Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network

I

An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process.

International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 2, April 2018, pp. 1048~1055
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i2.pp1048-1055  1048
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Balancing Trade-off between Data Security and Energy Model
for Wireless Sensor Network
Manjunath B. E.1
, P. V. Rao2
1
Dept. of ECE, Jain University, Bangalore, India
2
Dept. of ECE, VBIT, Hyderabad, India
Article Info ABSTRACT
Article history:
Received Sep 7, 2017
Revised Jan 6, 2018
Accepted Jan 16, 2018
An extensive effort to evolve various routing protocol to ensure optimal data
delivery in energy efficient way is beneficial only if there is additional means
of security process is synchronized. However, the security process
consideration introduces additional overhead thus a security mechanism is
needed to accomplish an optimal trade-off that exists in-between security as
well as resource utilization especially energy. The prime purpose of this
paper is to develop a process of security in the context of wireless sensor
networks (WSN) by introducing two types of sensor node deployed with
different capabilities. The proposed algorithm Novel Model of Secure
Paradigm (N-MSP) which is further integrated with WSN. However, this
algorithm uses a Hash-based Message Authentication Code (HMAC)
authentication followed by pairwise key establishment during data
aggregation process in a WSN. The extensive simulation carried out in a
numerical platform called MATLAB that depicts that the proposed N-MSP
achieves optimal processing time along with energy efficient pairwise key
establishment during data aggregation process.
Keyword:
HMAC
Pair-wise key establishment
Security
WSN
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Manjunath B. E.,
Dept. of ECE,
Jain University,
Bangalore, India.
Email: manjunathbephd@gmail.com
1. INTRODUCTION
A WSN is formed with sensor nodes (SNs) using ad-hoc technology. Due to ad hoc technology, SNs
are self-configured and operates the data transfer without any access points as well the computing takes place
in a distributed manner. Traditionally, there exist many communication protocols such as Direct
Communication (DC), Minimum transmission energy (MTE) protocol like hop-by-hop. The problem found
in DC is the remote node from the sink die soon and is reserves in MTE, where nearby node die soon. A
hierarchal routing mechanism, where the entire network is divided into groups called clusters, and a local
sink in each cluster is elected which is called as a cluster head (CH) or aggregator node.
In initial cluster-based protocols, the cluster was static, which provides inconsistency of energy use
because of the successive election of the same node as CH. The limitation of the static cluster is overcome in
a state of artwork LEACH [1], wherein every communication cycle a new set of the cluster is formed and CH
election. Since LEACH, enormous efforts are made by various other researchers towards developing new
protocols for routing or communication, the collective information can be found in [2]. The WSNs having
exploding usage into different critical applications since its conceptualization on the timeline, and the few to
name includes (a) smart farming, (b) structural health monitoring, (c) fire detection in forest, (d) traffic
congestion, etc. till Internet of Things (IoT) application so it is not just limited to military applications rather
it has become a lifeline. The threats of attacks on this network are distinct philosophical to any network
Int J Elec & Comp Eng ISSN: 2088-8708 
Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.)
1049
security requirements. A detailed survey is about the current trend of a secure communication system in
WSN is presented [3].
Although the most recent techniques to enhance the security paradigm in WSN networking
environments are found efficient in securing the transmitted data packets still there exists a trade-off in
between safety and energy consumption where most of the routing based and optimization based techniques
lacks computational efficiency thus it generates power consumption overhead in overall systems. Therefore,
by addressing this above stated issue the proposed study conceptualized an energy efficient framework
namely N-MSP for secure data transmission and aggregation in a WSN.
The proposed secure framework adopted the features of Cryptography based security to authenticate
the message to be transmitted through a wireless channel. The technique utilizes an HMAC based
authentication scheme followed by pairwise key establishment during data aggregation process for two
different type of node set up. However, an extensive simulation has been carried out to verify the
performance efficiency of the proposed cryptography based N-MSP method which thereby depicts that being
a light-weight security framework; it achieves very less computation time and energy consumption
concerning iteration. It also shows that framework can easily manage the dynamicity of the network and
performs the hash-based message authentication in the different parameterized scenario. The performance
evaluation ensures its effectiveness on processing huge block size considering secure hash functions. The
proposed framework also performs a secure data aggregation irrespective of any additional computing
parameters. The paper organization is maintained as per the following orientation Section 2 describes all the
significant conventional studies and their respective contributions where as Section 3 presents the conceptual
system design for the prosed security paradigm, and Section 4 thereby discusses the implementation scenario,
simulation results obtained and analysis, and finally Section 5 concerns to conclude the overall work.
2. REVIEW OF LITERATURE
The related work study can be broadly categorized into three groups namely (a) Techniques for
Routing based security, (b) Techniques on Cryptographic-based security and (c) Techniques on Optimized
security models.
2.1. Techniques for Routing based Security
Literature survey shows, the routing based security techniques normally implemented with the
purpose of evolving security features on extensive routing operations. However, a closer look at the existing
literature shows that most of the conventional routing strategies are considerably modified to some extent
concerning security aspects. The prime objective of the existing studies was found more likely towards
enhancing the security features of routing protocols.
The study of Das, et al.; [4] most recently introduced a WSN driven threat modeling system to bring
resistance against wormhole as well as flooding attacks. Moreover, the study adopted the features of MAC
scheme to ensure optimal security management in a WSN.
The study of Nandu and Shekokar [5] designed a conceptual model about the network authentication
where the prime focus was laid towards defending DoS attack in WSN. The technique improvised the
concept of re-programming along with the ease of decoding-encoding, selection of scope and versioning.
To address the critical factors of cloud-based security models, the study of Henze et al.; [6]
presented a solution approach which involves confederation of IoT with cloud computing paradigm. The
study ensures higher acceptance of the proposed vision into the real-time cloud-based applications by
incorporating a comprehensive approach for privacy preservation of sensitive data. However, the method also
enables the integrity of cloud services to enhance the adaptable interface for privacy requirements.
Sasikumar and Preetha [7] exhibited an extensive performance analysis of secure LEACH based
clustering protocol from a theoretical perspective. However, most of the LEACH based protocols are found
vulnerable to the security attacks. Keeping key design complexities of LEACH into the mind, the proposed
study analyzes the performance competence of the secure-LEACH. The extensive simulation has been
carried out considering the verification of every node's authenticity along with discarding bogus messages,
intended to interrupt communication scenario. The outcome of the study thereby ensures the effectiveness of
secure-LEACH in protecting the network from intruders.
The study of Flinn et al.; [8] introduced a unique application of A-Star algorithm using enhancing
the heuristic component. The study is claimed to achieve a balanced flexibility in between the security and
the network efficiency. The study outcomes are verified by different levels changing topologies which
confirm that it ensures a high level of security at the cost of an optimal path when compared to the well-
known Dijkstra's algorithm.
A ring based grouping mechanism for WSN has been introduced in the study of Mengyao et al.; [9].
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 2, April 2018 : 1048 – 1055
1050
The study mostly intended to perform a secure inter-cluster communication where the security features are
mostly inclined towards supportable trust factors.
Adnan et al.; [10] conceptualized a secure protocol namely Secure Region-Based Geographic
Routing Protocol (SRBGR) for WSN communication paradigm. The protocol has been designed with the aim
of preventing undesirable packet transmission and increasing the probability of discovering relay nodes. The
experimental outcomes demonstrate that SRBGR outperforms the conventional techniques n terms of packet
delivery ratio. It also improves the network efficiency by resisting Sybil and blackhole attacks.
Masdari et al.; [11] tried to improve the performance efficiency of SECURE-LEACH protocol from
all possible security aspects. Further, the extensibility is defined as per the standard protocol implementation
scenario in WSN. The next segment discusses few of the significant contribution towards security
