Skip to main content

Advertisement

Log in

Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks (WSN) are naturally resource-constrained and have been deployed in various applications such as home monitoring, health care monitoring and military systems. These applications are connected to numerous devices capable of interacting with each other over the internet called as Internet of Things (IoT). WSN application plays a main part in the IoT environment. In WSN, sensors are randomly positioned in harsh surroundings where the communication network is facing privacy issues which is the most critical for data transmission. In this paper, we proposed a cryptographic based clustering structure for preserving data privacy using Optimal Privacy-Multihop Dynamic Clustering Routing Protocol (OP-MDCRP) that improves data privacy and energy efficient routing for the heterogeneous network which uses both clustering and multi-hop communication to reduce the energy consumption of sensor node and increases the lifetime of WSN. Based on the area, the source nodes are grouped to form a cluster in the random network. This scheme also provides high data privacy using Elliptic Curve Integrated Encryption-Key Provisioning Method (ECIES-KPM) along with small key size. Besides, data security based attacks are restricted by ECIES-KPM verification process. In this way, the sensitive data is confidentiality secured with low computational overhead. Experimental comparison shows that the evaluation of OP-MDCRP approach provides more data security than existing methods in terms of computational time, packet delivery ratio, energy consumption, average delay, network overhead and network lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Adat V, Gupta BB (2018) Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67(3):423–441

    Article  Google Scholar 

  2. Yuvaraja M, Sabrigiriraj M (2017) Fault detection and recovery scheme for routing and lifetime enhancement in WSN. Wirel Netw 23(1):267–277

    Article  Google Scholar 

  3. Zhao J (2017) Topological properties of secure wireless sensor networks under the $ q $-composite key Predistribution scheme with unreliable links. IEEE/ACM Trans Networking 25(3):1789–1802

    Article  Google Scholar 

  4. Patil B, Kadam R (2018) A novel approach to secure routing protocols in WSN. In2018 2nd international conference on inventive systems and control (ICISC) (pp. 1094-1097). IEEE

  5. Thirukrishna JT, Karthik S, Arunachalam VP (2018 Apr 30) Revamp energy efficiency in homogeneous wireless sensor networks using optimized radio energy algorithm (OREA) and power-aware distance source routing protocol. Futur Gener Comput Syst 81:331–339

    Article  Google Scholar 

  6. Otoum S, Kantarci B, Mouftah HT (2017) Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. InCommunications (ICC), 2017 IEEE international conference on May 21 (pp. 1-6). IEEE

  7. Gao Q, Ma W, Luo W (2017) A combinatorial key predistribution scheme for two-layer hierarchical wireless sensor networks. Wirel Pers Commun 96(2):2179–2204

  8. Wazid M, Das AK (2017) A secure group-based Blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun 94(3):1165–1191

    Article  Google Scholar 

  9. Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KK (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204

    Article  Google Scholar 

  10. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594–2608

    Article  Google Scholar 

  11. Lopez J, Rios R, Bao F, Wang G (2017) Evolving privacy: from sensors to the internet of things. Futur Gener Comput Syst 75:46–57

    Article  Google Scholar 

  12. Malviya AR, Jagdale BN (2015) Location privacy of multiple sink using zone partitioning approach in WSN. InApplied and theoretical computing and communication technology (iCATccT), 2015 international conference on Oct 29 (pp. 449-454). IEEE

  13. George CM, Kumar M (2013) Cluster based location privacy in wireless sensor networks against a universal adversary. InInformation communication and embedded systems (ICICES), 2013 international conference on Feb 21 (pp. 288-293). IEEE

  14. Sivashankari S, Mohamed RM (2013) A framework of trust management on location privacy and minimizing the error rate in wireless sensor networks, in Optical Imaging Sensor and Security (ICOSS), International Conference on 2013

  15. Gurjar A, Patil ARB (2013) Cluster Based Anonymization for Source Location Privacy in Wireless Sensor Network, in Communication Systems and Network Technologies (CSNT), International Conference on 2013

  16. Kumar V, Madria S (2013) PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks, in Reliable Distributed Systems (SRDS), IEEE 32nd International Symposium on 2013

  17. Jhumka A, Bradbury M, Leeke M (2012) Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources, in Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 11th International Conference on2012

  18. Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143–1155

    Article  Google Scholar 

  19. Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312

    Article  Google Scholar 

  20. Wu F, Xu L, Kumari S, Li X, Shen J, Choo KK, Wazid M, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J Netw Comput Appl 89:72–85

    Article  Google Scholar 

  21. Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325

    Article  Google Scholar 

  22. Yang C, Puthal D, Mohanty SP, Kougianos E (2017) Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks. IEEE Consumer Electronics Magazine 6(4):48–56

    Article  Google Scholar 

  23. Tai WL, Chang YF, Li WH (2017) An IOT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. Journal of Information Security and Applications 34:133–141

    Article  Google Scholar 

  24. Song T, Li R, Mei B, Yu J, Xing X, Cheng X (2017) A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J 4(6):1844–1852

    Article  Google Scholar 

  25. Li X, Niu J, Bhuiyan MZ, Wu F, Karuppiah M, Kumari S (2018) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Transactions on Industrial Informatics 14(8):3599–3609

    Article  Google Scholar 

  26. Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Futur Gener Comput Syst 84:200–215

    Article  Google Scholar 

  27. Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering 69:534–554

    Article  Google Scholar 

  28. Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Computer Science 54:73–82

    Article  Google Scholar 

  29. Somsuk K, Sanemueang C (2018) The new modified methodology to solve ECDLP based on brute force attack. InInternational conference on computing and information technology (pp. 255-264). Springer, Cham

  30. Singh T, Singh J, Sharma S (2017) Energy efficient secured routing protocol for MANETs. Wirel Netw 23(4):1001–1009

    Article  Google Scholar 

  31. Batra PK, Kant K (2016) LEACH-MAC: a new cluster head selection algorithm for wireless sensor networks. Wirel Netw 22(1):49–60

    Article  Google Scholar 

Download references

Change authors

There is no authors change for this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Irin Loretta G.

Ethics declarations

Conflict of interest

Authors declares that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants and/or animals performed by any of the authors.

Informed consent

There is no informed consent for this study.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

G, I.L., Kavitha, V. Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. Peer-to-Peer Netw. Appl. 14, 821–836 (2021). https://doi.org/10.1007/s12083-020-01038-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01038-6

Keywords

Navigation