HST - 0621-657

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Journal of Huazhong University of Science and Technology ISSN-1671-4512

Secure Data Collection in Clustered Wireless Sensor Networks using Fuzzy based
scheme todetect Malicious Data Collector

Akshatha Y Dr. A.S. Poornima Dr. Nirmala M. B


Dept. of Computer Science and Engineering Dept. of Computer Science and Engineering Dept. of Computer Science and Engineering
Siddaganga Institute of Technology Siddaganga Institute of Technology Siddaganga Institute of Technology
Tumkur, India Tumkur, India Tumkur, India
akshathay@sit.ac.in aspoornima@sit.ac.in mbnirmala@sit.ac.in

Abstract—Energy efficiency in resource constrained network among the group become the Cluster Head (CH). The CH
like Wireless Sensor Network is one of the very important goal is responsible for collecting the data from other nodes in the
to be met for the successful adoptability of any new scheme group and forwarding the same towards base station. Many
proposed. Secure Data collection is one of the important task
in wireless sensor network. This paper address a novel energy literatures [3], [4], [5], [6], [7], [8] have proved that clustering-
efficient scheme for secure data collection in clustered wireless based approach is efficient compared to distributed approach
sensor network. The proposed scheme ensures the confidentiality with respect to network lifetime. To further improve network
of the data from the point it is sensed until it reaches the central lifetime aggregation /in network processing [9], [10] is also
point that is Base station. Also the scheme offers lightweight used. Another way to improve network lifetime is using mobile
authentication method to detect malicious data collector. The
proposed authentication scheme first classifies the node using node called Mobile Data Collector (MDC) for data collection.
Fuzzy logic if classification is not conclusive then it invokes Mobile nodes move in a predefined path all over a network to
second level authentication using ECC public key cryptosystem. collect data from sensor node or cluster heads [11], [12], [13],
The experimental results show that around 50% of the times [14], [15], [16], [17]. When mobile nodes are used for data
during multiple MDC visits it is possible to complete the collection other nodes in the network will save their energy as
authentication without using second level authentication which
involve compute intense cryptographic algorithms. Also the time they are not participating in data forwarding. In this type of
complexity experiments reveal that ECC based authentication is networks where MDC are used for data collection, it is also
efficient in terms of involved computations. important to address the path that has to be taken by MDC
Index Terms—Authentication, Mobile data Collector, Fuzzy in order to cover the network during data collection. Mobil-
rule, Malicious Node, Clustered WSN. ity patterns for mobile data collector are discussed in [18].
Most of the WSN applications demand secure data collection
I. INTRODUCTION thereby restricting attacker/malicious users from accessing
Wireless Sensor Networks (WSN) composed of sensor data in an unautho- rized way. Many schemes [19], [20],
nodes which can sense, process and transmit data to the [21]are proposed for se- cure data collection using mobile node
central node called Base Station (BS). Sensor nodes are and identify malicious mobile data collectors. In secure data
resource constrained in nature with limited computation, stor- collection using MDC, we have two important points which
age and communication capabilities and are battery driven. require attention when it comes to achieving security. First,
As the participating devices in WSN are sensor nodes, achieving confidentiality of the sensed data until it reaches
it is very important to conserve the energy. This energy the BS. Second important thing is detection of Malicious
conservation leads to longevity of the participating nodes MDC. Always security comes with a cost. In a resource
thereby increasing the overall network lifetime. Therefore, constrained network like WSN, in order to optimize the energy
the schemes/protocols/algorithms proposed for various WSN efficiency we always look towards light weight schemes. Here
operations for any category of applications will always look lightweight refers to the schemes which incur less load on
forward for energy efficiency. WSN has wide range of applica- nodes with respect to computation and communication. Fuzzy
tions [1] such as area monitoring, military surveillance, health logic based methods have been proved to be simple and
care and industrial applications. The range of application of also light weight in terms of computation and communication
WSNs now extends to home automation, and also to other compared to complex cryptographic algo- rithms [22], [23],
areas of human activity [2]. These networks can be distributed [24]. Efficient data gathering approach using fuzzy logic is
or clustered, in distributed WSN each node participates in proposed in [22]. Here fuzzy logic is used for selecting optimal
forwarding the data to BS. Where as in clustered WSN nodes route to be followed while gathering data in a WSN so that
organised into small groups called clusters and one node it optimizes the overall energy. In [23] a fuzzy based trust