enhancements for WSN using cryptographic-based techniques.
2.2. Techniques on Cryptography Based Security
Cryptography based authentication is another way to provide high-level security on network
protocols. It incorporates encryption mechanism on transmitted data packets and makes it more secure while
sending through wireless communication channels. It is more often provided secure communication by
detecting vulnerable links on a WSN. However, most of the extensive reviews on cryptographic protocols
exhibit the fact that the high-level conceptual design and respective implementation scenario of conventional
cryptosystems are complex and error-prone. Thus it affects the performance of an overall system. However,
the analysis says that either one can develop his cryptography technique or can modify the old ones. The
most recent work carried out by Tomar et al.; [12] implemented an image-based authentication that enables
ECC cryptography for secure key exchange. The design analysis of the algorithm shows that it utilizes very
less key size and computing steps, thereby achieves computational efficiency regarding processing time and
key exchange time. Experimental outcomes further display its effectiveness towards providing a secure layer
to cloud computing networks.
The study of Soosahabi et al.; [13] presented a cryptographic probabilistic approach to the
deliberately present state of transmission whether it could be a harmless or harmful state.
Kabir et al.; [14] formulated a security framework involving privacy preservation of sensitive and
secret information. The proposed framework was claimed to be capable of handling security issues using
symmetric key cryptography. The study simulates the proposed framework under parameterized and
reconfigurable sensor nodes where execution time, memory, power consumption, and cost were considered
as performance parameters. The findings of the proposed work were compared with the significant prior
studies.
The study of Kodali and Sarma [15] an ECC based Diffe-Hellman key exchange protocol has been
proposed and implemented. The outcome of the study was verified under extensive simulation and studied
considering underlying protocol stack. The study outcomes offer lowered computational complexity during
implementation.
2.3. Techniques for Optimized Security Models
The recent survey towards optimized security models for WSN paradigms has claimed it to be an
active research area since 2010 onwards. In the recent past, most of the studies are found to adopt
optimization models into their work such as the study of Narad and Chavan [16] incorporated the concept of
the neural network to build up a new authentication scheme for WSN intensive routing operations.
Karapistol and Economides [17] have presented a modelling of security framework to address the
jamming attack in WSN. The proposed system adhere the features of game theory and thereby simulated
under extensive probability and utility factors. The design factors of the modelling considered the
components of Stackelberg games. It can be seen in the study of [18] that same author has carried out an
alternative simulation to detect the anomaly of respective events.
Poojashri et al.; [19] also introduced a game theoretical approach based framework to detect the
node compromise attack in WSN. The proposed system namely intelligent Intruder Detection System (IDS)
is proposed concerning three different functional components such as a combined framework using data
fusion, neural network, and game theory. The obtained simulation results show that the proposed model can
achieve significant outcomes while defending the attacks performed on sensitive information.
A bio-inspired algorithmic approach namely ant colony optimization has been utilized in the study
of Alrajeh et al.; [20] where the outcomes were verified under several optimized performance parameters.
The simulation results ensure its effectiveness in controlling data efficiency and minimizing the packet loss
during transmission.
Int J Elec & Comp Eng ISSN: 2088-8708 
Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.)
1051
Another implementation of game theoretical approach can be found in the study of Ding et al.; [21]
where the performance efficiency of the proposed model has been evaluated considering performance metric
of energy consumption during ciphering, memory consumption and execution time.
TO tackle the issues of node attacks, a trust-based secure routing (TSR) mechanism is discussed in
Ahmed et al. [22]. The outcomes of this mechanism under faulty node condition suggested that it achieves
better delivery ratio and throughput. A review work towards the comparing the different asymmetric
Cryptographic (ECC, RSA, DSA, etc.) algorithms was done for WNS by Singh and Chauhan [23]
considering various parameters (weakness, key strength, attacks). The work introduced by Wang et al., [24]
gives the security analysis for WSN by considering the wormhole attacks.With the designed security model
author has achieved highly effective and accurate security for WSN.
3. SYSTEM MODEL OF N-MSP
The proposed system aims to formulate a novel framework to enhance the security parameters of
conventional WSN considering a mix mode deployment strategy for two different types of sensor nodes such
as TYPE-1 and TYPE-2 sensor nodes. However, the study also aims to achieve an optimal trade-off in
between energy consumption and security during intensive routing operations. The following Figure 1
depicts the architectural framework of the conceptual model concerning key generation and clustering set up.
SYSTEM MODEL
Simulation Parameters
Init Type-1 Nodes
Init Type-2 Nodes
Mixed Mode
Deployment
Key Generation and
Clsutering
Initial KEY Setup
Pairing KEY Set up
Perform DATA
Aggregation
PERFORMANCE ANALYSIS
Figure 1. System Model of the Proposed Framework
The proposed system performs clustering of sensor nodes followed by secure data aggregation
where the concept of Hash-based Message Authentication Code (HMAC) plays a significant role. The
proposed model also uses a pairwise key generation process where each node generates unique key randomly
with a combined entity of private and public key components. The framework thereby performs HMAC
authentication scheme in each message transmitting from one sensor node to another during data aggregation
process. The HMAC authentication initiates SHA-1, SHA-256,
SHA-384, SHA-512 based on the requirements to process block size of data. Finally, the obtained
simulation results have been verified under several performance parameters regarding computation time T
measurement concerning the number of iteration performed by the algorithm during pairwise key
establishment and cluster key update. The experimental outcomes show the effectiveness of the proposed
method for reducing the computational cost and energy overhead.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 2, April 2018 : 1048 – 1055
1052
ALGORITHM ONE: Proposed Energy-Efficient Secure Data Transmission in WSN
Input: Ntype1, Ntype2, A
Output: Secure DA and Energy Efficient Communication
START
1. Initialize Ntype1 , Ntype2 , A;
2. Generate x, y localization under boundary;
3. Generate coordinates of Type-1 nodes;
4. Generate coordinates of Type-2 nodes;
5. Perform mixed mode deployment;
6. Perform, Initial KEY Setup;
7. Init MPKEY, PUBKEY, Crypto(hash) ;
8. Concatenate MPKEY , PUBKEY , Crypto(hash) ;
9. PLOT N;
10. Formation of a cluster
11. Perform pairing KEY set up
12. Compute pair of PARP-KEY, PARPUB-KEY
13. Generate individual node key randomly
14. Perform HMAC, SHA-1 on Ntype1 data.
15. Perform pairwise KEY generation
16. FOR (i1: Ntype1 )
17. COMPUTE Advmsg
18. COMPUTE dist.
19. END
20. Connect Ntype1 with Ntype2
21. Find out nodes within range
22. Set up communication
23. Select CH based on proximity
24. Select the node with minimum dist
25. Perform Data Aggregation
END
This algorithm depicts how the proposed N-MSP attains energy efficient securing data transmission
by incorporating the concept of HMAC with pairwise key generation. However, in the initial step, the
algorithm takes No. of Type-1 and Type-2 nodes as input and perform localization of respective nodes under
a specific boundary (Line: 1-4). Further, the algorithm performs a mix mode deployment of these on a fixed
area A with different types of capabilities (Line-5). The algorithm enables an initial KEY set up in every
node to perform data encryption on their respective data (Line-6). Further, it also initiates MPKEY,
PUBKEY and a Crypto(hash) to encrypt the data before transmission in the wireless network environment.
Later on, it concatenates all the key values and forms the network parameters (Line: 7-10). However, the
algorithm thereby formulates a clustering scheme for the ease of data aggregation and performs distribution
of pairing KEY followed by computation of partial private and public key (Line:10-13). The framework
incorporates a hash-based authentication scheme to validate every data packet which is present as follows
with a mathematical expression (Line-14).
HMAC (MPKEY, D)  (1)
H ((MPKEY
1
 opad) || H ((MPKEY
1
 iPad) || D)) (2) [25]
The above Equation (2) exhibits that the Crypto (hash) performs outer padding and inner padding in MPKEY
1
before performing exclusive or and concatenation operation on the data D to be authenticated. The following Table 1
represents the symbols and their respective description used in Algorithm-1.
The algorithm further performs pairwise key generation and further precisely address the nodes
which are within communication range. The cluster head selection is formulated based on a proximity
orientation where the node resides within a minimum distance also taken into consideration. Finally, the
algorithm performs the data aggregation before the initialization performance metrics. The next segment of
the proposed study performs a simulation of the proposed N-MSP algorithm where the various performance
