Transmitting Data Securely and Efficiently in Cluster-based Wireless Sensor Networks

Mugada Sri Lakshmi Vani, B.RajaSrinivasa Reddy


The most critical issue in wireless sensor networks is Secure data transmission. The system performance of WSNs can be improved by Clustering which is an effective and practical way to. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks. The calculations and simulations are provided to illustrate the efficiency of the proposed protocols. The results show that, the proposed protocols have better performance than the existing secure protocols for CWSNs, in terms of security overhead and energy consumption.


T. Hara, V. I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Stud. Comput. Intell. Springer-Verlag, 2010, vol. 278.

Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2–23, 2006.

A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, pp. 2826–2841, 2007.

W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, 2002.

A. Manjeshwar, Q.-A.Zeng, and D. P. Agrawal, “An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol,” IEEE Trans. Parallel Distrib. Syst., vol. 13, pp. 1290–1302, 2002.

S. Yi, J. Heo, Y. Cho et al., “PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks,” Comput. Commun., vol. 30, no. 14-15, pp. 2842–2852, 2007.

K. Pradeepa, W. R. Anne, and S. Duraisamy, “Design and Implementation Issues of Clustering in Wireless Sensor Networks,” Int. J. Comput. Applications, vol. 47, no. 11, pp. 23–28, 2012.

L. B. Oliveira, A. Ferreira, M. A. Vilac¸a et al., “SecLEACH-On the security of clustered sensor networks,” Signal Process., vol. 87, pp. 2882–2895, 2007.

P. Banerjee, D. Jacobson, and S. Lahiri, “Security and performance analysis of a secure clustering protocol for sensor networks,” in Proc. IEEE NCA, 2007, pp. 145–152.

K. Zhang, C. Wang, and C. Wang, “A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management,” in Proc. WiCOM, 2008, pp. 1–5.

S. Sharma and S. K. Jena, “A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks,” in Proc. ICCCS, 2011, pp. 146–151.

G. Gaubatz, J. P. Kaps, E. Ozturk et al., “State of the Art in Ultra- Low Power Public Key Cryptography for Wireless Sensor Networks,” in Proc. IEEE PerCom Workshops, 2005, pp. 146–150.

W. Diffie and M. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976..

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at