Log in

Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks (WSNs) is a collection of tiny distributed sensor nodes that have been used to sense the physical parameters of the environment where it has been deployed. Data dissemination is an important activity performed in WSNs in order to administer and manage them. Gossi** makes the network to transmit the same data item multiple times by multiple sensor nodes to their neighbors until they reach the required nodes which are in need of them. These multiple transmissions result in a problem called a Redundant Broadcast Storm Problem (RBSP). Moreover, the RBSP results in too many senders’ problem and also leads to the consumption of more energy in the network. In data dissemination, providing energy efficiency and security are the two major challenging issues. In such a scenario, the attackers may make use of the weakness in security provisions available in the network and they can perform unauthorized activities to disrupt the process of data dissemination. Hence, it is necessary to address the issues of RBSP, energy consumption, security and too many senders problem in order to enhance the reliability and security of communication in WSN for data dissemination. In this paper, a novel protocol named Cluster based Secured Data dissemination Protocol (CSDP) has been proposed for providing energy efficient and secured dissemination of data. The proposed protocol is a distributed protocol which considers the route discovery process, cluster formation, cluster head selection, cluster based routing and security through the design of a new digital signature based authentication algorithm, trust based security enhancement and encryption techniques for effective key management. The major contributions of the proposed work include the proposal of cryptography based public key and private key generation algorithms, techniques for trust score computation and malicious node identification and finally the effective prevention of malicious activities for enhancing the security of the network. Moreover, this work considers node identification techniques for effective clustering of nodes and performs optimal route discovery and secured transmission of packets. This work is novel with respect to multicast based data dissemination protocol, proposal of combined signature generation and verification schemes, encryption based key management and distributed data collection and communication techniques. In addition, an Intelligent Fuzzy based Unequal Clustering algorithm is used to perform effective clustering process and the traffic analyzer to identify the intruders by monitoring the node’s behaviors and their trust values. The proposed protocol has been extensively tested with realistic simulation parameters using NS2 simulator. The simulation results obtained from this work have proved that the proposed protocol improves the level of security through the proposal of a time efficient encryption and decryption algorithm with increase in packet delivery ratio and network throughput and at the same time it reduces the energy consumption as well as delay in data dissemination.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. He, D., Chan, S., Tang, S., & Guizani, M. (2015). Secure and distributed data discovery and dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 26(4), 1129–1139.

    Google Scholar 

  2. De, P., Liu, Y., & Das, S. K. (2008). ReMo: An energy efficient reprogramming protocol for mobile sensor networks. In: Proceedings of the 6th IEEE pervasive computing and communications (pp. 60–69)

  3. Panta, R. K., Khalil, I., & Bagchi, S. (2007). Stream: Low overhead wireless reprogramming for sensor networks. In Proceedings of the 26th IEEE INFOCOM (pp.928–936).

  4. Wang, Q., Zhu, Y., & Cheng, L. (2006). Reprogramming wireless sensor networks: Challenges and approaches. IEEE Network, 20(3), 48–55.

    Article  Google Scholar 

  5. Dong, W., Chen, C., Liu, X., Bu, J., & Gao, Y. (2011). A light weight and density aware reprogramming protocols for wireless sensor networks. IEEE Transactions on Mobile Computing, 10(10), 1403–1415.

    Article  Google Scholar 

  6. Zhang, W., Han, G., Wang, X., Guizani, M., Fan, K., & Shu, L. (2020). A node location algorithm based on node movement prediction in underwater acoustic sensor networks. IEEE Transactions on Vehicular Technology, 69(3), 3166–3178.

    Article  Google Scholar 

  7. Li, H., & Lin, Z. (2017). Study on location of wireless sensor network node in forest environment. Procedia Computer Science, 107, 697–704.

    Article  Google Scholar 

  8. Arora, S., & Singh, S. (2017). Node localization in wireless sensor networks using butterfly optimization algorithm. Arabian Journal of Science and Engineering, 42, 3325–3335.

    Article  Google Scholar 

  9. Dong, W., Chen, C., Liu, X., Teng, G., Bu, J., & Liv, Y. (2012). Bulk data dissemination in wireless sensor networks: Modelling and analysis. Computer Networks, 56(11), 2664–2676.

    Article  Google Scholar 

  10. Farooq, W., Ali Khan, M., & Rehman, S. (2016). A novel real time framework for cluster-based multicast communication in vehicular ad hoc networks. International Journal of Distributed Sensor Networks, 2016, PP-1-18.

    Google Scholar 

  11. Nayyar, Z., Khan, M. A., Bashir, F., Beard, C., Li, Z., & Mahmood, K. (2016). Two tier clustering technique in vehicular ad hoc networks in highways’ scenarios. International Journal of Computer Science and Information Security, 14, 745.