metrics are taken into consideration to measure the computational efficiency of the proposed N-MSP to
maintain a balance between security and energy consumption. The simulation has been carried out
considering a numerical computing platform concerning different rounds.
Int J Elec & Comp Eng ISSN: 2088-8708 
Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.)
1053
Table 1. Symbol Representation
Sl. No Symbol Description
1 A Deployment Area
2 Ntype1 No of Sensor Node of Type-1
3 Ntype2 No of Sensor Node of Type-2
4 x, y Localization of Sensor Nodes
5 DA Data Aggregation
6 MPKEY Master Private key
7 PUBKEY Public Key
8 Crypto(hash) Cryptographic HASH function
9 N Network parameter
10 Advmsg Advertisement Message
11 dist Distance
12 PARP-KEY Partial Private key
13 PARPUB-KEY Partial Public key
14. D DATA
15 MPKEY
1
Secret key derived from original
key
16 H Cryptographic Hash
4. SIMULATION ENVIRONMENT
The proposed algorithm namely N-MSP has been simulated under MATLAB Computing Platform
running on 64-bit operating systems. The framework performs an extensive analysis of the proposed light-
weight cryptography algorithm concerning several performance parameters.
The simulation studied to evaluate the processing time required during cluster key update which is
plotted in (Figure 2), depicts that the proposed N-MSP achieves very less amount of processing time during
encryption process with cluster key update concerning different level of iteration. Thereby, the asymptotic
analysis conveys N-MSP's effectiveness on accomplishing computational efficiency. It also shows how the
processing time of the proposed N-MSP has been computed considering the different velocity of mobile
sensor nodes such as 1m/s, 2m/s, etc. However, in every simulation scenario more or less the proposed
system achieves very less computation time.
Figure 2. Iteration Vs. Processing Time (Sec) Figure 3. Iteration Vs. Energy Consumption (J)
The experimental outcomes also exhibit that despite having a capability to process a secure data
transmission faster our proposed algorithm also archives an optimal trade-off in between the security and
energy consumption. The extensive simulation carried out for observing the outcomes of pairwise key
establishment steps reveals that the proposed N-MSP also consume very less amount of energy concerning
iteration for different mobile nodes as in (Figure 3). The optimal energy consumption along with higher
computational efficiency makes the algorithm extensible and more active in future research perspectives.
5. CONCLUSION
Secure data transmission in WSN has become one of the most active research areas for many years.
The proposed study formulated a novel model of security paradigm namely N-MSP which can perform
efficient, secure hash oriented message authentication in an energy efficient manner. The proposed technique
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 2, April 2018 : 1048 – 1055
1054
most adheres the features of HMAC based SHA-1 to authenticate every sensor messages before performing
data aggregation on this. The obtained outcomes after simulating the proposed HMAC in a numerical
computing simulation tool exhibits its effectiveness on achieving very less processing time and energy
consumption. It also archives optimal trade-off in between energy and security. Moreover, the study ensures
its extensibility in futuristic sensor applications.
REFERENCES
[1] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless
microsensor networks," Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,
2000, pp. 10. vol.2.
[2] M. Z. Hasan, H. Al-Rizzo; F. Al-Turjman, “A Survey on Multipath Routing Protocols for QoS Assurances in Real-
Time Wireless Multimedia Sensor Networks," in IEEE Communications Surveys & Tutorials, No.99, pp.1-1, 2017.
[3] B.E. Manjunath and P.V. Rao, “Trends of Recent Secure Communication System and its Effectiveness in Wireless
Sensor Network” International Journal of Advanced Computer Science and Applications (IJACSA), Vol.7(9),
pp131-139, 2016.
[4] A.K.Das, R.Chaki, and K.N.Dey, "Secure energy-efficient routing protocol for the wireless sensor network,"
Foundations of Computing and Decision Sciences, Vol. 41, No. 1, pp.3-27, 2016.
[5] P.Nandu, and N. Shekokar, "An Enhanced Authentication Mechanism to Secure Re-programming in WSN,"
Procedia Computer Science, Vol. 45, pp.397-406, 2015.
[6] M. Henze, “A comprehensive approach to privacy in the cloud-based Internet of Things," Future Generation
Computer Systems, Vol. 56, pp.701-718, 2016.
[7] P. Sasikumar and K.S. Preetha, “Performance Analysis of Secure Leach Based Clustering Protocol in Wireless
Sensor Networks," International Journal of Applied Engineering Research, Vol. 10(14), pp.34035-34041, 2015.
[8] J. Flinn, H. S. Choi Ortiz, and S. Yuan, "A Secure Routing Scheme for Networks with Unknown or Dynamic
Topology using A-star Algorithm," Proceedings of the International Conference on Security and Management
(SAM). The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied
Computing (WorldComp), 2016.
[9] L. Mengyao, Y. Zhang, and X. Li, "Ring-based security energy-efficient routing protocol for WSN," In Control and
Decision Conference, The 26th Chinese, pp. 1892-1897, 2014.
[10] A.I. Adnan, Ali "A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor
Networks," PloS one, Vol. 12(1), 2017.
[11] M. Masdari, S.M. Bazarchi, and M. Bidaki, "Analysis of secure LEACH-based clustering protocols in wireless
sensor networks," Journal of Network and Computer Applications, Vol. 36(4), pp.1243-1260, 2013.
[12] A. S. Tomar, "Enhanced Image-Based Authentication with Secure Key Exchange Mechanism Using ECC in
Cloud," International Symposium on Security in Computing and Communication. Springer Singapore, 2016.
[13] R. Soosahabi and M. N-Pour, "Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor
Network," IEEE Transactions of Information Forensics and Security, Vol. 7(4), pp. 1118-1126, 2012.
[14] A.F.M. Kabir, "Efficient and secured rekeying based key distribution in wireless sensor architecture with Arduino
and XBee. Diss. Lethbridge, Alta.: The University of Lethbridge", Dept. of Mathematics and Computer Science,
2015.
[15] R.K. Kodali, and N.N. Sarma, "Energy efficient ECC encryption using ECDH," In Emerging Research in
Electronics, Computer Science and Technology Springer, pp. 471-478, 2014.
[16] S. Narad and P. Chavan, "Cascade Forward Back-propagation Neural Network Based Group Authentication Using
(n, n) Secret Sharing Scheme," Procedia Computer Science, Vol. 78, pp.185-191,2016.
[17] E. Karapistoli, and A.A. Economides, "Defending jamming attacks in wireless sensor networks using Stackelberg
monitoring strategies," In Communications in China (ICCC), pp. 161-165, 2014
[18] E. Karapistoli, and A.A. Economides, "ADLU: a novel anomaly detection and location-attribution algorithm for
UWB wireless sensor networks," EURASIP Journal of Information Security, pp.1-12, 2014.
[19] C.S.E. Poojashri, C. S., E. Sandeep Kumar, and S. V. Sathyanarayana. "A game-theoretic approach for combating
node compromise attack in Wireless Sensor Network," Communication and Signal Processing (ICCSP),
International Conference, 2016.
[20] N.A. Alrajeh, M.S. Alabed, and M.S. Elwahiby, "Secure ant-based routing protocol for the wireless sensor
network," International Journal of Distributed Sensor Networks, 2013.
[21] Y. Ding, X.W. Zhou, Z.M. Cheng, and F.H. Lin, "A security differential game model for sensor networks in
context of the internet of things.” Wireless personal communications, Vol.72(1), pp.375-388, 2013.
[22] Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, "Countering Node
Misbehavior Attacks Using Trust Based Secure Routing Protocol," TELKOMNIKA (Telecommunication Computing
Electronics and Control), Vol.13, No.1, pp. 260~268, March 2015.
[23] Pooja Singh, R.K. Chauhan, "A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in
WSN," International Journal of Electrical and Computer Engineering (IJECE), Vol. 7, No. 4, pp. 2232~2240,
August 2017.
[24] Hongbin Wang, Liping Feng, Rong Li, YiChi Zhang, "The Secure Localization Algorithm of SDV-HOP in Wireless
Sensor Networks," TELKOMNIKA (Telecommunication Computing Electronics and Control), Vol.14, No.3A, pp.
65~74, September 2016.
Int J Elec & Comp Eng ISSN: 2088-8708 
Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.)
1055
[25] H. Krawczyk, M. Bellare, R. Canetti,"HMAC: Keyed-Hashing for Message Authentication," Network Working
Group, Request for Comments, 2014
BIOGRAPHIES OF AUTHORS
Manjunath B. E., pursuing Ph.D. under Jain University. I have completed my M.Tech from SSIT,
Tumkur, VTU, Belagavi, Karnataka, India. My total work experience is around ten years. Attended
a Three Day Workshop on "ROBOTRYST – 2013" in association with Tryst IIT-Delhi. Attended a
Three Day National level Workshop on "Microcontroller MSP430 & its Applications" organized by
HKBK College of Engineering, Bangalore in association with VTU, Belgaum, Karnataka State
Council for Science and Technology, Bengaluru & M/s Advanced Electronics Systems at HKBK
campus on 30th January to 1st February 2012. Participated in a five day Mission10x workshop on
"Faculty Empowerment Program" conducted by Wipro, Bengaluru, from 23rd to 27th November
2009. Participated in a three day Mission10x Advanced workshop on "Faculty Empowerment
Program" conducted by Wipro, Bengaluru. Participated in a one day workshop on " Recent Trends
& Challenges in Indian Power Sector" organized by E&EE Dept., SKIT, Bengaluru, on 31st
October 2009.
Dr. P.V. Rao., Professor, Dept. of E&C, I have completed Ph.D. at Dr. MGR University, Chennai
in 2011. My total professional experience is around 23 years. My two Ph. D research scholars
submitted a thesis and awaiting for final debate guiding five Ph. D candidates in the area of Low
Power VLSI Signal processing and image processing from visvesvaraya Technical University,
Belagavi, Karnataka, India.

