Skip to main content
Log in

A dynamic TDMA based scheme for securing query processing in WSN

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Nodes in a wireless sensor network (WSN) are generally deployed in unattended environments making the nodes susceptible to attacks. Therefore, the need of defending such attacks becomes a big challenge. We propose a scheme to build a security mechanism in a query-processing paradigm within WSN. The scheme is capable of protecting replay attack while preserving essential properties of security such as authentication, data integrity and data freshness. The solution is made lightweight using symmetric key cryptography with very short-length key. Further, the key used in our scheme is neither pre-deployed nor is transmitted directly. The key information is established among nodes through an efficient use of one variant of dynamic TDMA mechanism which ensures security of key. Another variant of dynamic TDMA is used to make the scheme bandwidth saving, an essential quality of WSN. Performance of the scheme is analyzed in terms of storage, computation and communication overhead. Finally the analytical results are compared with two of the existing schemes including the previous version of the present scheme that show significant reduction of all such overheads thereby proving the suitability of the proposed scheme for a resource-constrained network like WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.

    Article  Google Scholar 

  2. DasBit, S., & Ragupathy, R. (2008). Routing in MANET and sensor network—A 3D position based approach. Journal of Foundation of Computing and Decision Sciences, 33(3), 211–239.

    Google Scholar 

  3. Ghosal, A., Halder, S., & DasBit, S. (2009). A scheme to tolerate jamming in multiple nodes in wireless sensor networks. Proceedings of Wireless VITAE, IEEE press, 948–951.

  4. Ghosal, A., Halder, S., Chatterjee, S., Sen, J., & DasBit, S. (2009). Estimating delay in a data forwarding scheme for defending jamming attack in wireless sensor network. Proceedings of 3rd International Conference NGMAST, IEEE CS press, 351–356.

  5. Halder, S., Ghosal, A., Sur, S., Dan, A., & DasBit, S. (2009). A lifetime enhancing node deployment strategy in WSN. Proceedings of Future Generation Information Technology, LNCS-5899, 296–308.

    Google Scholar 

  6. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy efficient communication protocol for wireless microsensor networks. Proceedings of 33rd Hawaii International Conference on System Sciences, 2, 8020–8029.

  7. Ferreira, A. C., Vilaca, M. A., Oliveira, L. B., Habib, E., Wang, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. Proceedings of 4th International Conference on Networking, LNCS-3420, 449–458.

  8. Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54–62.

    Article  Google Scholar 

  9. Crosby, G. V., Pissinou, N., & Gadze, J. (2006). A framework for trust-based cluster head election in wireless sensor networks. Proceedings of 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems, 13–22.

  10. Lee, P., Kim, J., Han, I., Rye, H., & Ahn, W. H. (2007). Secure cluster header election techniques in sensor network. Proceedings of ISPA Workshop, LNCS-4743, 20–31.

    Google Scholar 

  11. Oliveira, L. B., Wong, H.C., Bern, M., Dahab, R., & Loureiro, A. A. F. (2006). SecLEACH—A random key distribution solution for securing clustered sensor networks. Proceedings of 5th IEEE International Symposium on Network Computing and Applications, 145–154.

  12. Hsieh, M. Y., Huang, Y. M., & Chao, H. C. (2007). Adaptive security design with malicious node detection in cluster-based sensor networks. Journal of Computer Communications, 30(11–12), 2385–2400.

    Article  Google Scholar 

  13. Poornima, A. S., & Amberker, B. B. (2009). Protocols for secure node-to-cluster head communication in clustered wireless sensor networks. Proceedings of 2nd International Conference on Contemporary Computing, CCIS-40, 434–444.

  14. Kao, J. C., & Marculescu, R. (2007). Minimizing eavesdropping risk by transmission power control in multihop wireless networks. IEEE Transaction on Computers, 56(8), 1009–1023.

    Article  MathSciNet  Google Scholar 

  15. Kao, J. C., & Marculescu, R. (2007). Energy-efficient anonymous multicast in mobile ad-hoc networks. Proceedings of 13th International Conference on Parallel and Distributed Systems, 1, 1–8.

  16. Bashar, S., & Ding, Z. (2009). Optimum power allocation against information leakage in wireless network. Proceedings of 28th IEEE GLOBECOM, 1–6.

  17. Xiao, Y., Rayi, V. K., Sun, B., Xiaojiang, D., Fei, H., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Journal of Computer Communications, 30(11–12), 2314–2341.

    Article  Google Scholar 

  18. Jiang, C.-j., Shi, W.-r., Xiang, M., & Tang, X.-L. (2010). Energy-balanced unequal clustering protocol for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 17(4), 94–99.

    Article  Google Scholar 

  19. Deng, J., Han, R., & Mishra, S. (2006). Limiting DoS attacks during multihop data delivery in wireless sensor networks. Journal of Security and Networks, 1(3/4), 167–178.

    Article  Google Scholar 

  20. David, R. R., Marchany, R. C., & Midkiff, S. F. (2007). Scalable, Cluster-based Anti-replay Protection for Wireless Sensor Networks. Proceedings of the 2007 IEEE Workshop on Information Assurance, 127–134.

  21. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks architectures and protocols. New Jersey: Prentice Hall.

    Google Scholar 

  22. Time Division Multiple Access. http://en.wikipedia.org/wiki/Time_division_multiple_access. Accessed 15 March 2010.

  23. Kim, B. C., & Un, C. K. (1994). Capacity of wireless dynamic TDMA and media access control for packetized voice/data integration. Journal of Wireless Personal Communications, 1(4), 313–319.

    Article  Google Scholar 

  24. Drakopoulos, E., & Gerakoulis, D. (1998). Performance of a dynamic TDMA system for mobile wireless access. International Journal of Wireless Information Networks, 5(4), 321–340.

    Article  Google Scholar 

  25. Wu, C. M. (2007). Dynamic frame length channel assignment in wireless multihop ad hoc networks. Journal of Computer Communications, 30(18), 3832–3840.

    Article  Google Scholar 

  26. Pomalaza-Raez, C. A., & Hemminger, T. L. (2002). A unified approach to dynamic TDMA slot assignment and to distributed routing for multi-hop packet radio networks. Proceedings of ANNIE Conference, 975–980.

  27. Ren, F. C., Chang, C. J., & Cheng, R. G. (2002). QoS-guaranteed fuzzy transmission controller for dynamic TDMA protocol in multimedia communication. IEE Proceedings-Communications, 149(6), 292–298.

    Article  Google Scholar 

  28. Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. Proceedings of International Conference on Systems and Network Communications, 1–4.

  29. Atmel Corporation Product Document (2009). http://www.atmel.com/dyn/resources/prod_ documents/doc2467.pdf. Accessed 15 March 2010.

  30. Ghosal, A., Halder, S., Sur, S., Dan, A., & DasBit, S. (2010). Ensuring basic security and preventing replay attack in a query processing application domain in WSN. Proceedings of International Conference on Computational Science and its Application (ICCSA), LNCS-6018, 321–335.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amrita Ghosal.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ghosal, A., Halder, S. & DasBit, S. A dynamic TDMA based scheme for securing query processing in WSN. Wireless Netw 18, 165–184 (2012). https://doi.org/10.1007/s11276-011-0393-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-011-0393-0

Keywords

Navigation