    Google Scholar 

  12. Saeed, A., Butt, W. H., Kazmi, F., Khan, M. A. (2018). Evaluation of clustering algorithms for wireless sensor and actor networks. In IBCAST 2018, 15th international Bhurban conference on applied sciences and technology.

  13. Farooq, W., Khan, M. A., Rehman, S., Saqib, N. A., & Abbas, M. (2017). AAGV: A cluster based multicast routing protocol for autonomous aerial and ground vehicles communication in VANET. In 15th international conference on frontiers of information technology (FIT 2017).

  14. Khan M. A., Shah, G. A., Ahsan, M., & Sher, M. (2010). An efficient and reliable clustering algorithm for wireless sensor actor network (WSANs). In 53rd IEEE International Midwest Symposium on Circuits and System (MWSCAS 2010) Washington, USA.

  15. Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communication, 14(5), 888–895.

    Article  Google Scholar 

  16. Rajendran, R., Santhosh Kumar, S. V. N., Palanichamy, Y., & Arputharaj, K. (2019). Detection of DoS attacks in cloud networks using intelligent rule based classification system. Cluster Computing, 22(1), 423–434.

    Article  Google Scholar 

  17. Kalidoss, T., Kulothungan, K., Indira Gandhi, S., Selvi, M., Santhosh Kumar, S. V. N., & Arputharaj, K. (2020). Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Computing, 24(21), 16483–16497.

    Article  Google Scholar 

  18. Viswanathan, S., & Kannan, A. (2019). Elliptic key cryptography with Beta Gamma functions for secure routing in wireless sensor networks. Wireless Networks, 25(8), 4903–4914.

    Article  Google Scholar 

  19. Selvi, M., Velvizhy, P., Ganapathy, S., Khanna Nehemiah, H., & Kannan, A. (2019). A rule based delay constrained energy efficient routing technique for wireless sensor networks. Cluster Computing, 22(5), 10839–10848.

    Article  Google Scholar 

  20. Kulkarni, S. S., & Wang, L. (2005). MNP: Multi-hop network reprogramming service for sensor networks. In Proceedings of the 25th IEEE international conference on distributed computing systems (ICDCS'05) (pp. 7–16). https://doi.org/10.1109/ICDCS.2005.50

  21. Hui, J. W., & Culler, D. (2004). The dynamic behavior of a data dissemination protocol for network programming at scale. In Proceedings of the 2nd international conference on embedded networked sensor systems (Sensys 04) (pp. 81–94) New York, NY, USA: ACM.

  22. Hyun, S., Ning, P., Liu, A., & Du, W. (2008). Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks. In Proceedings of the ACM/IEEE international conference on information processing in sensor networks (pp. 445–456).

  23. Zhang, R., & Zhang, Y. (2008). LR-Seluge: Loss-resilient and secure code dissemination in wireless sensor networks. In International conference on distributed computing systems (pp. 497–506).

  24. Naik, V., Arora, A., Sinha, P. & Zhang, H. (2005). Sprinkler: A reliable and energy efficient data dissemination service for wireless embedded devices. In Proceedings of the 26th IEEE international real-time systems symposium (RTSS) (pp. 1–10).

  25. Huang, L., & Setia, S. (2008). CORD: Energy-efficient reliable bulk data dissemination in sensor. In Proceedings of international conference on computer communications, joint conference of the IEEE computer and communications societies (pp. 1–8).

  26. Lin, K., & Levis, P. (2008). Data discovery and dissemination with dip. In Proceedings of the 2008 international conference on information processing in sensor networks (IPSN 2008) (pp. 433–444) Washington, DC, USA.

  27. Tolle, G., & Culler, D. (2005). Design of application cooperative management system for wireless sensor networks. In Proceedings of EWSW (pp. 121–132).

  28. Levis, P., Patel, N., Culler, D., & Shenker, S. (2004). Trickle: A self-regulating algorithm for code maintenance and propagation in wirelesssensor networks. In Proceedings of the 1st conference symposium on network systems design and implementation (pp. 15–28).

  29. Dang, T., Bulusu, N., Feng, W., & Park, S. (2009). DHV: A code consistency maintenance protocol for multi-hop wireless sensor networks. In Proceedings of the 6th European conference on wireless sensor networks (pp. 327–342)

  30. He, D., Chan, S., Tang, S., & Guizani, M. (2013). Secure data discovery and dissemination based on hash tree for wireless sensor networks. IEEE Transactions on Wireless Communications, 12(9), 4638–4646.

    Article  Google Scholar 

  31. Hur, J. (2011). Fine-grained data access control for distributed sensor networks. Wireless Networks, 17(5), 1235–1249.

