Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 -- 1179 2023-07-06 11:13:45 |
2 layout Meta information modification 1179 2023-07-07 03:04:53 |

Video Upload Options

We provide professional Video Production Services to translate complex research into visually appealing presentations. Would you like to try it?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
Chang, R.; Chiang, C.; Hung, Y. Grouping Sensors in Wireless Sensor Networks. Encyclopedia. Available online: https://encyclopedia.pub/entry/46508 (accessed on 16 November 2024).
Chang R, Chiang C, Hung Y. Grouping Sensors in Wireless Sensor Networks. Encyclopedia. Available at: https://encyclopedia.pub/entry/46508. Accessed November 16, 2024.
Chang, Ray-I, Chien-Wen Chiang, Yu-Hsin Hung. "Grouping Sensors in Wireless Sensor Networks" Encyclopedia, https://encyclopedia.pub/entry/46508 (accessed November 16, 2024).
Chang, R., Chiang, C., & Hung, Y. (2023, July 06). Grouping Sensors in Wireless Sensor Networks. In Encyclopedia. https://encyclopedia.pub/entry/46508
Chang, Ray-I, et al. "Grouping Sensors in Wireless Sensor Networks." Encyclopedia. Web. 06 July, 2023.
Grouping Sensors in Wireless Sensor Networks
Edit

As sensor nodes communicate via wireless channels, information security is essential for wireless sensor networks. Efficient protection mechanisms to ensure data security among nodes are critical.

aggregator-based grouping wireless sensor networks encryption and decryption operations

1. Introduction

According to a report on the Internet of Things (IoT) analytics, the number of connected devices will increase to ~27 billion by 2025 [1]. The increasing number of devices needs to be integrated and communicated; thus, network technologies are essential for the connectivity of several devices. Various network technologies are used to connect devices. The wireless sensor network (WSN) is a major network technology. It comprises a group of sensor nodes with tiny shapes and limited power resources. It is used to measure the physical conditions of an environment, and the collected data are forwarded to data storage. Since WSNs can easily deploy a local network at a low cost, they can be employed in many domains for different novel applications [2][3][4][5]. WSN is essential to the IoT evolution, which will become a mainstream part of the Internet in the future [6]. In WSNs, each sensor node collects data from the environment and then delivers them to the base station (BS) by multi-hops via other nodes. As wireless communication in WSN is power consuming, some specific nodes on the multi-hops path are “data aggregators,” aggregating data received from children nodes to reduce the data volume and the number of transmissions to the parent node [7]. Notably, communication in WSN is conducted through wireless channels. It is more vulnerable to malicious attacks, such as eavesdropping, camouflage, and modification. Thus, there is a need for a protection mechanism to ensure data security between nodes [8][9].
As the keys used for encryption and decryption are different in the asymmetric encryption approach, heavy computation is required, which is unsuitable for WSN [10][11]. The symmetric encryption approach, where encryption and decryption operations use the same key, is more favorable to WSN. However, an efficient key management mechanism to distribute keys to nodes is vital in such an approach.