Vol 50 1 Issue 6
Journal of Huazhong University of Science and Technology ISSN-1671-4512

model is proposed and evaluated to identify malicious nodes in four different propagation schemes for information delivery.
clustering. The scheme proposed in [24] identifies Also the results show that the schemes are able to achieve
misbehaving nodes before they actually participate in data security of the transmitted information. The compressive sens-
transmission. In this paper we propose a scheme for secure ing (CS) based data collection schemes can effectively reduce
data collection using Mobile Data Collector in clustered the transmission cost of wireless sensor networks (WSNs)
WSN. The scheme addresses two issues. First one is by exploring the sparsity of compressible signals. This work
achieving confidentiality of the collected data and the second is elaborated in [31]. In [19], three different protocols for
is to identify malicious MDC. Both the issues are addressed in secure data collection based on different assumptions and
an energy efficient way. To achieve confidentiality of the constraints are presented. Here the network model considered
data, suitable symmet- ric block cipher algorithm as in [25], is a clustered WSN with a mobile data collector traversing
[26] and public key cryptosystems [27] are used. To identify within the network to collect the data from cluster head. The
malicious MDC we use two level scheme. First level we try to proposed protocols are able to identify malicious MDC and
classify MDC as Malicious(M) or Non-Malicious (NM) based also can maintain confidentiality of the collected data.
on the proposed Fuzzy mechanism. If fuzzy mechanism fails
to identify MDC as malicious or non-malicious then we III. PROPOSED SCHEME
invoke the second level authentication where we use light In this section we present the details of the fuzzy based
weight public key cryptosystem, that is ECC algorithm [27] in scheme proposed for secure data collection. Firstly, we explain
order to verify the authenticity of MDC. The motivation for the network structure considered in the scheme. Next part
this two level scheme is, in WSN we deal with resource elaborates about achieving confidentiality of the collected data.
constrained devices where use of cryptographic algorithms How data is secured from eavesdropping attacks from the
every time for authentication become a costly affair in terms time it is collected from the sensor nodes till it reaches Base
of computation. This proposed two level scheme reduces the Station. Third part of the section summarizes the two level
burden of heavy computation as it uses cryptographic authentication scheme for identifying malicious MDC. Also
algorithm for identifying malicious node only when fuzzy data transfer from MDC to BS is presented. Finally we are
based mechanism fails to classify the MDC correctly. going to discuss about updating the fuzzy variables for the
Experimental results of the proposed scheme shows that next round data collection by MDC.
around 50% of the times during multiple MDC visits only
fuzzy method is sufficient to complete the authentication. A. Network Structure
Other 50% of the times as fuzzy method fails to identify a node The network consists of n number of sensor nodes denoted
correctly as a Non-malicious node, we will be invoking second as Si where i ranges from i = 1, ...n which are used for
level ECC based public key cryptosystem to complete the sensing a particular type of data. These sensor nodes are
MDC authentication. We also conducted experiments to show organised into groups called clusters, in a deployed network let
that indeed the ECC based second level authentication scheme us assume that we have m such clusters. One node with in the
is light weight in terms of computation overhead incurred cluster is selected as Cluster Head CHj where j = 1, ...m.
on Cluster head and MDC during this authentication process. Role of cluster head is uniformly rotated among the nodes
Therefore by restricting compute intense cryptographic algo- in cluster. Cluster head selection and rotation is done as
rithms we can improve overall network lifetime significantly. explained in [32]. After deployment cluster formation and use
of secret keys for secure communication within the cluster
II. LITERATURE SURVEY is as explained in [19]. Every sensor node Si forwards the
In the literature, we find different proposals addressing the sensed data to cluster head. The data transfer from CH to
use of Mobile data collectors to collect the sensed data in BS is done using Mobile Data Collector (MDC). The MDC
wireless senor networks. In [28] a survey of such schemes is considered here are special nodes with higher memory and
presented. In this survey the authors have covered different processing capability which can move in the monitoring area.
categories of data collection and have also compared each MDC are deployed by BS to collect the data at regular interval.
category in detail with respect to different parameters. In the These MDC traverse in the monitoring area to collect the data
work presented in [29] a detailed survey on use of mobile data and the collected data is carried to BS for further processing.
collector for data collection in WSN is discussed. The authors Every time when a MDC visits CHi , the cluster head initiates
have classified the survey into two major groups: data collec- authentication process to check whether the MDC is Malicious
tion using mobile sinks and data collection using mobile relay or not. Once the authenticity of MDC is verified, CHi transfers
nodes. In each group few important protocols are discussed the data to MDC which is carried to BS.
and also compared with each other. In the paper they have also
discussed open challenges with respect to data collection using B. Achieving confidentiality of the collected Data
mobile data collectors. Another set of mechanisms/schemes For any secure communication we need shared secret keys.
for efficient data collection in WSN are presented in [17]. In this scheme, we need appropriate secret keys for achieving
Authors have discussed all the schemes in brief. To achieve confidentiality and also for two level authentication. Let us
security, authors in [30] have proposed schemes to propagate discuss in detail various keys used in the proposed scheme
the information by dividing it into shares. They have proposed

