Skip to main content

Advertisement

Log in

Securing wireless sensor networks for improved performance in cloud-based environments

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Cloud computing has a great potential to assist in storing and processing data collected from sensors placed in any environment such as smart homes, vehicles, hospitals, enemy surveillance areas, volcanoes, oceans, etc. The sensors may be implanted in the form of a body sensor network or placed in the surroundings. The data recorded by these sensors may further be used for several applications implemented in the cloud as well as other services. Here, the data is acquired from sensors through the wireless medium. Recent studies show that wireless sensor networks (WSNs) are vulnerable to various kinds of security threats and there is a requirement of a security solution that safeguards them from lethal attacks. In this paper, we modify the low-energy adaptive clustering hierarchy (LEACH) protocol for WSNs and add the functionality of intrusion detection to secure WSNs from sinkhole, black hole, and selective forwarding attacks. The modified protocol is called LEACH++. We perform two types of analyses: numerical analysis to check the effect on throughput and energy, and simulations in Network Simulator-2 (NS-2) to prove the results found from the numerical analysis. The results are quite promising and favor LEACH++ over LEACH under attack with respect to throughput and energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig.3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abdullah M, Alsanee E, Alseheymi N (2014) Energy efficient cluster-based intrusion detection system for wireless sensor networks. Int J Adv Comput Sci Appl 5(9):10–15

    Google Scholar 

  2. Akkaya, K., & Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Elsevier Ad Hoc Networks , 325–349.

  3. Al-Shurman, M., Yoo, S. M., & Park, S. (2004). Black hole attack in mobile ad hoc networks. 42nd Annual Southeast Regional Conference ACM-SE, (pp. 96–97).

  4. Biren G. (2012). Cloud: An enabler for a smarter home. https://www.ibm.com/blogs/cloudcomputing/2012/03/cloud-an-enabler-for-a-smarter-home/

  5. Bojkovic ZS, Bakmaz BM, Bakmaz MR (2008) Security issues in wireless sensor networks. International Journal of Communications II(1):106–115.

    Google Scholar 

  6. Doukas, C. & Maglogiannis, I. (2011). Managing wearable sensor data through cloud computing. Third IEEE International Conference on Cloud Computing Technology and Science, (pp. 440–445).

  7. Camara C, Peris-Lopez P, Tapiador J (2015) Security and privacy issues in implantable medical devices. Journal of Biomedical Informatics 55:272–289.

  8. Chen, S., Yang, G., & Chen, S. (2010). A security routing mechanism against Sybil attack for wireless sensor networks. International Conference on Communications and Mobile Computing, (pp. 142–146).

  9. Da Silva AP, Martins MH, Rocha BP, Loureiro AA, Ruiz LB, Wong WC (2005) Decentralized intrusion detection in wireless sensor networks. Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks. ACM, Quebec, pp 16–23

    Google Scholar 

  10. Deng H, Li W, Agrawal DP (2002) Routing security in ad hoc networks. IEEE Communications Magazine, Special Topics on security in Telecommunication Networks 40(10):70–75

    Google Scholar 

  11. Farooqi, A. H., & Khan, F. A. (2012). A survey of intrusion detection systems for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 9(2):69–83.

  12. Farooqi, A. H., & Khan, F. A. (2009). “Intrusion Detection Systems for Wireless Sensor Networks: A Survey. International Conference on Future Generation Communication and Networking, Jeju, South Korea. 234–241.

  13. Farooqi AH, Khan FA, Wang J, Lee S (2013) A novel intrusion detection framework for wireless sensor networks. Pers Ubiquit Comput 17(5):907–919

    Article  Google Scholar 

  14. Ferreira, A. C., Vilaça, M. A., Oliveira, L. B., Habib, E., Wong, H. C., & Loureiro, A. A. (2005). On the security of cluster-based communication protocols for wireless sensor networks. 4th IEEE International Conference on Networking, (pp. 449–458).

  15. Hayajneh T, Mohd BJ, Imran M, Almashaqbeh G, Vasilakos AV (March 2016) Secure authentication for remote patient monitoring with wireless medical sensor networks. Sensors 16(424):1–25

    Google Scholar 

  16. Heinzelman, W. (2011). From Wendi Heinzelman Home page: http://www.ece.rochester.edu/~wheinzel/research.html#code

  17. Heinzelman WB, Chandrakasan AP, Balakrishnan H (2002) An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun 1(4):660–670

    Article  Google Scholar 

  18. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2000). Energy-efficient routing protocols for wireless microsensor networks. 33rd Hawaii International Conference System Sciences. Maui, HI.

  19. Herbert D, Sundaram V, Lu YH, Bagchi S, Li Z (2007) Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. ACM Transactions on Autonomous and Adaptive Systems 2(3):1–23

    Article  Google Scholar 

  20. Hsieh MY, Huang YM, Chao HC (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11–12):2385–2400

    Article  Google Scholar 

  21. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. The first IEEE International Workshop on Sensor Network Protocols and Applications (pp. 113–127). IEEE.