2. Grouping Sensors for the Key Distribution of Implicit Certificates in Wireless Sensor Networks

Data security for wireless communication between nodes is a crucial issue in WSNs. Considering data security, data have been protected using keys while they are communicated among different sensor nodes [12][13][14][15][16][17][18][19]. However, efficient and lightweight security mechanisms are needed because each sensor node has limited power computation and storage capacities. The matrix-based structure and group key set-up protocols are used in key management to secure multicast communications in heterogeneous WSNs, but it has high energy consumption [20]. Key distribution and management approaches are categorized into four types: single master key (SMK), all pair wise key (APWK), random pair wise key (RPWK), and group-based key (GBK) [12][13][15]. SMK is the simplest for distributing keys [21][22][23], where all sensor nodes use the same encryption key to protect their communications. Despite its simplicity, the entire protection mechanism is broken when a hacker breaks and captures one of the sensor nodes. In APWK, a unique encryption key protects communication between any two nodes [16]. A break in any communication does not proliferate to other communications, but this approach is not energy efficient, especially during calculations [24]. In RPWK, a key pool is created, from which each node randomly chooses some keys to make its key ring [17][18][19][20][21][22][23][24][25]. Nodes broadcast their key ring identities (ID) to other nodes. A secure channel is established if either of the two nodes within the wireless communication coverage has the same ID. For GBK [18][19], an entire WSN is divided into several groups. Sensor nodes’ connections are of two types: in group and inter-group. All sensor nodes in the same group use the same key to protect their communications. One node (or some nodes) has the key of its neighboring group to ensure secure communication between the two groups. Hereafter, such a node is called a “boundary node.” Among these four approaches, GBK has good security and resilience since cracking one node will not endanger the entire network. Moreover, GBK is scalable since each node needs to store only one or two keys. In addition, the entire network is more difficult to crack because the damage caused by any single attack will only be confined to its group nodes. An algorithm based on the implicit certificate has been proposed to solve the security problem among the access points in a dynamic access point group and between the users’ equipment [26]. The hybrid-session key management scheme for WSN was proposed to reduce power consumption by minimizing public key cryptography [27]. The uneven clustering approach improves the energy efficiency load balance in WSN [28]. In summary, group- and matrix-based management approaches have quick reaction times and high connectivity with networks, respectively. However, they have high computation overhead time and memory consumption [29].
In WSNs, secure aggregation methods are widely employed in inference attack protection [30] and smart grids [31]. Secure aggregation has been employed in federated learning systems, and the results show that the method needs fewer training iterations and is flexible [30]. Regarding data aggregation, Secure Information Aggregation (SIA) [32][33] targets a flatter WSN hierarchy with only one data aggregator to which all sensor nodes send data. In addition to aggregating the received data, the aggregator uses the hash tree [34][35][36] to convert individual data to an authentication code. As SIA considers only one data aggregator, it is unsuitable for large-scale network deployment. Some studies have been conducted to improve the computation efficiency of aggregation methods [36][37][38][39][40][41]. The turbo-aggregate method achieves O(nLogn) for a secure aggregation in a network with n users, and it can speed up the network’s dispatching efficiency [36].
Energy consumption is another issue in data aggregation. The facility derived from data aggregation is not fully utilized, and much power is consumed during communication. For energy efficiency in WSN, a fuzzy-based node arrangement is used to select the parent node and format the tree topology. Secure Reference-based Data Aggregation (SRDA), in which each sensor node compares its sensed data with the averaged value of previous sensed data (“reference value”), has been proposed [39]. Each node transmits and encrypts only the differential value between the sensed data and the reference value to reduce bandwidth and power consumption. The main disadvantage of this scheme is that only the cluster root can aggregate sensed data; thus, the aggregation effectiveness is reduced. In [40], the authors proposed “Concealed Data Aggregation” to build upon privacy homomorphism, which can directly perform calculations on encrypted data. Thus, all encrypted data are directly fed into the aggregation function, and the aggregated result is delivered to the BS. However, this scheme cannot render high-level security. The logical key hierarchy is used to speed up the encryption and decryption for implementing an effective key-numbering approach [41][42]. In Ref. [43], the logic operations are used to develop the lightweight authenticated group-key distribution scheme to speed up the encryption and decryption operation. In Ref. [37], a promising scheme called implicit security was proposed. The term “implicit security” implies that data protection comes from the partitioning of data d into pieces using mathematical polynomial operations (instead of relying on cryptography). The time complexity for this implicit security scheme is only O(n) for data partitioning or recovery.