Vol 50 2 Issue 6
Journal of Huazhong University of Science and Technology ISSN-1671-4512

TABLE I the help of the obtained evaluation vector required decisions


NOTATIONS USED IN THE PROPOSED SCHEME are taken. This is general procedure. Now let us see how we are
Notations going to use this general method for our problem of classifying
ki Secret key shared between sensor node and respective cluster head a MDC.
M Sensed data to be transmitted to BS Following are the fuzzy variables considered in this scheme :
Si ith Sensor Node 1) Trust Value (TV): Initial trust is assigned by base sta-
CHi ith Cluster Head tion. Every time when MDC visits CH During authentica-
BS Base Station
P UCHi ,P RCHi Public and Private keys of Cluster Head
tion between CH and MDC if second level authentication
PUBS ,PRBS Public and Private keys of Base Station using public key system is processed it is notified to
PUMDC ,PRMDC Public and Private keys of Mobile Data Col- lector BS and BS will recalculate the trust value. Trust value
Nonce Random Number
will increase if CH and MDC authentication is success-
{X}ki Encryption of message X using secret key ki
ful by using only fuzzy method. Otherwise trust value
will decrease, if second level authentications is used for
authenticating MDC.
along with their purpose and use. Firstly we need a shared 2) Visit Interval (VI): For the entire deployment area approx-
secret key between sensor node Si and its respective cluster imate interval at which MDC will visit the CH is studied
head CHi to ensure confidential communication between the and the time interval considering the delay parameters is
node Si and cluster head CHi . This shared secret key is calculated initially and the same is used as a parameter
denoted as ki . For sharing this secret key we follow the key for fuzzy based authentication.
distribution scheme as in [19]. Sensed data is encrypted by 3) Past Communication History (PCH): Past communica-
node Si before forwarding it to respective cluster head CHi tions History is a parameter which is measured based on
using symmetric key encryption algorithm [25] with the secret the successful data collection and delivery of the same to
key ki . Confidentiality between cluster head and base statio BS in the previous intervals.
BS is achieved using public key cryptosystem [26], [27]. Each The decisions we are supposed to make here are classified
cluster head creates its own public and private key pair denoted into three. We want to classify a MDC as Non-Malicious
as P UCHi , P RCHi . Similarly respective pubic and private (NM) or Malicious(M). Sometimes using the current values of
keys of base station (BS) are denoted as P UBSi , P RBSi . the variables it may not be possible to decide a node as Non-
Collected data at CHi is encrypted using PU B S , only BS malicious or Malicious. Therefore we are taking one more
can decrypt the data ensuring the data confidentiality between category called Unable to Decide (UD).
CHi and BS. Overall working of this fuzzy based decision making to
C. Two level authentication to identify malicious MDC decide node as NM, M or UD is explained below :
Identifying malicious MDC is important for secure data col-
lection applications. Traditional public key-based authentica- 1) The fuzzy rule R is derived by conducting experiments for
tion scheme consumes large amount of memory, computational different values of TV, VI and PC and the classifications
power, bandwidth by reducing the computational speed hence required. The computed R is preloaded to respective CHs.
it is expensive for a resource constrained network like WSN. The sample R we have used for the experiments is shown
Therefore, in this proposed work we use fuzzy logic to identify below :
malicious nodes. First we apply Fuzzy method wherein the 0.1 0.6 0.3
derived fuzzy rules enable us to classify a node as Malicious R= 0.6 0.1 0.3
or Non-malicious, sometimes with the set rules and the current 0.0 0.8 0.2
values of fuzzy variables carried by MDC it is not possible to
classify a node as either malicious or non-malicious. Only if
results of fuzzy method are not conclusive, we go for second 2) Every time BS deploys MDC, MDC is preloaded with
level authentication using ECC based public key authentication values for TV, VI and PC during each interval which
[26], [27]. forms the factor vector r.
1) Fuzzy method: Fuzzy method is considered as an effec- 3) MDC visits CH and it passes factor vector r to respective
tive approach for decision making. Generally in fuzzy based CH.
decision making, we consider a set of fuzzy variables m and 4) CH applies max-min composition with the rule matrix
the set of decisions n we want to make using these fuzzy R using the received factor vector r. Evaluation vector
variables. Once the fuzzy variables and the required decisions e = roR is computed.
are decided, we are going to derive a fuzzy rule R which 5) Decision making using evaluation vector e is as follows:
is a mXn matrix. Every time when a decision has to be If scoring factors obtained in the form of e are distinct,
taken we are going to use a factor vector r which forms the highest membership value decides the category of the
current values of fuzzy variables. Then by applying min-max node whether the MDC belongs to the category NM, M
composition we are going to obtain a evaluation vector e. With or UD. If MDC is classified as “NM”, CH initiate the data
transfer. If MDC is classified as “M”or “UD”second level
authentication using public key cryptosystem is initiated.