Recomendados

User Selective Encryption Method for Securing MANETs por
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs IJECEIAES
12 vistas9 diapositivas
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL... por
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
27 vistas13 diapositivas
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En... por
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
14 vistas9 diapositivas
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198) por
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
495 vistas6 diapositivas
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR... por
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
219 vistas23 diapositivas
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH... por
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
157 vistas22 diapositivas

Más contenido relacionado

La actualidad más candente

Security Model for Hierarchical Clustered Wireless Sensor Networks por
Security Model for Hierarchical Clustered Wireless Sensor NetworksSecurity Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
192 vistas13 diapositivas
Constructing a predictive model for an intelligent network intrusion detection por
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
161 vistas6 diapositivas
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN por
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNAssociation of Scientists, Developers and Faculties
91 vistas4 diapositivas
Mutual query data sharing protocol for public key encryption through chosen-c... por
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
97 vistas6 diapositivas
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY por
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
200 vistas8 diapositivas
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... por
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
69 vistas4 diapositivas

La actualidad más candente(20)

Security Model for Hierarchical Clustered Wireless Sensor Networks por CSCJournals
Security Model for Hierarchical Clustered Wireless Sensor NetworksSecurity Model for Hierarchical Clustered Wireless Sensor Networks
Security Model for Hierarchical Clustered Wireless Sensor Networks
CSCJournals192 vistas
Constructing a predictive model for an intelligent network intrusion detection por Alebachew Chiche
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
Alebachew Chiche161 vistas
Mutual query data sharing protocol for public key encryption through chosen-c... por IJECEIAES
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
IJECEIAES97 vistas
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY por ijcisjournal
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal200 vistas
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... por IRJET Journal
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal69 vistas
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ... por IJECEIAES
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
IJECEIAES11 vistas
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB... por IJNSA Journal
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
IJNSA Journal30 vistas
Efficient technique for privacy preserving publishing of set valued data on c... por ElavarasaN GanesaN
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN37 vistas
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS por ijasuc
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
ijasuc16 vistas
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion por IRJET Journal
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal37 vistas
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC) por ElavarasaN GanesaN
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN53 vistas
Framework for reversible data hiding using cost-effective encoding system for... por IJECEIAES
Framework for reversible data hiding using cost-effective encoding system for...Framework for reversible data hiding using cost-effective encoding system for...
Framework for reversible data hiding using cost-effective encoding system for...
IJECEIAES32 vistas
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ... por ijtsrd
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
ijtsrd58 vistas
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING por IJNSA Journal
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IJNSA Journal25 vistas
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -... por IJCI JOURNAL
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL264 vistas
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ... por IJCNCJournal
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal80 vistas
Enabling efficient multi keyword ranked por Sakthi Sundaram
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram160 vistas
Neural Cryptography for Secret Key Exchange por IJMTST Journal
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
IJMTST Journal75 vistas

Similar a Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network

An efficient approach for secured communication in wireless sensor networks por
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks IJECEIAES
24 vistas7 diapositivas
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio... por
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
29 vistas8 diapositivas
Aps 10june2020 por
Aps 10june2020Aps 10june2020
Aps 10june2020Gopal Mulgund
29 vistas34 diapositivas
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks por
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksAn Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksCSEIJJournal
2 vistas12 diapositivas
A secure trust-based protocol for hierarchical routing in wireless sensor ne... por
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
11 vistas12 diapositivas
Energy Proficient and Security Protocol for WSN: A Review por
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
345 vistas6 diapositivas

Similar a Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network (20)

An efficient approach for secured communication in wireless sensor networks por IJECEIAES
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks
IJECEIAES24 vistas
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio... por IJAAS Team
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...
IJAAS Team29 vistas
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks por CSEIJJournal
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksAn Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
CSEIJJournal2 vistas
A secure trust-based protocol for hierarchical routing in wireless sensor ne... por IJECEIAES
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
IJECEIAES11 vistas
Energy Proficient and Security Protocol for WSN: A Review por theijes
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes345 vistas
J031101064069 por theijes
J031101064069J031101064069
J031101064069
theijes257 vistas
Multi-stage secure clusterhead selection using discrete rule-set against unkn... por IJECEIAES
Multi-stage secure clusterhead selection using discrete rule-set against unkn...Multi-stage secure clusterhead selection using discrete rule-set against unkn...
Multi-stage secure clusterhead selection using discrete rule-set against unkn...
IJECEIAES30 vistas
Integrated Framework for Secure and Energy Efficient Communication System in ... por IJECEIAES
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
IJECEIAES20 vistas
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me... por IJAAS Team
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
IJAAS Team12 vistas
Secure and Trustable Routing in WSN for End to End Communication por IJMTST Journal
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
IJMTST Journal72 vistas
IEEE 2015 NS2 Projects por Vijay Karan
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
Vijay Karan52 vistas
IEEE 2015 NS2 Projects por Vijay Karan
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
Vijay Karan209 vistas
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR... por IJCI JOURNAL
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL237 vistas
A secure and energy saving protocol for wireless sensor networks por journalBEEI
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI26 vistas
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks por IJNSA Journal
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
IJNSA Journal14 vistas
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI... por ijassn
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
ijassn36 vistas
Efficient Data Aggregation in Wireless Sensor Networks por IJAEMSJORNAL
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL50 vistas
Current issue- International Journal of Advanced Smart Sensor Network Systems... por ijassn
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...
ijassn56 vistas

