Enhancing The Life Time Of Wireless Sensor Networks Using SOBAS

K. Dhana Bhavithra*, S. Anandamurugan**
* PG Student, Kongu Engineering College, Perundurai, India.
** Assistant Professor (SLG), Kongu Engineering College, Perundurai, India.
Periodicity:October - December'2014
DOI : https://doi.org/10.26634/jwcn.3.3.3080

Abstract

The Secure Source-BAsed loose Synchronization (SOBAS) protocol is introduced, to securely synchronize the events in the network, without the transmission of explicit synchronization control messages. Nodes use their local time value and initial vector value as a one-time dynamic key to encrypt each message. SOBAS provides an effective dynamic en-route filtering mechanism, where the malicious data is filtered from the network. Instead of synchronizing each sensor globally, SOBAS focuses on ensuring that each source node is synchronized with the sink such that event reports generated by the sink are ordered properly. Hence, the objective of the SOBAS protocol is to provide a loose synchronization protocol for WSNs rather than a perfect synchronization among the nodes. With loose synchronization, it reduces the number of control messages needed for a WSN to operate providing the key benefits of reduced energy consumption as well as reducing the opportunity for malicious nodes to eavesdrop, intercept, or be made aware of the presence of the network. Thus, SOBAS (Source-BAsed loose Synchronization) provides energy efficient and an effective technique to securely synchronize the nodes on the data delivery path in the network.

Keywords

SOBAS (Source-BAsed loose Synchronization), Loose Synchronization, Wireless Sensor Network, Dynamic Enroute Filtering.

How to Cite this Article?

Bhavithra, K.D., and Anandamurugan, S. (2014). Enhancing The Life Time Of Wireless Sensor Networks Using SOBAS. i-manager's Journal on Wireless Communication Networks, 3(3), 12-17. https://doi.org/10.26634/jwcn.3.3.3080

References

[1]. Akan O. and Akyildiz I., (2005). 'Event-to-Sink Reliable Transport in Wireless Sensor Networks', IEEE/ACM Transaction Networking, Vol. 13, No. 5, pp. 1003-1017.
[2]. Boukerche and Turgut D., (2007). 'Secure Time Synchronization Protocols for Wireless Sensor Networks', IEEE Wireless Communication, Vol. 14, No. 5, pp. 64-69.
[3]. Fluhrer S.R., Mantin I., and Shamir A., (2001). 'Weaknesses in the Key Scheduling Algorithm of RC4', Proceeding Revised Papers from the Eighth Annual International Workshop Selected Areas in Cryptography (SAC), pp. 1-24.
[4]. Ganeriwal S., Capkun S., Han C.C, and Srivastava M.B., (2005). 'Secure time Synchronization Service for Sensor Networks', Proceeding ACM Workshop Wireless Security (WiSe), pp. 97-106.
[5]. Kraub C., Schneider M., Bayarou K., and Eckert C., (2007). 'Stef: A Secure Ticket-Based En-Route Filtering Scheme for Wireless Sensor Networks', Proceeding Second International Conference Availability, Reliability and Security (ARES), pp. 310-317.
[6]. Passing M. and Dressler F., (2006). 'Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes', Proceeding in IEEE International Conference Mobile Adhoc and Sensor Systems (MASS), pp. 882-887.
[7]. Pottie G.F. and Kaiser W.J., (2000). 'Wireless Integrated Network Sensors', Communication ACM, Vol. 43, No. 5, pp. 51-58.
[8]. Ren F., Lin C., and Liu F., (2008). 'Self- Correcting Time Synchronization Using Reference Broadcast in Wireless Sensor Network', IEEE Wireless Communication, Vol. 15, No. 4, pp. 79-85.
[9]. Roman R., Alcaraz C., and Lopez J., (2007). 'A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes', Mobile Networks and Applications, Vol. 12, No. 4, pp. 231-244.
[10]. Selcuk Uluagac A., Raheem Beyah A., and John Copeland A., (2013). 'Secure sOurce-BAsed loose Synchronization (SOBAS) for Wireless Sensor Networks', IEEE Transactions on Parallel and distributed systems, Vol. 24, No. 4, pp. 803-812.
[11]. Sun K., Ning P., and Wang C., (2006). 'Secure and Resilient Clock Synchronization in Wireless Sensor Networks', IEEE Journal on Selected Areas Communication, Vol. 24, No. 2, pp. 395-408.
[12]. Uluagac S., Lee C., Beyah R., and Copeland J, (2008). 'Designing Secure Protocols for Wireless Sensor Networks', Wireless Algorithms, Systems, and Applications, Vol. 5258, pp. 503-514.
[13]. Venugopalan R.V., (2003). 'Encryption Overhead in Embedded Systems and Sensor Network Nodes: Modeling and Analysis', Proceeding of International Conference on Compilers, Architecture and Synthesis for Embedded Systems pp.188-197.
[14]. Xiao Y., Rayi V.K., Sun B., Du X., Hu F., and Galloway M, (2007). 'A Survey of Key Management Schemes in Wireless SensorNetworks', Computer Communication, Vol. 30, No. 11/12, pp. 2314-2341.
[15]. Yu Z. and Guan Y., (2006). 'A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks', Proceeding of IEEE INFOCOM, pp. 1-12.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.