Abstract
Wireless sensor network (WSN) is facing many issues due to implementation in vulnerable environments. Various researchers have already defined systems for data transmission with WSN, still such system has high data loss issues, maximum packet delay as well as packet overhead during the data transmission. Different parameters have been considered to improve such losses like cluster network generation, data aggregation, secure data encryption, and data transmission using distribution approach that produces effective outcome and eliminates such issues. Moreover implementation with cluster network and selection of a Cluster Head (CH) based on trust, which produces much effective results and provides flexibility to system. In this research, we propose a secure data transmission in cluster network and investigate the Quality of Service (QoS) parameters using various experimental analysis. Initially, we create different clusters with collaboration of multisensor nodes while each node consists of individual battery power as energy. We calculate the trust of each node and define a CH based on the highest energy, Data Aggregation (DA) and Broadcast Tree Construction (BTC) are the two different techniques that have been used to eliminate network lifetime or cut generation in the network during data transmission. In partial experiment, analysis system shows improved QoS parameters like throughput, delay, packet overhead, etc., respectively. It also enhances the network life because of proposed energy conservation approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Gohil Y, Sakhreliya S, Menaria S (2013) A review on: detection and prevention of wormhole attacks in MANET. Int J Sci Res Publ 3(2)
Upadhyay V, Shukla R (2013) An assessment of wormhole attack over mobile ad-hoc network as serious threats. Int J Adv Netw Appl 5(1)
Sharma D, Kumar V, Kumar R (2015) Prevention of wormhole attack using identity based signature scheme in MANET. Comput Intel Data Min 2. Volume 411 of the series Advances in intelligent systems and computing, pp 475–485. Springer, 10 Dec 2015
Zamani E, Soltanaghaei M (2016) The improved overhearing backup AODV protocol in MANET. J Comput Netw Commun 2016, Article ID 6463157, 8 pp
Kumar A, Shekhawat SS (2015) A parameter estimation based model for wormhole preventive route optimization. IJCSMC 4(8):80–85
Jain AK, Verma R (2015) Trust-based solution for wormhole attacks in mobile ad hoc networks. Glob J Multidiscip Stud 4(12)
Patel R, Patel A, Patel N (2015) Defending against wormhole attack in MANET. In: Fifth international conference on communication systems and network technologies. IEEE
Patel D, Trivedi P, Potdar MB (2015) A brief analysis on detection and avoidance techniques of wormhole attack in MANET. Int J Comput Appl 117(16)
Biswas J, Gupta A, Singh D (2014) WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: 9th international conference on industrial and information systems (ICIIS), 2014. IEEE
Raghuwanshi K, Saxena A, Manoria M (2015) An enhanced integrated solution for identification and elimination of wormhole attack in MANET. Int J Comput Appl 110(7)
Uddin MA, Islam MM, Khanom R, Mosaddek M. Efficient and secure cluster based routing protocol for wireless sensor network
Ouafaa I, Mustapha E, Salah-Ddine K, Said EH (2016) Performance analysis of SLEACH, LEACH and DSDV protocols for wireless sensor networks (WSN). J Theor Appl Inf Technol 94(2). 2016 Dec 31
Upadhyay R, Bhatt UR, Tripathi H (2016) DDOS attack aware DSR routing protocol in WSN. Proc Comput Sci 78(C):68–74
Hu F, Hao Q, Bao K (2014) A survey on software-defined network and OpenFlow: from concept to implementation. IEEE Commun Surv Tutor 16:2181–2206
Gante AD, Aslan M, Matrawy A (2014) Smart wireless sensor network management based on software-defined networking. In: Proceedings of the 2014 27th Biennial Symposium on Communications (QBSC), Kingston, ON, Canada, 1–4 June 2014, pp 71–75
Olivier F, Carlos G, Florent N (2015) SDN based architecture for clustered WSN. In: Proceedings of the 2015 9th international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Blumenau, Brazil, pp 342–347, 8–10 July 2015
De Oliveira BT, Margi CB, Gabriel LB (2015) TinySDN: enabling multiple controllers for software-defined wireless sensor networks. IEEE Lat Am Trans 13:3690–3696
Tootoonchian A, Ghobadi M, Ganjali Y (2010) OpenTM: traffic matrix estimator for OpenFlow networks. In: Proceedings of the international conference on passive and active network measurement, Zurich, Switzerland, 7–9 April 2010. Springer, Berlin, pp 201–210
Jain R, Paul S (2013) Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun Mag 51:24–31
Zhou J, Jiang H, Wu J, Wu L, Zhu C, Li W (2016) SDN-based application framework for wireless sensor and actor networks. IEEE Access 4:1583–1594
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sall, S., Bansode, R. (2021). Secure Data Aggregation and Data Transmission Using HMAC Protocol in Cluster Base Wireless Sensor Network. In: Balas, V.E., Semwal, V.B., Khandare, A., Patil, M. (eds) Intelligent Computing and Networking. Lecture Notes in Networks and Systems, vol 146. Springer, Singapore. https://doi.org/10.1007/978-981-15-7421-4_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-7421-4_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7420-7
Online ISBN: 978-981-15-7421-4
eBook Packages: EngineeringEngineering (R0)