Más de IJECEIAES

Predictive fertilization models for potato crops using machine learning techn... por
Predictive fertilization models for potato crops using machine learning techn...Predictive fertilization models for potato crops using machine learning techn...
Predictive fertilization models for potato crops using machine learning techn...IJECEIAES
3 vistas9 diapositivas
Computer-aided automated detection of kidney disease using supervised learnin... por
Computer-aided automated detection of kidney disease using supervised learnin...Computer-aided automated detection of kidney disease using supervised learnin...
Computer-aided automated detection of kidney disease using supervised learnin...IJECEIAES
2 vistas10 diapositivas
Reliable and efficient webserver management for task scheduling in edge-cloud... por
Reliable and efficient webserver management for task scheduling in edge-cloud...Reliable and efficient webserver management for task scheduling in edge-cloud...
Reliable and efficient webserver management for task scheduling in edge-cloud...IJECEIAES
2 vistas10 diapositivas
Reinforcement learning-based security schema mitigating manin-the-middle atta... por
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...IJECEIAES
2 vistas14 diapositivas
Resource-efficient workload task scheduling for cloud-assisted internet of th... por
Resource-efficient workload task scheduling for cloud-assisted internet of th...Resource-efficient workload task scheduling for cloud-assisted internet of th...
Resource-efficient workload task scheduling for cloud-assisted internet of th...IJECEIAES
2 vistas10 diapositivas
Breast cancer classification with histopathological image based on machine le... por
Breast cancer classification with histopathological image based on machine le...Breast cancer classification with histopathological image based on machine le...
Breast cancer classification with histopathological image based on machine le...IJECEIAES
4 vistas13 diapositivas

Más de IJECEIAES(20)

Predictive fertilization models for potato crops using machine learning techn... por IJECEIAES
Predictive fertilization models for potato crops using machine learning techn...Predictive fertilization models for potato crops using machine learning techn...
Predictive fertilization models for potato crops using machine learning techn...
IJECEIAES3 vistas
Computer-aided automated detection of kidney disease using supervised learnin... por IJECEIAES
Computer-aided automated detection of kidney disease using supervised learnin...Computer-aided automated detection of kidney disease using supervised learnin...
Computer-aided automated detection of kidney disease using supervised learnin...
IJECEIAES2 vistas
Reliable and efficient webserver management for task scheduling in edge-cloud... por IJECEIAES
Reliable and efficient webserver management for task scheduling in edge-cloud...Reliable and efficient webserver management for task scheduling in edge-cloud...
Reliable and efficient webserver management for task scheduling in edge-cloud...
IJECEIAES2 vistas
Reinforcement learning-based security schema mitigating manin-the-middle atta... por IJECEIAES
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
IJECEIAES2 vistas
Resource-efficient workload task scheduling for cloud-assisted internet of th... por IJECEIAES
Resource-efficient workload task scheduling for cloud-assisted internet of th...Resource-efficient workload task scheduling for cloud-assisted internet of th...
Resource-efficient workload task scheduling for cloud-assisted internet of th...
IJECEIAES2 vistas
Breast cancer classification with histopathological image based on machine le... por IJECEIAES
Breast cancer classification with histopathological image based on machine le...Breast cancer classification with histopathological image based on machine le...
Breast cancer classification with histopathological image based on machine le...
IJECEIAES4 vistas
Early detection of dysphoria using electroencephalogram affective modelling por IJECEIAES
Early detection of dysphoria using electroencephalogram affective modelling Early detection of dysphoria using electroencephalogram affective modelling
Early detection of dysphoria using electroencephalogram affective modelling
IJECEIAES4 vistas
A novel defect detection method for software requirements inspections por IJECEIAES
A novel defect detection method for software requirements inspections A novel defect detection method for software requirements inspections
A novel defect detection method for software requirements inspections
IJECEIAES2 vistas
Convolutional auto-encoded extreme learning machine for incremental learning ... por IJECEIAES
Convolutional auto-encoded extreme learning machine for incremental learning ...Convolutional auto-encoded extreme learning machine for incremental learning ...
Convolutional auto-encoded extreme learning machine for incremental learning ...
IJECEIAES2 vistas
Brain cone beam computed tomography image analysis using ResNet50 for collate... por IJECEIAES
Brain cone beam computed tomography image analysis using ResNet50 for collate...Brain cone beam computed tomography image analysis using ResNet50 for collate...
Brain cone beam computed tomography image analysis using ResNet50 for collate...
IJECEIAES2 vistas
Channel and spatial attention mechanism for fashion image captioning por IJECEIAES
Channel and spatial attention mechanism for fashion image captioning Channel and spatial attention mechanism for fashion image captioning
Channel and spatial attention mechanism for fashion image captioning
IJECEIAES2 vistas
Regional feature learning using attribute structural analysis in bipartite at... por IJECEIAES
Regional feature learning using attribute structural analysis in bipartite at...Regional feature learning using attribute structural analysis in bipartite at...
Regional feature learning using attribute structural analysis in bipartite at...
IJECEIAES2 vistas
Adaptive traffic lights based on traffic flow prediction using machine learni... por IJECEIAES
Adaptive traffic lights based on traffic flow prediction using machine learni...Adaptive traffic lights based on traffic flow prediction using machine learni...
Adaptive traffic lights based on traffic flow prediction using machine learni...
IJECEIAES2 vistas
Content-based product image retrieval using squared-hinge loss trained convol... por IJECEIAES
Content-based product image retrieval using squared-hinge loss trained convol...Content-based product image retrieval using squared-hinge loss trained convol...
Content-based product image retrieval using squared-hinge loss trained convol...
IJECEIAES2 vistas
A deep convolutional structure-based approach for accurate recognition of ski... por IJECEIAES
A deep convolutional structure-based approach for accurate recognition of ski...A deep convolutional structure-based approach for accurate recognition of ski...
A deep convolutional structure-based approach for accurate recognition of ski...
IJECEIAES2 vistas
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s... por IJECEIAES
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IJECEIAES2 vistas
Analysis and prediction of seed quality using machine learning por IJECEIAES
Analysis and prediction of seed quality using machine learning Analysis and prediction of seed quality using machine learning
Analysis and prediction of seed quality using machine learning
IJECEIAES2 vistas
Explainable extreme boosting model for breast cancer diagnosis por IJECEIAES
Explainable extreme boosting model for breast cancer diagnosis Explainable extreme boosting model for breast cancer diagnosis
Explainable extreme boosting model for breast cancer diagnosis
IJECEIAES2 vistas
Predicting active compounds for lung cancer based on quantitative structure-a... por IJECEIAES
Predicting active compounds for lung cancer based on quantitative structure-a...Predicting active compounds for lung cancer based on quantitative structure-a...
Predicting active compounds for lung cancer based on quantitative structure-a...
IJECEIAES4 vistas
U-Net transfer learning backbones for lesions segmentation in breast ultrasou... por IJECEIAES
U-Net transfer learning backbones for lesions segmentation in breast ultrasou...U-Net transfer learning backbones for lesions segmentation in breast ultrasou...
U-Net transfer learning backbones for lesions segmentation in breast ultrasou...
IJECEIAES2 vistas

Último

Plant Design Report-Oil Refinery.pdf por
Plant Design Report-Oil Refinery.pdfPlant Design Report-Oil Refinery.pdf
Plant Design Report-Oil Refinery.pdfSafeen Yaseen Ja'far
7 vistas10 diapositivas
MK__Cert.pdf por
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdfHassan Khan
19 vistas1 diapositiva
_MAKRIADI-FOTEINI_diploma thesis.pptx por
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptxfotinimakriadi
12 vistas32 diapositivas
REACTJS.pdf por
REACTJS.pdfREACTJS.pdf
REACTJS.pdfArthyR3
37 vistas16 diapositivas
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptxgopinathcreddy
21 vistas47 diapositivas
Web Dev Session 1.pptx por
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptxVedVekhande
17 vistas22 diapositivas

Último(20)

_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi12 vistas
REACTJS.pdf por ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR337 vistas
Web Dev Session 1.pptx por VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande17 vistas
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 22 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn8 vistas
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla6317 vistas
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf por AlhamduKure
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdfASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
ASSIGNMENTS ON FUZZY LOGIC IN TRAFFIC FLOW.pdf
AlhamduKure8 vistas
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil63 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy37 vistas
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous9 vistas
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth649 vistas
Créativité dans le design mécanique à l’aide de l’optimisation topologique por LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologiqueCréativité dans le design mécanique à l’aide de l’optimisation topologique
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE8 vistas

Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 2, April 2018, pp. 1048~1055 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i2.pp1048-1055  1048 Journal homepage: http://iaescore.com/journals/index.php/IJECE Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network Manjunath B. E.1 , P. V. Rao2 1 Dept. of ECE, Jain University, Bangalore, India 2 Dept. of ECE, VBIT, Hyderabad, India Article Info ABSTRACT Article history: Received Sep 7, 2017 Revised Jan 6, 2018 Accepted Jan 16, 2018 An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process. Keyword: HMAC Pair-wise key establishment Security WSN Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Manjunath B. E., Dept. of ECE, Jain University, Bangalore, India. Email: manjunathbephd@gmail.com 1. INTRODUCTION A WSN is formed with sensor nodes (SNs) using ad-hoc technology. Due to ad hoc technology, SNs are self-configured and operates the data transfer without any access points as well the computing takes place in a distributed manner. Traditionally, there exist many communication protocols such as Direct Communication (DC), Minimum transmission energy (MTE) protocol like hop-by-hop. The problem found in DC is the remote node from the sink die soon and is reserves in MTE, where nearby node die soon. A hierarchal routing mechanism, where the entire network is divided into groups called clusters, and a local sink in each cluster is elected which is called as a cluster head (CH) or aggregator node. In initial cluster-based protocols, the cluster was static, which provides inconsistency of energy use because of the successive election of the same node as CH. The limitation of the static cluster is overcome in a state of artwork LEACH [1], wherein every communication cycle a new set of the cluster is formed and CH election. Since LEACH, enormous efforts are made by various other researchers towards developing new protocols for routing or communication, the collective information can be found in [2]. The WSNs having exploding usage into different critical applications since its conceptualization on the timeline, and the few to name includes (a) smart farming, (b) structural health monitoring, (c) fire detection in forest, (d) traffic congestion, etc. till Internet of Things (IoT) application so it is not just limited to military applications rather it has become a lifeline. The threats of attacks on this network are distinct philosophical to any network
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.) 1049 security requirements. A detailed survey is about the current trend of a secure communication system in WSN is presented [3]. Although the most recent techniques to enhance the security paradigm in WSN networking environments are found efficient in securing the transmitted data packets still there exists a trade-off in between safety and energy consumption where most of the routing based and optimization based techniques lacks computational efficiency thus it generates power consumption overhead in overall systems. Therefore, by addressing this above stated issue the proposed study conceptualized an energy efficient framework namely N-MSP for secure data transmission and aggregation in a WSN. The proposed secure framework adopted the features of Cryptography based security to authenticate the message to be transmitted through a wireless channel. The technique utilizes an HMAC based authentication scheme followed by pairwise key establishment during data aggregation process for two different type of node set up. However, an extensive simulation has been carried out to verify the performance efficiency of the proposed cryptography based N-MSP method which thereby depicts that being a light-weight security framework; it achieves very less computation time and energy consumption concerning iteration. It also shows that framework can easily manage the dynamicity of the network and performs the hash-based message authentication in the different parameterized scenario. The performance evaluation ensures its effectiveness on processing huge block size considering secure hash functions. The proposed framework also performs a secure data aggregation irrespective of any additional computing parameters. The paper organization is maintained as per the following orientation Section 2 describes all the significant conventional studies and their respective contributions where as Section 3 presents the conceptual system design for the prosed security paradigm, and Section 4 thereby discusses the implementation scenario, simulation results obtained and analysis, and finally Section 5 concerns to conclude the overall work. 2. REVIEW OF LITERATURE The related work study can be broadly categorized into three groups namely (a) Techniques for Routing based security, (b) Techniques on Cryptographic-based security and (c) Techniques on Optimized security models. 2.1. Techniques for Routing based Security Literature survey shows, the routing based security techniques normally implemented with the purpose of evolving security features on extensive routing operations. However, a closer look at the existing literature shows that most of the conventional routing strategies are considerably modified to some extent concerning security aspects. The prime objective of the existing studies was found more likely towards enhancing the security features of routing protocols. The study of Das, et al.; [4] most recently introduced a WSN driven threat modeling system to bring resistance against wormhole as well as flooding attacks. Moreover, the study adopted the features of MAC scheme to ensure optimal security management in a WSN. The study of Nandu and Shekokar [5] designed a conceptual model about the network authentication where the prime focus was laid towards defending DoS attack in WSN. The technique improvised the concept of re-programming along with the ease of decoding-encoding, selection of scope and versioning. To address the critical factors of cloud-based security models, the study of Henze et al.; [6] presented a solution approach which involves confederation of IoT with cloud computing paradigm. The study ensures higher acceptance of the proposed vision into the real-time cloud-based applications by incorporating a comprehensive approach for privacy preservation of sensitive data. However, the method also enables the integrity of cloud services to enhance the adaptable interface for privacy requirements. Sasikumar and Preetha [7] exhibited an extensive performance analysis of secure LEACH based clustering protocol from a theoretical perspective. However, most of the LEACH based protocols are found vulnerable to the security attacks. Keeping key design complexities of LEACH into the mind, the proposed study analyzes the performance competence of the secure-LEACH. The extensive simulation has been carried out considering the verification of every node's authenticity along with discarding bogus messages, intended to interrupt communication scenario. The outcome of the study thereby ensures the effectiveness of secure-LEACH in protecting the network from intruders. The study of Flinn et al.; [8] introduced a unique application of A-Star algorithm using enhancing the heuristic component. The study is claimed to achieve a balanced flexibility in between the security and the network efficiency. The study outcomes are verified by different levels changing topologies which confirm that it ensures a high level of security at the cost of an optimal path when compared to the well- known Dijkstra's algorithm. A ring based grouping mechanism for WSN has been introduced in the study of Mengyao et al.; [9].
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 2, April 2018 : 1048 – 1055 1050 The study mostly intended to perform a secure inter-cluster communication where the security features are mostly inclined towards supportable trust factors. Adnan et al.; [10] conceptualized a secure protocol namely Secure Region-Based Geographic Routing Protocol (SRBGR) for WSN communication paradigm. The protocol has been designed with the aim of preventing undesirable packet transmission and increasing the probability of discovering relay nodes. The experimental outcomes demonstrate that SRBGR outperforms the conventional techniques n terms of packet delivery ratio. It also improves the network efficiency by resisting Sybil and blackhole attacks. Masdari et al.; [11] tried to improve the performance efficiency of SECURE-LEACH protocol from all possible security aspects. Further, the extensibility is defined as per the standard protocol implementation scenario in WSN. The next segment discusses few of the significant contribution towards security enhancements for WSN using cryptographic-based techniques. 