Vol 50 3 Issue 6
Journal of Huazhong University of Science and Technology ISSN-1671-4512

If two or three values of scoring factor of e are same,


then also second level authentication is applied.
2) ECC based Second level authentication: In this section
we are going to discuss the handshake mechanism used to
authenticate MDC. This second level authentication is invoked
when fuzzy method classifies the MDC as either “M”or “UD”.
Here for this authentication process we assume that MDC
and CHi know each others public key. The respective cluster
head CHi initiates the authentication process by sending a
Nonce value and the current time TSi by encrypting it with
PRCHi and PUM DC . Upon receiving a non-malicious MDC
having corresponding keys is able to decrypt the same. Then
it increments the received Nonce to Nonce+1 attaches new
time stamp value TSj and encrypts it using encrypted using
P RM DC and P UCHi . Upon receiving reply from M DC the
cluster head CHi decrypts and checks the received values to
confirm that indeed the MDC is authenticated. Also to check
the replay attack the received TSj value is verified. After veri-
fication, CHj concludes that the MDC is Non-malicious and
it initiates the data transfer. The message exchange between
CHi and MDC during authentication process are illustrated
below :
CHi → MDC : {{NonceǁTSi}P RCHi }P UMDC
MDC → CHi : {{Nonce+1ǁTSj}P RMDC }P UCHi
D. Data transfer by MDC to base station
After two level authentication if a node is identified as Non-
malicious, respective cluster head CHi encrypts the data M
using public key of the base station BS and constructs the
following message M {P UBS . The encrypted message is
transferred to MDC which carries the same to base station BS.
Before transfering message to BS, MDC authenticates itself
with BS by using the public and private keys of BS and its
own. This authentication is initiated by BS as follows : Fig. 1. Flow diagram illustrating one single round traversal of MDC visit
during data collection.
BS → MDC : {{Nonce}P RBS }P UMDC
MDC → BS : {{Nonce+1}P RMDC }P UBS respective CH during authentication process will have their
values tuned such that in the next interval also their probability
If MDC is successful in this authentication, then BS will
of passing the authentication in first level increases. The entire
accept the collected data from MDC.
scheme explained so far in this section is summarized in 1,
E. Updating fuzzy variables by BS for next round This flow diagram shows single round of MDC from the
deployment till it collects the data and transfers it securely at
After completing one round, MDC visits the BS and after
authenticating itself transfers the data to BS. From the time of the BS.
deployment of MDC to transfer of data back to BS completes
one round of MDC. After successful data transmission, BS
updates the fuzzy variable TV, VI and PCH for the next round. IV. RESULTS AND DISCUSSION
The updation is based on the results of the previous round. Experiments are conducted to study the proposed scheme.
In the previous round if the MDC has passed authentication For the given R matrix we conducted experiments to see
at CH without entering to second level ie., just by Fuzzy how the CH is going to classify a MDC as NM , M
method if the MDC was classified as Non-malicious, current and UD for randomly selected vector r consisting of values
TV value will be increased by BS. Based on number of of TV , V I and PCH. For every r we applied max-min
successful data transfers so far VI and PCH value will be and computed e and based on computed e value node is
adjusted. The values of the fuzzy variables are tuned such classified. The experiments are repeated for randomly selected
that a MDC without entering second level authentication at r and each time obtained e value along with the class to