    Article  Google Scholar 

  32. He, J., Cai, L., Cheng, P., & Pan, J. (2016). Delay minimization for data dissemination in large-scale VANETs with buses and taxis. IEEE Transactions on Vehicular Technology, 15(8), 1939–1950.

    Google Scholar 

  33. Wang, S., Wang, X., Cheng, X., Huang, J., Bie, R., & Zhao, F. (2017). Fundamental analysis on data dissemination in mobile opportunistic networks with Levy mobility. IEEE Transactions on Vehicular Technology, 66(5), 4173–4187.

    Google Scholar 

  34. He, J., Ni, Y., Cai, L., Pan, J., & Chen, C. (2018). Optimal dropbox deployment algorithm for data dissemination in vehicular networks. IEEE Transactions on Vehicular Technology, 17(3), 632–645.

    Google Scholar 

  35. Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Distributed fine-grained access control in wireless sensor networks. In Proceedings of the IEEE IPDPS (pp. 352–362)

  36. Hawbani, A., Wang, X., Kuhlani, H., Karmoshi, S., Ghoul, R., Sharabi, Y., & Torbosh, E. (2018). Sink-oriented tree based data dissemination protocol for mobile sinks in wireless sensor networks. Wireless Networks, 24(7), 2723–2734.

    Article  Google Scholar 

  37. Ahim, K. A. (2017). BASIS: A practical multi-user broadcast authentication scheme in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 12(7), 1545–1553.

    Article  Google Scholar 

  38. Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., & Ganapathy, S. (2019). Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. Journal of Computer Networks, 151, 211–223.

    Article  Google Scholar 

  39. Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communication, 105(4), 1475–1490.

    Article  Google Scholar 

  40. Haseeb, K., Bakar, K. A., Abdullah, A. H., & Darwish, T. (2017). Adaptive energy aware cluster-based routing protocol for wireless sensor networks. Wireless Networks, 23(3), 1953–1966.

    Article  Google Scholar 

  41. Zhu, S. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In IEEE symposium on security and privacy (pp. 12–20).

  42. Lee, H. W. (2007). A method to control the probability of attempts to verify a report in statistical en-route filtering networks. In 15th IEEE international conference on networks (pp. 32–39).

  43. Golden Julie, E., & Tamilselvi, S. (2016). CDS-fuzzy opportunistic routing protocol for WSN. Wireless Personal Communications, 90(2), 903–922.

    Article  Google Scholar 

  44. Logambigai, R., Ganapathy, S., & Kannan, A. (2018). Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62–75.

    Article  Google Scholar 

  45. Logambigai, R., & Kannan, A. (2015). Fuzzy logic based unequal clustering for wireless sensor networks. Wireless Networks, 22(3), 945–957.

    Article  Google Scholar 

  46. Mhemed, R., Aslam, N., Phillips, W., & Comeau, F. (2012). An energy-efficient fuzzy logic cluster formation protocol in wireless sensor networks. Procedia Computer Science, 10, 255–262.

    Article  Google Scholar 

  47. Hsu, C.-M., (2003). A group digital signature technique for authentication. In Proceedings of the IEEE 37th annual 2003 international Carnahan conference on security technology (pp. 253–256).

  48. He, D. (2015). Accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 14(1), 387–397.

    Google Scholar 

  49. Santhosh Kumar, S. V. N., & Yogesh, P. (2016). Privacy-preserving with enhanced access control for distributed data dissemination in WSN. Asian Journal of Research in Social Sciences and Humanities, 6(12), 561–577.

    Article  Google Scholar 

  50. Santhosh Kumar, S. V. N., & Palanichamy, Y. (2017). Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wireless Networks, 24(4), 1343–1360.

    Article  Google Scholar 

  51. He, D., Bu, J., Zhu, S., Chan, S., & Chen, C. (2011). Distributed access control with privacy support in wireless sensor networks. IEEE Transactions on Wireless Communications, 10(10), 3472–3481.

    Article  Google Scholar 

  52. Zhang, R., Zhang, Y., & Ren, K. (2012). Distributed privacy-preserving access control in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1427–1438.

    Article  Google Scholar 

  53. Hu, Y. (2007). RAS: A robust authentication scheme for filtering false data in wireless sensor networks. In 15th IEEE international conference on networks (pp. 1–8).

  54. Li, J., & Ren, J. (2014). Hop by hop message authentication and source privacy in WSN. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1223–1232.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. V. N. Santhosh Kumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Santhosh Kumar, S.V.N., Palanichamy, Y., Selvi, M. et al. Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Netw 27, 3873–3894 (2021). https://doi.org/10.1007/s11276-021-02660-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-021-02660-9

Keywords

Navigation