References

  1. Hasan, M. State of IoT 2022: Number of Connected IoT Devices Growing 18% to 14.4 billion Globally. IoT Analytics. Available online: https://iot-analytics.com/number-connected-iot-devices/ (accessed on 18 May 2022).
  2. Akyildiz, I.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. J. Comput. Netw. 2022, 38, 393–422.
  3. Li, W.; Kara, S. Methodology for monitoring manufacturing environment by using wireless sensor networks (WSN) and the internet of things (IoT). Procedia CIRP 2017, 61, 323–328.
  4. García-Hernández, C.F.; Ibargüengoytia-González, P.H.; García-Hernández, J.; Pérez-Díaz, J.A. Wireless Sensor Networks and Applications: A Survey. Int. J. Comput. Sci. Netw. Secur. 2007, 7, 264–273.
  5. Culler, D.; Estrin, D.; Srivastava, M. Guest Editors’ Introduction: Overview of Sensor Network. IEEE Comput. Soc. 2004, 37, 41–49.
  6. Zahariadis, T.; Trakadas, P.; Leligou, H.; Papadopoylos, K.; Ladis, E.; Tselikis, C.; Vangelatos, C.; Besson, L.; Manner, J.; Loupis, M.; et al. Securing wireless sensor networks towards a trusted Internet of Things. In Towards the Future Internet—A European Research Perspective; IOS Press: Amsterdam, The Netherlands, 2009; pp. 47–56.
  7. Cheng, S.; Lai, Y.; Wang, C.; Lin, R. Hierarchical data aggregation model and group management for wireless sensor network. In Proceedings of the 2009 the Fourth International Conference on Communications and Networking, Xi’an, China, 26–28 August 2009.
  8. Ren, X.; Yu, H. Security Mechanisms for Wireless Sensor Networks. Int. J. Comput. Sci. Netw. Secur. 2006, 6, 155–161.
  9. Belinda, M.; Dhas, C. A Study of Security in Wireless Sensor Networks. Masaum J. Rev. Surv. 2009, 1, 91–95.
  10. Wander, A.S.; Gura, N.; Eberle, H.; Gupta, V.; Shantz, S.C. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In Proceedings of the IEEE Pervasive Computing and Communication, Kauai, Hawaii, 8–12 March 2005; pp. 324–328.
  11. Amin, F.; Jahangir, A.H.; Rasifard, H. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security. Int. J. Comput. Syst. Sci. Eng. 2009, 5, 107–112.
  12. Chang, C.C.; Arafa, S.; Muftic, S. Key Establishment Protocol for Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, Pisa, Italy, 8–11 October 2007.
  13. Chang, R.-I.; Tsai, J.-H.; Wang, C.-H. Edge Computing of Online Bounded-Error Query for Energy-Efficient IoT Sensors. Sensors 2022, 22, 4799.
  14. Jones, J.; Haas, Z.J. Predeployed Secure Key Distribution Mechanisms in Sensor Networks: Current State-of-the-Art and a New Approach using Time Information. IEEE Wirel. Commun. 2008, 15, 42–51.
  15. Dustin, M.; Shankarappa, J.; Petrowski, M.; Weerasingha, H.; Fu, H. Analysis of Key Management in Wireless Sensor Networks. In Proceedings of the IEEE Electro/Information Technology Conference, Chicago, IL, USA, 17–20 May 2007.
  16. Cheng, Y.; Agrawal, D.P. Efficient Pairwise Key Establishment and Management in Static Wireless Sensor Networks. In Proceedings of the Mobile Ad Hoc and Sensor System Conference, Washington, DC, USA, 25–27 May 2005.
  17. Eschenauer, L.; Gligor, V. A Key-Management Scheme for Distributed Sensor Networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 18–22 November 2002; pp. 41–47.
  18. Du, W.; Deng, J.; Han, Y.S.; Chen, S.; Varshney, P.K. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge; IEEE Infocom: Hong Kong, China, 2004.
  19. Liu, D.; Ning, P.; Du, W. Group-Based Key Pre-distribution in Wireless Sensor Networks. In Proceedings of the 4th ACM Workshop on Wireless Security (WiSe’05), Cologne, Germany, 2 September 2005; pp. 11–20.
  20. Alshammari, M.R.; Elleithy, K.M. Efficient and secure key distribution protocol for wireless sensor networks. Sensors 2018, 18, 3569.
  21. Iqbal, U.; Shafi, S. A provable and secure key exchange protocol based on the elliptical curve diffe–hellman for wsn. In Advances in Big Data and Cloud Computing: Proceedings of ICBDCC18; Springer: Singapore, 2019; pp. 363–372.
