Abstract
Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending such attacks becomes a big challenge. We propose a scheme to build a security mechanism in a query-processing paradigm within WSN. The scheme is capable of protecting replay attack while preserving essential properties of security such as authentication, data integrity and data freshness. The solution is made lightweight using symmetric key cryptography with very short-length key. Further, the key used in our scheme is neither pre-deployed nor is transmitted directly. The key information is established among nodes through an efficient use of one variant of dynamic TDMA mechanism which ensures security of key. Another variant of dynamic TDMA is used to make the scheme bandwidth saving, an essential quality of WSN. Performance of the scheme is analyzed in terms of storage, computation and communication overhead. Finally the analytical results are compared with two of the existing schemes including the previous version of the present scheme that show significant reduction of all such overheads thereby proving the suitability of the proposed scheme for a resource-constrained network like WSN.
Similar content being viewed by others
References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
DasBit, S., & Ragupathy, R. (2008). Routing in MANET and sensor network—A 3D position based approach. Journal of Foundation of Computing and Decision Sciences, 33(3), 211–239.
Ghosal, A., Halder, S., & DasBit, S. (2009). A scheme to tolerate jamming in multiple nodes in wireless sensor networks. Proceedings of Wireless VITAE, IEEE press, 948–951.
Ghosal, A., Halder, S., Chatterjee, S., Sen, J., & DasBit, S. (2009). Estimating delay in a data forwarding scheme for defending jamming attack in wireless sensor network. Proceedings of 3rd International Conference NGMAST, IEEE CS press, 351–356.
Halder, S., Ghosal, A., Sur, S., Dan, A., & DasBit, S. (2009). A lifetime enhancing node deployment strategy in WSN. Proceedings of Future Generation Information Technology, LNCS-5899, 296–308.
Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. Proceedings of 33rd Hawaii International Conference on System Sciences, 2, 8020–8029.
Ferreira, A. C., Vilaca, M. A., Oliveira, L. B., Habib, E., Wang, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of 4th International Conference on Networking, LNCS-3420, 449–458.
Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54–62.
Crosby, G. V., Pissinou, N., & Gadze, J. (2006). A framework for trust-based cluster head election in wireless sensor networks. Proceedings of 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 13–22.
Lee, P., Kim, J., Han, I., Rye, H., & Ahn, W. H. (2007). Secure cluster header election techniques in sensor network. Proceedings of ISPA Workshop, LNCS-4743, 20–31.
Oliveira, L. B., Wong, H.C., Bern, M., Dahab, R., & Loureiro, A. A. F. (2006). SecLEACH—A random key distribution solution for securing clustered sensor networks. Proceedings of 5th IEEE International Symposium on Network Computing and Applications, 145–154.
Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Journal of Computer Communications, 30(11–12), 2385–2400.
Poornima, A. S., & Amberker, B. B. (2009). Protocols for secure node-to-cluster head communication in clustered wireless sensor networks. Proceedings of 2nd International Conference on Contemporary Computing, CCIS-40, 434–444.
Kao, J. C., & Marculescu, R. (2007). Minimizing eavesdropping risk by transmission power control in multihop wireless networks. IEEE Transaction on Computers, 56(8), 1009–1023.
Kao, J. C., & Marculescu, R. (2007). Energy-efficient anonymous multicast in mobile ad-hoc networks. Proceedings of 13th International Conference on Parallel and Distributed Systems, 1, 1–8.
Bashar, S., & Ding, Z. (2009). Optimum power allocation against information leakage in wireless network. Proceedings of 28th IEEE GLOBECOM, 1–6.
Xiao, Y., Rayi, V. K., Sun, B., Xiaojiang, D., Fei, H., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Journal of Computer Communications, 30(11–12), 2314–2341.
Jiang, C.-j., Shi, W.-r., Xiang, M., & Tang, X.-L. (2010). Energy-balanced unequal clustering protocol for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 17(4), 94–99.
Deng, J., Han, R., & Mishra, S. (2006). Limiting DoS attacks during multihop data delivery in wireless sensor networks. Journal of Security and Networks, 1(3/4), 167–178.
David, R. R., Marchany, R. C., & Midkiff, S. F. (2007). Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks. Proceedings of the 2007 IEEE Workshop on Information Assurance, 127–134.
Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks architectures and protocols. New Jersey: Prentice Hall.
Time Division Multiple Access. http://en.wikipedia.org/wiki/Time_division_multiple_access. Accessed 15 March 2010.
Kim, B. C., & Un, C. K. (1994). Capacity of wireless dynamic TDMA and media access control for packetized voice/data integration. Journal of Wireless Personal Communications, 1(4), 313–319.
Drakopoulos, E., & Gerakoulis, D. (1998). Performance of a dynamic TDMA system for mobile wireless access. International Journal of Wireless Information Networks, 5(4), 321–340.
Wu, C. M. (2007). Dynamic frame length channel assignment in wireless multihop ad hoc networks. Journal of Computer Communications, 30(18), 3832–3840.
Pomalaza-Raez, C. A., & Hemminger, T. L. (2002). A unified approach to dynamic TDMA slot assignment and to distributed routing for multi-hop packet radio networks. Proceedings of ANNIE Conference, 975–980.
Ren, F. C., Chang, C. J., & Cheng, R. G. (2002). QoS-guaranteed fuzzy transmission controller for dynamic TDMA protocol in multimedia communication. IEE Proceedings-Communications, 149(6), 292–298.
Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. Proceedings of International Conference on Systems and Network Communications, 1–4.
Atmel Corporation Product Document (2009). http://www.atmel.com/dyn/resources/prod_ documents/doc2467.pdf. Accessed 15 March 2010.
Ghosal, A., Halder, S., Sur, S., Dan, A., & DasBit, S. (2010). Ensuring basic security and preventing replay attack in a query processing application domain in WSN. Proceedings of International Conference on Computational Science and its Application (ICCSA), LNCS-6018, 321–335.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ghosal, A., Halder, S. & DasBit, S. A dynamic TDMA based scheme for securing query processing in WSN. Wireless Netw 18, 165–184 (2012). https://doi.org/10.1007/s11276-011-0393-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-011-0393-0