Vol 50 4 Issue 6
Journal of Huazhong University of Science and Technology ISSN-1671-4512

TABLE II
At Cluster Head
SAMPLE RECORDED VALUES AFTER APPLYING MAX-MIN
RSA ECC
1.2
TV VI PCH Class
0.7 0.9 0.1 Non-Malicious 1

Time in seconds
0.5 0.2 0.4 Malicious 0.8
0.6 0.2 0.3 Malicious 0.6
0.9 0.7 0.1 Non- Malicious
0.4
0.3 0.2 0.9 Unable to Decide
0.2

0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
MDC classification using Fuzzy Method Iterations
60

50
Fig. 3. Time Complexity recorded at Cluster Head considering both RSA
40 and ECC cryptosystems.
30

20
3. Similarly time complexity at MDC is also recorded for the
10
second level authentication both by using RSA and ECC. The
0 graph in 4 shows the execution time required by RSA and
NM M UD
ECC algorithms for different iterations. Overall observation
on time complexity illustrates that the ECC based algorithm is
Fig. 2. Graph Representing the classification of MDC as NM, M or UD for computationally better compared to RSA algorithm. Therefore
the experiments conducted by considering different factor vector r. ECC based algorithm for second level authentication is a
suitable choice for resource constrained networks like WSN.
The performance analysis of RSA versus ECC is also studied
which the node belongs to are recorded. The results are in the literature [33]. Based this literature we experimented
tabulated. Few such recorded results are shown in Table with both RSA and ECC and concluded that ECC is suitable
2. The experiments are repeated and the graph is plotted for WSN applications.
for the outcome ie., the percentage of times the node is
classified as NM without initiating second level authentication. V. CONCLUSION
The graph is shown in 2. The recorded results show that In this work we have addressed Secure Data collection
around 50% of the time it is possible to classify a MDC using Mobile Data Collector. The proposed scheme ensures
as Malicious by using just Fuzzy method without using the confidentiality of the data from the time it is sensed by
second level authentication. This is a significant benefit one sensor node till it reaches the BS. For identifying malicious
can expect when we are dealing with resource constrained MDC we use lightweight authentication scheme comprising
environment like WSN where saving energy consumption of two levels. First level uses Fuzzy logic to classify a node.
is very crucial. The next set of experiments are conducted The fuzzy method classifies a node into one of the three
to study the time complexity of the proposed scheme. For classes Non-malicious, Malicious or Unable to Decide.If fuzzy
studying time complexity of the scheme we have considered method classifies a MDC as either Malicious or Unable to
the complete authentication part staring from invoking the Decide, second level authentication using ECC public key
fuzzy method until the decision by CH to transfer the data cryptosystem is used to confirm indeed the node is Malicious
or not to transfer. Here if fuzzy method fails to classify the or not. If this second level identifies the MDC as malicious,
node then public key based authentication scheme is invoked
as second level. For experimentation we have considered both
RSA and ECC based public key cryptosystem. First set of At MDC
experiments are conducted wherein we use RSA algorithm ECC RSA

for second level authentication. Time is recorded for entire 1.2

authentication process. Similar to the first set of experiments 1


Time in Seconds

here also we repeated the experiment for randomly selected 0.8

0.6
factor vector r and every iteration running time is recorded
0.4
and tabulated. Next part of the experiments are conducted by
0.2
using ECC based public key cryptosystem for second level
0
authentication. For the same set of randomly selected factor 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
vector using ECC algorithm experiments are repeated and Iteration
running time is recorded. A comparative graph illustrating the
time complexity of the scheme recorded at cluster head CH Fig. 4. Time complexity recorded at MDC considering both RSA and ECC
by using RSA and ECC public key cryptosystems is shown in cryptosystems.

