| Literature DB >> 26131669 |
Triana Mugia Rahayu1, Sang-Gon Lee2, Hoon-Jae Lee3.
Abstract
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.Entities:
Keywords: ESPDA; LEACH; energy-efficient; secure data aggregation; secure routing protocol; security; wireless sensor network
Year: 2015 PMID: 26131669 PMCID: PMC4541824 DOI: 10.3390/s150715127
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1LEACH protocol.
Figure 2SLEACH protocol.
Figure 3SecLEACH protocol.
Figure 4MS-LEACH protocol.
Figure 5ESPDA protocol.
Figure 6Message flow of the proposed protocol.
Security requirements of the proposed protocol.
| Message | Security Requirements | Type of Message | Remark | |||
|---|---|---|---|---|---|---|
| Data Integrity | Source Authentication | Data Confidentiality | Data Freshness | |||
| Advertisement, | ☑ | ☑ | ☑ | Broadcast | ||
| Join request, | ☑ | ☑ | ☑ | Unicast | ||
| The schedule, pattern seed and mapping permutation, | ☑ | ☑ | ☑ Except for schedule | ☑ | Broadcast | |
| Pattern code, | ☑ | ☑ | ☑ | Unicast | ||
| Notification for the selected nodes, | ☑ | ☑ | ☑ | Broadcast | ||
| Sensor readings, | ☑ | ☑ | ☑ | ☑ | Unicast | |
| Cluster key request, | ☑ | ☑ | ☑ | Unicast | Ours | |
| Cluster key reply, | ☑ | ☑ | ☑ | ☑ | Broadcast | Ours |
Figure 7The proposed protocol.
Protocol security requirements fulfillment.
| Message | Security Requirements | |||
|---|---|---|---|---|
| Data Integrity | Source Authentication | Data Confidentiality | Data Freshness | |
| Digital signature | Digital signature | - | Nonce | |
| MAC | Mutual key | - | Nonce | |
| MAC | Mutual key | - | Counter | |
| Digital signature | Digital signature | Encryption | Counter, timestamp | |
| MAC | Cluster key | Encryption | Counter | |
| MAC | Mutual key | - | Counter, timestamp | |
| MAC | Cluster key | - | Counter | |
| MAC | Mutual key | Encryption | Counter | |
Figure 8Relating each possible attack with the corresponding attacked security property.
Possible attacks addressed, in comparison with other secure routing protocols.
| Possible Attacks Observed | SLEACH | SecLEACH | MS-LEACH | Proposed Protocol |
|---|---|---|---|---|
| Eavesdropping | No | No | Yes | Yes |
| Message tampering | No | No | Yes | Yes |
| Replay | Yes | Yes | Yes | Yes |
| Ordinary nodes impersonation | No | Yes | No | Yes |
| CHs impersonation | Yes | No | Yes | Yes |
| Schedule disruption | No | No | Yes | Yes |
Possible attacks addressed, in comparison with other secure data aggregation protocols.
| Possible Attacks Observed | ESPDA | Proposed Protocol |
|---|---|---|
| Eavesdropping | Yes | Yes |
| Replay | No | Yes |
| CHs impersonation | No | Yes |
| Message tampering | No | Yes |
Assumption for the length of message components.
| Message Component | Length (in bits) | Description |
|---|---|---|
| 16 | Identity of node | |
| 64 | Random number | |
| 480 | Digital signature | |
| 160 | MAC | |
| 64 | Key identifier/index | |
| 64 | TDMA message size | |
| 16 | Pattern code | |
| 32 | Timestamp |
Message size comparison for setup phase.
| Message Type | The Proposed Protocol (in bits) | SLEACH (in bits) | SecLEACH (in bits) | MS-LEACH (in bits) | LEACH (in bits) |
|---|---|---|---|---|---|
| adv a | |||||
| join_req | |||||
| sched b | |||||
| CK_req c | NA | NA | NA | NA | |
| CK_rep c | |||||
| Legitimate_List | NA | 320 | NA | 320 | NA |
| Group_key | NA | 64 | NA | 64 | NA |
a sec_adv in SLEACH and MS-LEACH; b sched_seed_permut in the proposed protocol; c new message type introduced in our protocol; NA = Not Applicable
Message size comparison for data aggregation phase.
| Message Type | The Proposed Protocol (in bits) | ESPDA (in bits) |
|---|---|---|
| 2| | | | |
| (2 + | 2| |
a assuming the simple request message contains the CH’s id and the corresponding selected node’s id.
