35] Mukherjee R, Roy S and Das A, “Survey on Data Collection protocols in Wireless Sensor Networks using Mobile Data Collectors,” In Proceedings of the IEEE 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 632-636, 2015.