  22. Lin, H.Y. Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks. Connect. Sci. 2022, 34, 274–300.
  23. Tehseen, M.; Javed, H.; Shah, I.H.; Ahmed, S. A lightweight key negotiation and authentication scheme for large scale wsns. In Recent Trends and Advances in Wireless and IoT-Enabled Networks; Springer: Berlin/Heidelberg, Germany, 2019; pp. 225–235.
  24. Elhoseny, M.; Hassanien, A.E.; Elhoseny, M.; Hassanien, A.E. Secure data transmission in WSN: An overview. In Dynamic Wireless Sensor Networks: New Directions for Smart Technologies; Springer: Berlin/Heidelberg, Germany, 2019; pp. 115–143.
  25. Robinchandra Singh, U.; Roy, S. Survey on key management schemes and cluster based routing protocols in wireless sensor network. Int. J. Comput. Intell. IoT 2019, 576–594.
  26. Chen, Z.; Chen, S.; Xu, H.; Hu, B. A security scheme of 5G ultradense network based on the implicit certificate. Wirel. Commun. Mob. Comput. 2018, 2018, 1–11.
  27. Mehmood, G.; Khan, M.S.; Waheed, A.; Zareei, M.; Fayaz, M.; Sadad, T.; Kama, N.; Azmi, A. An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network. Complexity 2021, 2021, 6577642.
  28. Vijayan, K.; Raaza, A. A novel cluster arrangement energy efficient routing protocol for wireless sensor networks. Indian J. Sci. Technol. 2016, 9, 1–9.
  29. Srinivas, K.; Sagar, K. Secure-Key Management Protocols for Wireless Sensor Networks in IoT. Ind. Eng. J. 2022, 15.
  30. Fereidooni, H.; Marchal, S.; Miettinen, M.; Mirhoseini, A.; Möllering, H.; Nguyen, T.D.; Rieger, P.; Sadeghi, A.-R.; Schneider, T.; Yalame, H.; et al. SAFELearn: Secure aggregation for private federated learning. In Proceedings of the 2021 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 27 May 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 56–62.
  31. Guan, Z.; Zhang, Y.; Zhu, L.; Wu, L.; Yu, S. EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 2019, 62, 32103.
  32. Przydatek, B.; Song, D.; Perrig, A. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st ACM Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, 5–7 November 2003.
  33. Przydatek, B.; Chan, H.; Perrig, A.; Song, D. SIA: Secure information aggregation in sensor networks. J. Comput. Secur. 2007, 15, 69–102.
  34. Li, H.; Lu, R.; Zhou, L.; Yang, B.; Shen, X. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid. IEEE Syst. J. 2013, 8, 655–663.
  35. Nesa, N.; Banerjee, I. A lightweight security protocol for IoT using Merkle hash tree and chaotic cryptography. Adv. Comput. Syst. Secur. 2020, 10, 3–16.
  36. So, J.; Güler, B.; Avestimehr, A.S. Turbo-aggregate: Breaking the quadratic aggregation barrier in secure federated learning. IEEE J. Sel. Areas Inf. Theory 2021, 2, 479–489.
  37. Parakh, A.; Kak, S. Online Data Storage using Implicit Security. Inf. Sci. 2009, 179, 3323–3331.
  38. Bhushan, S.; Kumar, M.; Kumar, P.; Stephan, T.; Shankar, A.; Liu, P. FAJIT: A fuzzy-based data aggregation technique for energy efficiency in wireless sensor network. Complex Intell. Syst. 2021, 7, 997–1007.
  39. Sanli, H.O.; Ozdemir, S.; Cam, H. SRDA: Secure Reference-Based Data Aggregation Protocol for Wireless Sensor Networks. In Proceedings of the IEEE Vehicular Technology Conference, Los Angeles, CA, USA, 26–29 September 2004; pp. 4650–4654.
  40. Girao, J.; Westhoff, D. CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2005.
  41. Ozdemir, S.; Xiao, Y. Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview. Comput. Netw. 2009, 53, 2022–2037.
  42. Jiao, R.; Ouyang, H.; Lin, Y.; Luo, Y.; Li, G.; Jiang, Z.; Zheng, Q. A computation-efficient group key distribution protocol based on a new secret sharing scheme. Information 2019, 10, 175.
  43. Harn, L.; Hsu, C.; Xia, Z. General logic-operation-based lightweight group-key distribution schemes for Internet of Vehicles. Veh. Commun. 2022, 34, 100457.
More
Information
Contributors MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register : , ,
View Times: 313
Revisions: 2 times (View History)
Update Date: 07 Jul 2023
1000/1000
ScholarVision Creations