Providing Authenticity and Integrity for Disseminated Data Items in Wireless Sensor Networks

Authors

  • Bhargavi Peta Department of Computer Science, Bradley University, 1718 west barker avenue Peoria Illinois, United States

DOI:

https://doi.org/10.62760/iteecs.2.3.2023.58

Keywords:

Wireless sensor network, Sensors, DiDrip protocol

Abstract

A Wireless sensor Network (WSN) may also be a wireless network comprising a number of sensor nodes and is used to monitor both the environmental and physical status of a given area. WSN constitute one of the most important technologies in each of the most important applications. Unit of measurement for WSN that are susceptible to security risks. Multiple Protocols are being developed to make them secure. The protection of sensitive information is the primary focus of many of the protocols that make up the major. The term given to these protocols is the knowledge discovery and dissemination protocols. Distributing management instructions and changing configuration settings on sensor nodes is accomplished with the help of the data detection and distribution protocol for WSN. Each and every one of the currently used protocols for the discovery and distribution of information has two major shortcomings. To a large extent, they encourage a centralized method (only extremely inexpensive stations are able to disseminate data item), and this is the case. This strategy is not suitable for situations in which there are numerous owners and various users. Second, security was not a consideration throughout the development of the protocols. This article proposes the first distributed information detection and distribution protocol, known as DiDrip, that is more secure than existing ones. The protocol allows numerous homeowners to authorize several network users with entirely different priorities simultaneously and immediately flow into information items to sensor nodes. This may be done by multiple homeowners simultaneously using the same protocol.

References

N. Vipul, A. K. Daniel and P. Chaturvedi "E-FEERP: Enhanced Fuzzy based Energy Efficient Routing Protocol for Wireless Sensor Network." Wireless Personal Communications, pp.1-28, 2023.

S. Vikrant, S. Vats, D. Arora, K. Singh, A. S. Prabuwono, M. S. Alzaidi and A. Ahmadian. "OGAS: Omni-directional Glider Assisted Scheme for autonomous deployment of sensor nodes in open area wireless sensor network." ISA transactions, Vol. 132, pp. 131-145, 2023.

T. Natalie, C. Sergiou, C. Georgiou and Vasos Vassiliou "A survey on mobility in wireless sensor networks." Ad Hoc Networks, Vol. 125, art.no: 102726, 2022.

S. Neelakandan, P. Mohan, Y. Alotaibi, S. Alghamdi and O. A. Khalaf “An efficient metaheuristic-based clustering with routing protocol for underwater wireless sensor networks”, Sensors Vol. 22, No. 2, pp. 1-15. 2022.

J. W. Hui and D. Culler “The dynamic behavior of a data dissemination protocol for network programming at scale,” Proceedings of 2nd International Conference on Embedded Networked Sensor Systems, pp. 81–94, 2004.

D. He, C. Chen, S. Chan, and J. Bu “DiCode: DoS-resistant and distributed code dissemination in wireless sensor networks,” IEEE Transactions on Wireless Communications, Vol. 11, No. 5, pp. 1946-1956, 2012.

T. Dang, N. Bulusu, W. Feng, and S. Park “Dhv: A code consistency maintenance protocol for multi-hop wireless sensor networks." In Wireless Sensor Networks: 6th European Conference, Cork, Ireland, February, pp. 11-13, 2009.

G. Tolle and D. Culler “Design of an application-cooperative management system for wireless sensor networks,” Proceedings of the Second European Workshop on Wireless Sensor Networks, pp. 121–132, 2005.

K. Lin and P. Levis, “Data discovery and dissemination with DIP,” In 2008 International Conference on Information Processing in Sensor Networks, pp. 433-444, 2008.

M. Ceriotti, G. P. Picco, A. L. Murphy, S. Guna, M. Corra, M.Pozzi, D. Zonta, and P. Zanon, “Monitoring heritage buildingswith wireless sensor networks: The Torre Aquila deployment,” 2009 International Conference on Information Processing in Sensor Networks, pp. 277–288, 2009.

D. He, S. Chan, S. Tang, and M. Guizani, “Secure data discovery and dissemination based on hash tree for wireless sensor networks,” IEEE transactions on wireless communications, Vol. 12, No. 9, pp. 4638–4646, 2013.

M. Rahman, N. Nasser, and T. Taleb “Pairing-based secure timing synchronization for heterogeneous sensor networks,” 2008 IEEE Global Telecommunications Conference, pp. 1–5, 2008.

P. Levis, N. Patel, D. Culler, and S. Shenker, “Trickle: A self-regulating algorithm for code maintenance and propagation in wireless sensor networks,” In First USENIX/ACM Symposium on Network Systems Design and Implementation, pp. 15–28, 2004.

Y. Chen, I. Lin, C. Lei, and Y. Liao, “Broadcast authentication in sensor networks using compressed bloom filters,” In Distributed Computing in Sensor Systems: 4th IEEE International Conference, pp. 99–111, 2008.

Additional Files

Published

2023-09-30

How to Cite

Peta, B. (2023). Providing Authenticity and Integrity for Disseminated Data Items in Wireless Sensor Networks. International Transactions on Electrical Engineering and Computer Science, 2(3), 112–117. https://doi.org/10.62760/iteecs.2.3.2023.58

Issue

Section

Articles

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.