Abstract
Wireless Sensor Networks (WSNs) is a collection of tiny distributed sensor nodes that have been used to sense the physical parameters of the environment where it has been deployed. Data dissemination is an important activity performed in WSNs in order to administer and manage them. Gossi** makes the network to transmit the same data item multiple times by multiple sensor nodes to their neighbors until they reach the required nodes which are in need of them. These multiple transmissions result in a problem called a Redundant Broadcast Storm Problem (RBSP). Moreover, the RBSP results in too many senders’ problem and also leads to the consumption of more energy in the network. In data dissemination, providing energy efficiency and security are the two major challenging issues. In such a scenario, the attackers may make use of the weakness in security provisions available in the network and they can perform unauthorized activities to disrupt the process of data dissemination. Hence, it is necessary to address the issues of RBSP, energy consumption, security and too many senders problem in order to enhance the reliability and security of communication in WSN for data dissemination. In this paper, a novel protocol named Cluster based Secured Data dissemination Protocol (CSDP) has been proposed for providing energy efficient and secured dissemination of data. The proposed protocol is a distributed protocol which considers the route discovery process, cluster formation, cluster head selection, cluster based routing and security through the design of a new digital signature based authentication algorithm, trust based security enhancement and encryption techniques for effective key management. The major contributions of the proposed work include the proposal of cryptography based public key and private key generation algorithms, techniques for trust score computation and malicious node identification and finally the effective prevention of malicious activities for enhancing the security of the network. Moreover, this work considers node identification techniques for effective clustering of nodes and performs optimal route discovery and secured transmission of packets. This work is novel with respect to multicast based data dissemination protocol, proposal of combined signature generation and verification schemes, encryption based key management and distributed data collection and communication techniques. In addition, an Intelligent Fuzzy based Unequal Clustering algorithm is used to perform effective clustering process and the traffic analyzer to identify the intruders by monitoring the node’s behaviors and their trust values. The proposed protocol has been extensively tested with realistic simulation parameters using NS2 simulator. The simulation results obtained from this work have proved that the proposed protocol improves the level of security through the proposal of a time efficient encryption and decryption algorithm with increase in packet delivery ratio and network throughput and at the same time it reduces the energy consumption as well as delay in data dissemination.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11276-021-02660-9/MediaObjects/11276_2021_2660_Fig10_HTML.png)
Similar content being viewed by others
References
He, D., Chan, S., Tang, S., & Guizani, M. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 26(4), 1129–1139.
De, P., Liu, Y., & Das, S. K. (2008). ReMo: An energy efficient reprogramming protocol for mobile sensor networks. In: Proceedings of the 6th IEEE pervasive computing and communications (pp. 60–69)
Panta, R. K., Khalil, I., & Bagchi, S. (2007). Stream: Low overhead wireless reprogramming for sensor networks. In Proceedings of the 26th IEEE INFOCOM (pp.928–936).
Wang, Q., Zhu, Y., & Cheng, L. (2006). Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network, 20(3), 48–55.
Dong, W., Chen, C., Liu, X., Bu, J., & Gao, Y. (2011). A light weight and density aware reprogramming protocols for wireless sensor networks. IEEE Transactions on Mobile Computing, 10(10), 1403–1415.
Zhang, W., Han, G., Wang, X., Guizani, M., Fan, K., & Shu, L. (2020). A node location algorithm based on node movement prediction in underwater acoustic sensor networks. IEEE Transactions on Vehicular Technology, 69(3), 3166–3178.
Li, H., & Lin, Z. (2017). Study on location of wireless sensor network node in forest environment. Procedia Computer Science, 107, 697–704.
Arora, S., & Singh, S. (2017). Node localization in wireless sensor networks using butterfly optimization algorithm. Arabian Journal of Science and Engineering, 42, 3325–3335.
Dong, W., Chen, C., Liu, X., Teng, G., Bu, J., & Liv, Y. (2012). Bulk data dissemination in wireless sensor networks: Modelling and analysis. Computer Networks, 56(11), 2664–2676.
Farooq, W., Ali Khan, M., & Rehman, S. (2016). A novel real time framework for cluster-based multicast communication in vehicular ad hoc networks. International Journal of Distributed Sensor Networks, 2016, PP-1-18.
Nayyar, Z., Khan, M. A., Bashir, F., Beard, C., Li, Z., & Mahmood, K. (2016). Two tier clustering technique in vehicular ad hoc networks in highways’ scenarios. International Journal of Computer Science and Information Security, 14, 745.
Saeed, A., Butt, W. H., Kazmi, F., Khan, M. A. (2018). Evaluation of clustering algorithms for wireless sensor and actor networks. In IBCAST 2018, 15th international Bhurban conference on applied sciences and technology.
Farooq, W., Khan, M. A., Rehman, S., Saqib, N. A., & Abbas, M. (2017). AAGV: A cluster based multicast routing protocol for autonomous aerial and ground vehicles communication in VANET. In 15th international conference on frontiers of information technology (FIT 2017).
Khan M. A., Shah, G. A., Ahsan, M., & Sher, M. (2010). An efficient and reliable clustering algorithm for wireless sensor actor network (WSANs). In 53rd IEEE International Midwest Symposium on Circuits and System (MWSCAS 2010) Washington, USA.
Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communication, 14(5), 888–895.
Rajendran, R., Santhosh Kumar, S. V. N., Palanichamy, Y., & Arputharaj, K. (2019). Detection of DoS attacks in cloud networks using intelligent rule based classification system. Cluster Computing, 22(1), 423–434.
Kalidoss, T., Kulothungan, K., Indira Gandhi, S., Selvi, M., Santhosh Kumar, S. V. N., & Arputharaj, K. (2020). Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, 24(21), 16483–16497.
Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks. Wireless Networks, 25(8), 4903–4914.