  22. Krontiris I, Dimitriou T (2007) Towards intrusion detection in wireless sensor networks. In: 13th European Wireless Conference. ENSTA and SEE, Paris

    Google Scholar 

  23. Krontiris I, Dimitriou T, Giannetsos T (2008a) LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. ACM Secure Communication. Fourth International Conference on Security and Privacy for Communication Networks, Istanbul, Turkey

    Book  Google Scholar 

  24. Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008b). Launching a sinkhole attack in wireless sensor networks: the intruder side. International Conference on Wireless and Mobile Computing Networking and Communications, (pp. 526–531).

  25. Lee S, Lee Y, Yoo SG (2012) A specification based intrusion detection mechanism for LEACH protocol. Inf Technol J 11(1):40–48

    Article  Google Scholar 

  26. Lounis A, Hadjidj A, Bouabdallah A, Challal Y (2015) Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur Gener Comput Syst 55:266–277

    Article  Google Scholar 

  27. Marchang, N., & Datta, R. (2008). Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks, 6(4): 508–523

  28. Masdari M, Bazarchi SM, Bidaki M (2013) Analysis of secure LEACH-based clustering protocols in wireless sensor networks. J Netw Comput Appl 36(2013):1243–1260

    Article  Google Scholar 

  29. Sultan, N. (2014). Making use of cloud computing for healthcare provision: Opportunities and challenges. International Journal of Information Management 34(2): 177–184

  30. Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A. & Salvador, G. S. (2010). A cloud computing solution for patient's data collection in health care institutions. Second IEEE International Conference on eHealth, Telemedicine, and Social Medicine, (pp. 95–99)

  31. Zhang, R. & Liu, L. (2010). Security models and requirements for healthcare application clouds. 3rd IEEE International Conference on Cloud Computing, (pp. 268–275), Miami, FL.

  32. Rahayu, T. M., Lee, S.-G., & Lee, H.-J. (2014, February). Survey on LEACH-based security protocols. 16th International Conference on Advanced Communication Technology, 304–309.

  33. Rajasegarar S, Leckie C, Palansiwami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34–40

    Article  Google Scholar 

  34. Roman, R., Zhou, J., & Lopez, J. (2006). Applying intrusion detection systems to wireless sensor networks. 3rd IEEE Consumer Communications and Networking Conference (pp. 640–644). IEEE Communications Society.

  35. Roosta, T., Shieh, S., & Sastry, S. (2006). Taxonomy of security attacks in sensor networks and countermeasures. First International Conference on System Integration and Reliability Improvements. Hanoi, Vietnam: IEEE.

  36. Su, C. C., Chang, K. M., Kuo, Y. H., & Horng, M. F. (2005). The new intrusion prevention and detection approaches for clustering-based sensor networks. IEEE Wireless Communications and Networking Conference, (pp. 1927–1932).

  37. Sundararajan RK, Arumugam U (2015) Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors 2015:1–12

  38. Teodoroa PG, Verdejo JD, Fernandez GM, Vazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Computers and Security 28:18–28

    Article  Google Scholar 

  39. Tian, L., ChangDu, H., & Huang, Y. (2012, June). The simulation and analysis of LEACH protocol for wireless sensor network protocol for wireless sensor network based on NS2. International Conference on System Science and Engineering, 530–533.

  40. Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. Computer (pp. 54–62). IEEE Computer Society.

  41. Wu, D., Hu, G., & Ni, G. (2008). Research and improve on secure routing protocols in wireless sensor networks. 4th IEEE International Conference on Circuits and Systems for Communications (pp. 853–856).

  42. Wang, X. & Tan, Y. (2010). Application of cloud computing in the health information system. International Conference on Computer Application and System Modeling, (pp. 179–182).

  43. Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34:1302–1325

    Article  Google Scholar 

  44. Zhang, K., Wang, C., & Wang C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (pp. 1–5).

  45. Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556

    Article  Google Scholar 

  46. Zhou, J., Cao, Z., Dong, X., & Lin, X. (2015). Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions and, future directions. IEEE Wireless Communications, 136–144.

Download references

Acknowledgements

The authors would like to extend their sincere appreciation to the Deanship of Scientific Research at King Saud University for its funding of this research through the Research Group Project no. RGP-214. The authors would also like to thank the Higher Education Commission (HEC), Pakistan, for its support through the indigenous PhD fellowship program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farrukh Aslam Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farooqi, A.H., Khan, F.A. Securing wireless sensor networks for improved performance in cloud-based environments. Ann. Telecommun. 72, 265–282 (2017). https://doi.org/10.1007/s12243-017-0566-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-017-0566-7

Keywords

Navigation