2.2. Techniques on Cryptography Based Security Cryptography based authentication is another way to provide high-level security on network protocols. It incorporates encryption mechanism on transmitted data packets and makes it more secure while sending through wireless communication channels. It is more often provided secure communication by detecting vulnerable links on a WSN. However, most of the extensive reviews on cryptographic protocols exhibit the fact that the high-level conceptual design and respective implementation scenario of conventional cryptosystems are complex and error-prone. Thus it affects the performance of an overall system. However, the analysis says that either one can develop his cryptography technique or can modify the old ones. The most recent work carried out by Tomar et al.; [12] implemented an image-based authentication that enables ECC cryptography for secure key exchange. The design analysis of the algorithm shows that it utilizes very less key size and computing steps, thereby achieves computational efficiency regarding processing time and key exchange time. Experimental outcomes further display its effectiveness towards providing a secure layer to cloud computing networks. The study of Soosahabi et al.; [13] presented a cryptographic probabilistic approach to the deliberately present state of transmission whether it could be a harmless or harmful state. Kabir et al.; [14] formulated a security framework involving privacy preservation of sensitive and secret information. The proposed framework was claimed to be capable of handling security issues using symmetric key cryptography. The study simulates the proposed framework under parameterized and reconfigurable sensor nodes where execution time, memory, power consumption, and cost were considered as performance parameters. The findings of the proposed work were compared with the significant prior studies. The study of Kodali and Sarma [15] an ECC based Diffe-Hellman key exchange protocol has been proposed and implemented. The outcome of the study was verified under extensive simulation and studied considering underlying protocol stack. The study outcomes offer lowered computational complexity during implementation. 2.3. Techniques for Optimized Security Models The recent survey towards optimized security models for WSN paradigms has claimed it to be an active research area since 2010 onwards. In the recent past, most of the studies are found to adopt optimization models into their work such as the study of Narad and Chavan [16] incorporated the concept of the neural network to build up a new authentication scheme for WSN intensive routing operations. Karapistol and Economides [17] have presented a modelling of security framework to address the jamming attack in WSN. The proposed system adhere the features of game theory and thereby simulated under extensive probability and utility factors. The design factors of the modelling considered the components of Stackelberg games. It can be seen in the study of [18] that same author has carried out an alternative simulation to detect the anomaly of respective events. Poojashri et al.; [19] also introduced a game theoretical approach based framework to detect the node compromise attack in WSN. The proposed system namely intelligent Intruder Detection System (IDS) is proposed concerning three different functional components such as a combined framework using data fusion, neural network, and game theory. The obtained simulation results show that the proposed model can achieve significant outcomes while defending the attacks performed on sensitive information. A bio-inspired algorithmic approach namely ant colony optimization has been utilized in the study of Alrajeh et al.; [20] where the outcomes were verified under several optimized performance parameters. The simulation results ensure its effectiveness in controlling data efficiency and minimizing the packet loss during transmission.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.) 1051 Another implementation of game theoretical approach can be found in the study of Ding et al.; [21] where the performance efficiency of the proposed model has been evaluated considering performance metric of energy consumption during ciphering, memory consumption and execution time. TO tackle the issues of node attacks, a trust-based secure routing (TSR) mechanism is discussed in Ahmed et al. [22]. The outcomes of this mechanism under faulty node condition suggested that it achieves better delivery ratio and throughput. A review work towards the comparing the different asymmetric Cryptographic (ECC, RSA, DSA, etc.) algorithms was done for WNS by Singh and Chauhan [23] considering various parameters (weakness, key strength, attacks). The work introduced by Wang et al., [24] gives the security analysis for WSN by considering the wormhole attacks.With the designed security model author has achieved highly effective and accurate security for WSN. 3. SYSTEM MODEL OF N-MSP The proposed system aims to formulate a novel framework to enhance the security parameters of conventional WSN considering a mix mode deployment strategy for two different types of sensor nodes such as TYPE-1 and TYPE-2 sensor nodes. However, the study also aims to achieve an optimal trade-off in between energy consumption and security during intensive routing operations. The following Figure 1 depicts the architectural framework of the conceptual model concerning key generation and clustering set up. SYSTEM MODEL Simulation Parameters Init Type-1 Nodes Init Type-2 Nodes Mixed Mode Deployment Key Generation and Clsutering Initial KEY Setup Pairing KEY Set up Perform DATA Aggregation PERFORMANCE ANALYSIS Figure 1. System Model of the Proposed Framework The proposed system performs clustering of sensor nodes followed by secure data aggregation where the concept of Hash-based Message Authentication Code (HMAC) plays a significant role. The proposed model also uses a pairwise key generation process where each node generates unique key randomly with a combined entity of private and public key components. The framework thereby performs HMAC authentication scheme in each message transmitting from one sensor node to another during data aggregation process. The HMAC authentication initiates SHA-1, SHA-256, SHA-384, SHA-512 based on the requirements to process block size of data. Finally, the obtained simulation results have been verified under several performance parameters regarding computation time T measurement concerning the number of iteration performed by the algorithm during pairwise key establishment and cluster key update. The experimental outcomes show the effectiveness of the proposed method for reducing the computational cost and energy overhead.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 2, April 2018 : 1048 – 1055 1052 ALGORITHM ONE: Proposed Energy-Efficient Secure Data Transmission in WSN Input: Ntype1, Ntype2, A Output: Secure DA and Energy Efficient Communication START 1. Initialize Ntype1 , Ntype2 , A; 2. Generate x, y localization under boundary; 3. Generate coordinates of Type-1 nodes; 4. Generate coordinates of Type-2 nodes; 5. Perform mixed mode deployment; 6. Perform, Initial KEY Setup; 7. Init MPKEY, PUBKEY, Crypto(hash) ; 8. Concatenate MPKEY , PUBKEY , Crypto(hash) ; 9. PLOT N; 10. Formation of a cluster 11. Perform pairing KEY set up 12. Compute pair of PARP-KEY, PARPUB-KEY 13. Generate individual node key randomly 14. Perform HMAC, SHA-1 on Ntype1 data. 15. Perform pairwise KEY generation 16. FOR (i1: Ntype1 ) 17. COMPUTE Advmsg 18. COMPUTE dist. 19. END 20. Connect Ntype1 with Ntype2 21. Find out nodes within range 22. Set up communication 23. Select CH based on proximity 24. Select the node with minimum dist 25. Perform Data Aggregation END This algorithm depicts how the proposed N-MSP attains energy efficient securing data transmission by incorporating the concept of HMAC with pairwise key generation. However, in the initial step, the algorithm takes No. of Type-1 and Type-2 nodes as input and perform localization of respective nodes under a specific boundary (Line: 1-4). Further, the algorithm performs a mix mode deployment of these on a fixed area A with different types of capabilities (Line-5). The algorithm enables an initial KEY set up in every node to perform data encryption on their respective data (Line-6). Further, it also initiates MPKEY, PUBKEY and a Crypto(hash) to encrypt the data before transmission in the wireless network environment. Later on, it concatenates all the key values and forms the network parameters (Line: 7-10). However, the algorithm thereby formulates a clustering scheme for the ease of data aggregation and performs distribution of pairing KEY followed by computation of partial private and public key (Line:10-13). The framework incorporates a hash-based authentication scheme to validate every data packet which is present as follows with a mathematical expression (Line-14). HMAC (MPKEY, D)  (1) H ((MPKEY 1  opad) || H ((MPKEY 1  iPad) || D)) (2) [25] The above Equation (2) exhibits that the Crypto (hash) performs outer padding and inner padding in MPKEY 1 before performing exclusive or and concatenation operation on the data D to be authenticated. The following Table 1 represents the symbols and their respective description used in Algorithm-1. The algorithm further performs pairwise key generation and further precisely address the nodes which are within communication range. The cluster head selection is formulated based on a proximity orientation where the node resides within a minimum distance also taken into consideration. Finally, the algorithm performs the data aggregation before the initialization performance metrics. The next segment of the proposed study performs a simulation of the proposed N-MSP algorithm where the various performance metrics are taken into consideration to measure the computational efficiency of the proposed N-MSP to maintain a balance between security and energy consumption. The simulation has been carried out considering a numerical computing platform concerning different rounds.