Selvi, M., Velvizhy, P., Ganapathy, S., Khanna Nehemiah, H., & Kannan, A. (2019). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing, 22(5), 10839–10848.
Kulkarni, S. S., & Wang, L. (2005). MNP: Multi-hop network reprogramming service for sensor networks. In Proceedings of the 25th IEEE international conference on distributed computing systems (ICDCS'05) (pp. 7–16). https://doi.org/10.1109/ICDCS.2005.50
Hui, J. W., & Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on embedded networked sensor systems (Sensys 04) (pp. 81–94) New York, NY, USA: ACM.
Hyun, S., Ning, P., Liu, A., & Du, W. (2008). Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks. In Proceedings of the ACM/IEEE international conference on information processing in sensor networks (pp. 445–456).
Zhang, R., & Zhang, Y. (2008). LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks. In International conference on distributed computing systems (pp. 497–506).
Naik, V., Arora, A., Sinha, P. & Zhang, H. (2005). Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In Proceedings of the 26th IEEE international real-time systems symposium (RTSS) (pp. 1–10).
Huang, L., & Setia, S. (2008). CORD: Energy-efficient reliable bulk data dissemination in sensor. In Proceedings of international conference on computer communications, joint conference of the IEEE computer and communications societies (pp. 1–8).
Lin, K., & Levis, P. (2008). Data discovery and dissemination with dip. In Proceedings of the 2008 international conference on information processing in sensor networks (IPSN 2008) (pp. 433–444) Washington, DC, USA.
Tolle, G., & Culler, D. (2005). Design of application cooperative management system for wireless sensor networks. In Proceedings of EWSW (pp. 121–132).
Levis, P., Patel, N., Culler, D., & Shenker, S. (2004). Trickle: A self-regulating algorithm for code maintenance and propagation in wirelesssensor networks. In Proceedings of the 1st conference symposium on network systems design and implementation (pp. 15–28).
Dang, T., Bulusu, N., Feng, W., & Park, S. (2009). DHV: A code consistency maintenance protocol for multi-hop wireless sensor networks. In Proceedings of the 6th European conference on wireless sensor networks (pp. 327–342)
He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638–4646.
Hur, J. (2011). Fine-grained data access control for distributed sensor networks. Wireless Networks, 17(5), 1235–1249.
He, J., Cai, L., Cheng, P., & Pan, J. (2016). Delay minimization for data dissemination in large-scale VANETs with buses and taxis. IEEE Transactions on Vehicular Technology, 15(8), 1939–1950.
Wang, S., Wang, X., Cheng, X., Huang, J., Bie, R., & Zhao, F. (2017). Fundamental analysis on data dissemination in mobile opportunistic networks with Levy mobility. IEEE Transactions on Vehicular Technology, 66(5), 4173–4187.
He, J., Ni, Y., Cai, L., Pan, J., & Chen, C. (2018). Optimal dropbox deployment algorithm for data dissemination in vehicular networks. IEEE Transactions on Vehicular Technology, 17(3), 632–645.
Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Distributed fine-grained access control in wireless sensor networks. In Proceedings of the IEEE IPDPS (pp. 352–362)
Hawbani, A., Wang, X., Kuhlani, H., Karmoshi, S., Ghoul, R., Sharabi, Y., & Torbosh, E. (2018). Sink-oriented tree based data dissemination protocol for mobile sinks in wireless sensor networks. Wireless Networks, 24(7), 2723–2734.
Ahim, K. A. (2017). BASIS: A practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 12(7), 1545–1553.
Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., & Ganapathy, S. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Journal of Computer Networks, 151, 211–223.
Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communication, 105(4), 1475–1490.
Haseeb, K., Bakar, K. A., Abdullah, A. H., & Darwish, T. (2017). Adaptive energy aware cluster-based routing protocol for wireless sensor networks. Wireless Networks, 23(3), 1953–1966.
Zhu, S. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy (pp. 12–20).
Lee, H. W. (2007). A method to control the probability of attempts to verify a report in statistical en-route filtering networks. In 15th IEEE international conference on networks (pp. 32–39).
Golden Julie, E., & Tamilselvi, S. (2016). CDS-fuzzy opportunistic routing protocol for WSN. Wireless Personal Communications, 90(2), 903–922.
Logambigai, R., Ganapathy, S., & Kannan, A. (2018). Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62–75.
Logambigai, R., & Kannan, A. (2015). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22(3), 945–957.
Mhemed, R., Aslam, N., Phillips, W., & Comeau, F. (2012). An energy-efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science, 10, 255–262.
Hsu, C.-M., (2003). A group digital signature technique for authentication. In Proceedings of the IEEE 37th annual 2003 international Carnahan conference on security technology (pp. 253–256).
He, D. (2015). Accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 14(1), 387–397.
Santhosh Kumar, S. V. N., & Yogesh, P. (2016). Privacy-preserving with enhanced access control for distributed data dissemination in WSN. Asian Journal of Research in Social Sciences and Humanities, 6(12), 561–577.
Santhosh Kumar, S. V. N., & Palanichamy, Y. (2017). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks, 24(4), 1343–1360.
He, D., Bu, J., Zhu, S., Chan, S., & Chen, C. (2011). Distributed access control with privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications, 10(10), 3472–3481.
Zhang, R., Zhang, Y., & Ren, K. (2012). Distributed privacy-preserving access control in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1427–1438.
Hu, Y. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks (pp. 1–8).
Li, J., & Ren, J. (2014). Hop by hop message authentication and source privacy in WSN. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1223–1232.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Santhosh Kumar, S.V.N., Palanichamy, Y., Selvi, M. et al. Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Netw 27, 3873–3894 (2021). https://doi.org/10.1007/s11276-021-02660-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-021-02660-9