Communication cost of LEACH in setup phase.
| Step | CH | Ordinary Node | ||
|---|---|---|---|---|
| Tx Cost (in bits) | Rx Cost (in bits) | Tx Cost (in bits) | Rx Cost (in bits) | |
| 1 | 1 × | — | — | 1 × |
| 2 | - | 1 × | ( | |
| 3 | 1 × | — | — | 1 × |
Communication cost of SLEACH in setup phase.
| Step | CH | Ordinary Node | ||
|---|---|---|---|---|
| Tx Cost (in bits) | Rx Cost (in bits) | Tx Cost (in bits) | Rx Cost (in bits) | |
| 1.1 | 1 × | — | — | 1 × |
| 1.2 | — | 1 × | — | 1 × |
| 1.3 | — | 1 × | — | 1 × |
| 2 | — | 1 × | ( | |
| 3 | 1 × | — | — | 1 × |
| Total | 256 | 32 | 32 | 32 |
Communication cost of SecLEACH in setup phase.
| Step | CH | Ordinary Node | ||
|---|---|---|---|---|
| Tx Cost (in bits) | Rx Cost (in bits) | Tx Cost (in bits) | Rx Cost (in bits) | |
| 1 | 1 × | — | — | 1 × |
| 2 | — | 1 × | ( | |
| 3 | 1 × | — | — | 1 × |
Communication cost of MS-LEACH in setup phase.
| Step | CH | Ordinary Node | ||
|---|---|---|---|---|
| Tx Cost (in bits) | Rx Cost (in bits) | Tx Cost (in bits) | Rx Cost (in bits) | |
| 1 | 1 × | — | — | 1 × |
| 1.2 | — | 1 × Legitimate_List = 320 | — | 1 × Legitimate_List = 320 |
| 1.3 | — | 1 × | — | 1 × |
| 2 | — | 1 × | ( | |
| 4 | — | — | ||
Communication cost of the proposed protocol in setup phase and steady state phase.
| Step | CH | Ordinary Node | ||
|---|---|---|---|---|
| Tx Cost (in bits) | Rx Cost (in bits) | Tx Cost (in bits) | Rx Cost (in bits) | |
| 1 | 1 × adv = 560 | — | — | 1 × adv = 560 |
| 2 | — | 1 × join_req = 192 | ( | |
| 3 | 1 × CK_req = 16 | — | — | 1 × CK_req= 16 |
| 4 | — | 1 × CK_rep = 80 | — | 1 CK_rep = 80 |
| 6 | 1 × sched_seed_permut = 368 | — | — | 1 × sched_seed_permut = 368 |
| 7 | — | 1 × pattern_code = 240 | — | |
| 8 | 1 × selected_nodes = 16 | — | — | 1 × selected_nodes = 16 |
| 9 (within cluster) | — | 1 × data = 256 if selected, otherwise 0 | — | |
| 10 (from CH to BS) | 1 × data = 80 | — | — | — |
Communication cost of ESPDA in data aggregation phase.
| Step | CH | Ordinary Node | ||
|---|---|---|---|---|
| Tx Cost (in bits) | Rx Cost (in bits) | Tx Cost (in bits) | Rx Cost (in bits) | |
| 1 | — | 1 × | ( | |
| 3 | — | — | ||
| 5 (within cluster) | — | 1 × | ( | |
| 6 (from CH to BS) | — | — | ||
Comparison of intra-cluster radio transmission expenditure
| Phase | Protocol | Total Expenditure (in bits) |
|---|---|---|
| Setupphase | LEACH | 32 |
| SLEACH | 32 | |
| SecLEACH | 256 | |
| MS-LEACH | 256 | |
| Ours | 288 | |
| Data aggregation phase | Ours | 16 |
| ESPDA | 656 |
Computational cost comparison.
| Phase | Node’s Role | SLEACH | SecLEACH | MS-LEACH | ESPDA | The Proposed Protocol |
|---|---|---|---|---|---|---|
| Setup | CH | NA | ||||
| Ord. Node | ||||||
| Data Aggregation | CH | NA | NA | NA | 0 | |
| Ord. Node |
, : the amount of nodes within a certain cluster and of selected nodes, respectively; NA: Not applicable; (*): if it is selected node.