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.) 1053 Table 1. Symbol Representation Sl. No Symbol Description 1 A Deployment Area 2 Ntype1 No of Sensor Node of Type-1 3 Ntype2 No of Sensor Node of Type-2 4 x, y Localization of Sensor Nodes 5 DA Data Aggregation 6 MPKEY Master Private key 7 PUBKEY Public Key 8 Crypto(hash) Cryptographic HASH function 9 N Network parameter 10 Advmsg Advertisement Message 11 dist Distance 12 PARP-KEY Partial Private key 13 PARPUB-KEY Partial Public key 14. D DATA 15 MPKEY 1 Secret key derived from original key 16 H Cryptographic Hash 4. SIMULATION ENVIRONMENT The proposed algorithm namely N-MSP has been simulated under MATLAB Computing Platform running on 64-bit operating systems. The framework performs an extensive analysis of the proposed light- weight cryptography algorithm concerning several performance parameters. The simulation studied to evaluate the processing time required during cluster key update which is plotted in (Figure 2), depicts that the proposed N-MSP achieves very less amount of processing time during encryption process with cluster key update concerning different level of iteration. Thereby, the asymptotic analysis conveys N-MSP's effectiveness on accomplishing computational efficiency. It also shows how the processing time of the proposed N-MSP has been computed considering the different velocity of mobile sensor nodes such as 1m/s, 2m/s, etc. However, in every simulation scenario more or less the proposed system achieves very less computation time. Figure 2. Iteration Vs. Processing Time (Sec) Figure 3. Iteration Vs. Energy Consumption (J) The experimental outcomes also exhibit that despite having a capability to process a secure data transmission faster our proposed algorithm also archives an optimal trade-off in between the security and energy consumption. The extensive simulation carried out for observing the outcomes of pairwise key establishment steps reveals that the proposed N-MSP also consume very less amount of energy concerning iteration for different mobile nodes as in (Figure 3). The optimal energy consumption along with higher computational efficiency makes the algorithm extensible and more active in future research perspectives. 5. CONCLUSION Secure data transmission in WSN has become one of the most active research areas for many years. The proposed study formulated a novel model of security paradigm namely N-MSP which can perform efficient, secure hash oriented message authentication in an energy efficient manner. The proposed technique
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 2, April 2018 : 1048 – 1055 1054 most adheres the features of HMAC based SHA-1 to authenticate every sensor messages before performing data aggregation on this. The obtained outcomes after simulating the proposed HMAC in a numerical computing simulation tool exhibits its effectiveness on achieving very less processing time and energy consumption. It also archives optimal trade-off in between energy and security. Moreover, the study ensures its extensibility in futuristic sensor applications. REFERENCES [1] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000, pp. 10. vol.2. [2] M. Z. Hasan, H. Al-Rizzo; F. Al-Turjman, “A Survey on Multipath Routing Protocols for QoS Assurances in Real- Time Wireless Multimedia Sensor Networks," in IEEE Communications Surveys & Tutorials, No.99, pp.1-1, 2017. [3] B.E. Manjunath and P.V. Rao, “Trends of Recent Secure Communication System and its Effectiveness in Wireless Sensor Network” International Journal of Advanced Computer Science and Applications (IJACSA), Vol.7(9), pp131-139, 2016. [4] A.K.Das, R.Chaki, and K.N.Dey, "Secure energy-efficient routing protocol for the wireless sensor network," Foundations of Computing and Decision Sciences, Vol. 41, No. 1, pp.3-27, 2016. [5] P.Nandu, and N. Shekokar, "An Enhanced Authentication Mechanism to Secure Re-programming in WSN," Procedia Computer Science, Vol. 45, pp.397-406, 2015. [6] M. Henze, “A comprehensive approach to privacy in the cloud-based Internet of Things," Future Generation Computer Systems, Vol. 56, pp.701-718, 2016. [7] P. Sasikumar and K.S. Preetha, “Performance Analysis of Secure Leach Based Clustering Protocol in Wireless Sensor Networks," International Journal of Applied Engineering Research, Vol. 10(14), pp.34035-34041, 2015. [8] J. Flinn, H. S. Choi Ortiz, and S. Yuan, "A Secure Routing Scheme for Networks with Unknown or Dynamic Topology using A-star Algorithm," Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016. [9] L. Mengyao, Y. Zhang, and X. Li, "Ring-based security energy-efficient routing protocol for WSN," In Control and Decision Conference, The 26th Chinese, pp. 1892-1897, 2014. [10] A.I. Adnan, Ali "A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks," PloS one, Vol. 12(1), 2017. [11] M. Masdari, S.M. Bazarchi, and M. Bidaki, "Analysis of secure LEACH-based clustering protocols in wireless sensor networks," Journal of Network and Computer Applications, Vol. 36(4), pp.1243-1260, 2013. [12] A. S. Tomar, "Enhanced Image-Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud," International Symposium on Security in Computing and Communication. Springer Singapore, 2016. [13] R. Soosahabi and M. N-Pour, "Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Network," IEEE Transactions of Information Forensics and Security, Vol. 7(4), pp. 1118-1126, 2012. [14] A.F.M. Kabir, "Efficient and secured rekeying based key distribution in wireless sensor architecture with Arduino and XBee. Diss. Lethbridge, Alta.: The University of Lethbridge", Dept. of Mathematics and Computer Science, 2015. [15] R.K. Kodali, and N.N. Sarma, "Energy efficient ECC encryption using ECDH," In Emerging Research in Electronics, Computer Science and Technology Springer, pp. 471-478, 2014. [16] S. Narad and P. Chavan, "Cascade Forward Back-propagation Neural Network Based Group Authentication Using (n, n) Secret Sharing Scheme," Procedia Computer Science, Vol. 78, pp.185-191,2016. [17] E. Karapistoli, and A.A. Economides, "Defending jamming attacks in wireless sensor networks using Stackelberg monitoring strategies," In Communications in China (ICCC), pp. 161-165, 2014 [18] E. Karapistoli, and A.A. Economides, "ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks," EURASIP Journal of Information Security, pp.1-12, 2014. [19] C.S.E. Poojashri, C. S., E. Sandeep Kumar, and S. V. Sathyanarayana. "A game-theoretic approach for combating node compromise attack in Wireless Sensor Network," Communication and Signal Processing (ICCSP), International Conference, 2016. [20] N.A. Alrajeh, M.S. Alabed, and M.S. Elwahiby, "Secure ant-based routing protocol for the wireless sensor network," International Journal of Distributed Sensor Networks, 2013. [21] Y. Ding, X.W. Zhou, Z.M. Cheng, and F.H. Lin, "A security differential game model for sensor networks in context of the internet of things.” Wireless personal communications, Vol.72(1), pp.375-388, 2013. [22] Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, "Countering Node Misbehavior Attacks Using Trust Based Secure Routing Protocol," TELKOMNIKA (Telecommunication Computing Electronics and Control), Vol.13, No.1, pp. 260~268, March 2015. [23] Pooja Singh, R.K. Chauhan, "A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN," International Journal of Electrical and Computer Engineering (IJECE), Vol. 7, No. 4, pp. 2232~2240, August 2017. [24] Hongbin Wang, Liping Feng, Rong Li, YiChi Zhang, "The Secure Localization Algorithm of SDV-HOP in Wireless Sensor Networks," TELKOMNIKA (Telecommunication Computing Electronics and Control), Vol.14, No.3A, pp. 65~74, September 2016.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  Balancing Trade-off between Data Security and Energy Model for Wireless Sensor …. (Manjunath B. E.) 1055 [25] H. Krawczyk, M. Bellare, R. Canetti,"HMAC: Keyed-Hashing for Message Authentication," Network Working Group, Request for Comments, 2014 BIOGRAPHIES OF AUTHORS Manjunath B. E., pursuing Ph.D. under Jain University. I have completed my M.Tech from SSIT, Tumkur, VTU, Belagavi, Karnataka, India. My total work experience is around ten years. Attended a Three Day Workshop on "ROBOTRYST – 2013" in association with Tryst IIT-Delhi. Attended a Three Day National level Workshop on "Microcontroller MSP430 & its Applications" organized by HKBK College of Engineering, Bangalore in association with VTU, Belgaum, Karnataka State Council for Science and Technology, Bengaluru & M/s Advanced Electronics Systems at HKBK campus on 30th January to 1st February 2012. Participated in a five day Mission10x workshop on "Faculty Empowerment Program" conducted by Wipro, Bengaluru, from 23rd to 27th November 2009. Participated in a three day Mission10x Advanced workshop on "Faculty Empowerment Program" conducted by Wipro, Bengaluru. Participated in a one day workshop on " Recent Trends & Challenges in Indian Power Sector" organized by E&EE Dept., SKIT, Bengaluru, on 31st October 2009. Dr. P.V. Rao., Professor, Dept. of E&C, I have completed Ph.D. at Dr. MGR University, Chennai in 2011. My total professional experience is around 23 years. My two Ph. D research scholars submitted a thesis and awaiting for final debate guiding five Ph. D candidates in the area of Low Power VLSI Signal processing and image processing from visvesvaraya Technical University, Belagavi, Karnataka, India.