Vol 50 5 Issue 6
Journal of Huazhong University of Science and Technology ISSN-1671-4512

wireless sensor networks with mobile elements: A survey. ACM Trans.


sensed data is not transferred to MDC. Both the issues are Sens. Netw. (TOSN) 2011, 8, 7. [CrossRef]
addressed in an efficient way by using light weight crypto- [17] Yogeswari, R.; Subathra, V. A survey on efficient data collection in
graphic algorithms like symmetric key and ECC based public wireless sensor networks. Int. J. Innov.Res. Comput. Commun. Eng.
2013, 1, 2181.
key cryptosystems. Experimental results conclude that during [18] Jain, S.; Shah, R.C.; Brunette, W.; Borriello, G.; Roy, S. Exploiting
multiple MDC visits for data collection, around 50% of the mobility for energy efficient data collection in wireless sensor networks.
times it is possible to authenticate a MDC just by using fuzzy Mob. Netw. Appl. 2006, 11, 327-339. [CrossRef]
logic which is considered to be an energy efficient method [19] Poornima, A. S., and B. B. Amberker. Secure data collection using
mobile data collector in clustered wireless sensor networks. IET wireless
compared to the use of compute intensive cryptographic sensor systems 1, no. 2 (2011): 85-95.
algorithms. we have also conducted experiments to check [20] Puthal, Deepak, and Bibhudatta Sahoo. Secure Data Collection and
computation overhead incurred for authentication if second Critical Data Transmission in Mobile Sink WSN: Secure and Energy
efficient data collection technique. (2012).
level authentication is invoked. For this study we considered [21] Renold, A. Pravin, and A. Balaji Ganesh. Energy efficient secure data
RAS and ECC public key cryptosystems. The recorded results collection with path-constrained mobile sink in duty-cycled unattended
show that ECC based cryptosystems are efficient with respect wireless sensor network. Pervasive and Mobile Computing 55 (2019): 1-
12.
to computation overhead both on cluster head and MDC. [22] Rajesh, D. Hevin, and B. Paramasivan. Fuzzy logic based performance
In overall conclusion we can say that the proposed scheme optimization with data aggregation in wireless sensor networks. Procedia
increases the overall network life time as we are using MDC engineering 38 (2012): 3331-3336.
[23] Yang, Hongyu, Xugao Zhang, and Fang Cheng. A Novel Algorithm
for data collection and also wherever possible we are using for Improving Malicious Node Detection Effect in Wireless Sensor
lightweight methods to achieve security. Networks. Mobile Networks and Applications (2020): 1-10.
[24] Prathap, U., P. Deepa Shenoy, and K. R. Venugopal. CMNTS: Catching
REFERENCES malicious nodes with trust support in wireless sensor networks. In 2016
IEEE Region 10 Symposium (TENSYMP), pp. 77-82. IEEE, 2016.
[1] Ari, A.A.A.; Gueroui, A.; Labraoui, N.; Yenke, B.O. Concepts and [25] Nadeem, Aamer, and M. Younus Javed. A performance comparison
evolution of research in the field of wireless sensor networks. Int. J. of data encryption algorithms. In 2005 international Conference on
Comput. Netw. Commun. 2015, 7, 81-98. information and communication technologies, pp. 84-89. IEEE, 2005.
[2] Rawat, P.; Singh, K.D.; Chaouchi, H.; Bonnin, J.M. Wireless sensor [26] Doomun, M. Razvi, and K. M. S. Soyjaudah. Analytical Comparison of
networks: A survey on recent developments and potential synergies. J. Cryptographic Techniques for Resource-constrained Wireless Security.
Supercomput. 2014, 68, 1-48. [CrossRef] IJ Network Security 9, no. 1 (2009): 82-94.
[3] Srinivasa Rao, P.C., Banka, H. Energy efficient clustering al- [27] Kapoor, Vivek, Vivek Sonny Abraham, and Ramesh Singh. Elliptic curve
gorithms for wireless sensor networks: novel chemical reac- cryptography. Ubiquity 2008, no. May (2008): 1-8.
tion optimization approach. Wireless Netw 23, 433-452 (2017). [28] Wang, F.; Liu, J. Networked wireless sensor data collection: Issues,
https://doi.org/10.1007/s11276-015-1156-0 challenges, and approaches. IEEE Commun. Surv. Tutor. 2011, 13, 673-
[4] Pratyay Kuila, Prasanta K. Jana, A novel differential evolution based 687. [CrossRef]
clustering algorithm for wireless sensor networks, Applied Soft Com- [29] Mukherjee, R.; Roy, S.; Das, A. Survey on Data Collection protocols in
puting, Volume 25,2014,Pages 414-425,ISSN 1568-4946. Wireless Sensor Networks using mobile data collectors. In Proceedings
[5] Liu, Y., Xiong, N., Zhao, Y., Vasilakos, A. V., Gao, J., Jia, Y. (2010). of the IEEE 2015 2nd International Conference on Computing for
Multi-layer clustering routing algorithm for wireless vehicular sensor
networks. IET Communications, 4(7), 810-816.
[6] Mann, P.S.; Singh, S. Improved metaheuristic based energy-efficient
clustering protocol for wireless sensor networks. Eng. Appl. Artif. Intell.
2017, 57, 142152. [CrossRef]
[7] Diongue, D.; Thiare, O. ALARM: An energy aware sleep
scheduling algorithm for lifetime maximization in wireless sensor
networks. In Proceedings of the 2013 IEEE Symposium on Wireless
Technology and Applications (ISWTA), Kuching, Malaysia, 22-25
September 2013; pp. 74-79.
[8] Li, G.; Chen, H.; Peng, S.; Li, X.;Wang, C.; Yu, S.; Yin, P. A
Collaborative Data Collection Scheme Based on Optimal
Clustering for Wireless Sensor Networks. Sensors 2018, 18, 2487.
[CrossRef] [PubMed]
[9] Randhawa, S., Jain, S. Data Aggregation in Wireless Sensor
Networks: Previous Research, Current Status and Future Directions.
Wireless Pers Commun 97, 3355-3425 (2017).
[10] Jung, W. S., Lim, K. W., Ko, Y. B., Park, S. J. (2011). Efficient
clustering-based data aggregation techniques for wireless sensor net-
works. Wireless Networks, 17(5), 1387-1400.
[11] Paul, T., Stanley, K. G. (2014). Data collection from wireless sensor
networks using a hybrid mobile agent based approach. In
Proceedings of the 2014 IEEE 39th Conference on Local Computer
Networks (LCN2014) (pp. 288-295).
[12] Gupta, G. P., Misra, M., Garg, K. (2014). Energy and trust aware
mobile agent migration protocol for data aggregation in wireless
sensor networks. Journal of Network and Computer Applications,
41, 300-311.
[13] Dong, M., Ota, K., Yang, L. T., Chang, S., Zhu, H., Zhou, Z. (2014).
Mobile agent-based energy-aware and user centric data collection in
wireless sensor networks. Computer Networks, 74, 58-70.
[14] Ang, K.L.M.; Seng, J.K.P.; Zungeru, A.M. Optimizing energy
consump- tion for big data collection in large-scale wireless sensor
networks with mobile collectors. IEEE Syst. J. 2018, 12, 616-626.
[CrossRef]
[15] Takaishi, D.; Nishiyama, H.; Kato, N.; Miura, R. Toward energy
efficient big data gathering in densely distributed sensor networks.
Vol 50 IEEE Trans. Emerg. Top. Comput. 2014, 2, 388-397. [CrossRef] 6 Issue 6
[16] Di Francesco, M.; Das, S.K.; Anastasi, G. Data collection in
Journal of Huazhong University of Science and Technology ISSN-1671-4512

Sustainable Global Development (INDIACom), New Delhi, India, 11-13


March 2015; pp. 632-636.
[30] Shu, Tao, Marwan Krunz, and Sisi Liu. Secure data collection in wireless
sensor networks using randomized dispersive routes. IEEE transactions
on mobile computing 9, no. 7 (2010): 941-954.
[31] Zhang, Ping, Shaokai Wang, Kehua Guo, and Jianxin Wang. A secure
data collection scheme based on compressive sensing in wireless sensor
networks. Ad Hoc Networks 70 (2018): 73-84.
[32] W.R.Heinzelman, A.Chandrakasan, and H.Balakrishnan. Energy-
efficient Communication protocol for wireless microsensor networks.
In Proceedings of IEEE Hawaii Int. Conference on System Sciences,
pp.4-5, 2000.
[33] Dindayal Mahto and Dilip Kumar Yadav,Performance Analysis of RSA
and Elliptic Curve Cryptography, International Journal of Network Se-
curity, Vol.20, No.4, PP.625-635, July 2018 (DOI: 10.6633/IJNS.201807
20(4).

Vol 50 7 Issue 6

You might also like