You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

31 March 2016

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

,
,
,
,
,
and
1
Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 12372, Saudi Arabia
2
Intelligent Systems Group (ISG), Department of Computing, Macquarie University, Sydney, NSW 2109, Australia
3
Faculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Macau 999078, China
4
College of Computer and Information Sciences (CCIS), King Saud University, Riyadh 12372, Saudi Arabia
This article belongs to the Section Sensor Networks

Abstract

The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

1. Introduction

In wireless communication, low-cost miniaturized devices that can be used for monitoring in a number of diverse applications have been introduced [1]. These devices are equipped with one or more sensors to detect, for example, humidity, light, sound, or temperature, and are called wireless sensor nodes. Wireless sensor nodes can also communicate with each other in an autonomous manner. Multiple wireless sensor nodes—which are extremely small and have limited battery power, communication bandwidth, and storage space—can be deployed in a particular region to form a wireless sensor network (WSN) in an ad hoc manner. The wireless sensor nodes fetch the required data and transfer it hop by hop securely from the source to a single or multiple destinations [2], as shown in Figure 1. In a WSN, the destination (e.g., the sink node or gateway) can be either single or multiple and either static or mobile depending on the requirements of the application scenario.
Figure 1. Illustration of a secure WSNs.
Routing strategies and WSN modeling have recently received a great deal of attention. The security issues associated with WSNs require strong attack-repelling mechanisms coupled with subsequent verification [3,4,5]. Numerous security strategies are available, such as DTRAB [6] and ReTrust [7], as well as other types of communication mechanisms and solutions that also include single-hop communication as proposed in [8,9,10,11]. However, these strategies are completely infeasible and inapplicable in the case of large-scale WSNs. Many of the data-routing protocols used in WSNs are simple, making them more vulnerable to widespread attacks [12]. In such a WSN, an adversary can deploy his own node(s) to generate several types of attacks for denial of service (DOS) or to compromise existing nodes. Through these compromised nodes, the adversary can perform network-layer attacks, which predominantly involve the manipulation of important data. Attacks that attempt to manipulate data can be categorized into two classes: in the first, the attacker attempts to influence the user data directly, and in the second, the attacker attempts to affect the core data-routing topology.
It is important to focus on the security requirements throughout the initiation and implementation of a WSN design [13]. In the complete lifespan of a WSN, the initialization phase is critical and requires efficient and active security measures. When nodes are deployed, they must acquire and/or build information regarding their neighboring nodes and the environment to enable them to communicate and transfer data to the destination [14]. Communications in a WSN are vulnerable to massive attacks, particularly when the wireless sensor nodes are deployed in hostile environments, because sensor nodes are limited in terms of resources such as battery power, processing speed, signal strength, and storage space. The possible types of attacks on WSN communications include spoofing, tampering, eavesdropping and signal jamming, replaying or altering routing information, wormhole attacks, resource exhaustion, selective forwarding, Sybil attacks, flooding attacks, sinkhole attacks, and even unknown attacks [15,16,17]. Researchers have proposed mechanisms that are mostly dependent on secure authentication and encryption [18] to thwart attacks, but data confidentiality remains a challenge [4,19].
In many aspects of technology, nature has provided inspiration for many solutions. For example, Eigen, Schuster and Von Foerster [20,21] proposed the application of biological self-organization methods to network data using primary engineering applications [22]. Communications technology has also heavily benefitted from biologically inspired mechanisms; for example, a BIOlogy-Inspired Self-organized Secure Autonomous Routing Protocol (BIOSARP) [23,24,25] has been developed based on an artificial immune system (AIS) that begins by checking the behavior of neighboring nodes and classifying them once the neighbor table of each sensor node is populated with the relevant information. However, before the AIS-based preventive measure is initiated, adversaries have an open opportunity to seize control of the entire deployed network. We have found that BIOSARP is adequate in terms of cost, but is weak in all aspects of providing security. By contrast, Secure Real-Time Load Distribution (SRTLD) is adequate in terms of security but not cost. Thus, by combining the best features of SRTLD and BIOSARP in a novel way, we have developed a secure and cost-efficient solution.
This paper proposes an enhanced BIOSARP (E-BIOSARP) and presents a detailed description of its architecture, a thorough analysis, and a comprehensive comparison with other schemes to demonstrate its efficiency. E-BIOSARP incorporates a random key encryption and decryption mechanism [26] into BIOSARP to provide active security measures for WSNs. Saleem et al. [27] presented the initial design of and preliminary results regarding E-BIOSARP. Because of the encryption mechanism used in E-BIOSARP, WSN communication is secured even during the critical learning and initialization phases. An extensive security and performance analysis was conducted to demonstrate the efficiency of E-BIOSARP. The main contributions of this paper are as follows:
  • By incorporating a random key encryption and decryption mechanism [26] into BIOSARP, we propose an enhanced BIOSARP named E-BIOSARP to provide overall network communication security from the very beginning of the establishment of a WSN at a low performance cost.
  • Our security analysis shows that E-BIOSARP can ensure confidentiality and integrity by encrypting header fields such as the packet sequence ID (Pkt_ID), destination ID (D_ID), and source ID (S_ID) and by transmitting fragmented data instead of applying cryptographic operations to complete packets, as is the case in most security mechanisms.
  • Our security analysis also shows that E-BIOSARP is resilient against data tampering attacks, selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
  • We present the implementation of a WSN scenario using E-BIOSARP in network simulator 2 (ns-2) and the population of this scenario with malicious nodes to analyze the behavior and performance of E-BIOSARP.
  • E-BIOSARP is analytically and experimentally compared in terms of processing time with state-of-the-art security mechanisms, including TinyHash, TinySec with authenticated encryption (TinySec-AE), TinySec with authentication only (TinySec-Auth), exclusion basis systems (EBSs), location-based resilient security with authentication (LBRS-Auth), and SRTLD.
  • Simulation results show that E-BIOSARP outperforms SRTLD in terms of energy consumption, packet overhead and delivery ratio and also outperforms another state-of-the-art secure routing protocol, the energy-efficient secure path algorithm (ESPA), in terms of energy consumption.
This paper is structured as follows: Section 2 discusses recent related works. Section 3 describes the architecture of E-BIOSARP. Section 4 presents a security analysis of E-BIOSARP. Section 5 provides a complexity analysis of E-BIOSARP and other security mechanisms. Section 6 discusses the simulation-based implementation and the experimental results. Section 7 concludes the paper with a summary of our contributions and a brief discussion of future work.

3. The Architecture of the Proposed E-BIOSARP

The architecture of E-BIOSARP is based on BIOSARP but is further enhanced with a random generator based on a mathematical function [26], the same as that incorporated into SRTLD. The idea behind E-BIOSARP is that BIOSARP has better performance with respect to throughput with better network life, whereas the encryption mechanism of SRTLD provides communication security in terms of integrity and confidentiality.
Under E-BIOSARP, the workflow of the encryption mechanism begins when a packet is to be forwarded to the next self-node. During forwarding, the BIOSARP routing mechanism, as shown in Figure 2, requests encryption from the Mathematical Encryption Function, which encrypts only some of the fields in the packet header (Pkt_ID, D_ID, and S_ID) rather than the payload or the complete packet, which has already been fragmented. The structures of the ready-to-receive (RTR) packet and the data packet header in E-BIOSARP are presented in [35]. As a result of encryption, if malicious nodes and/or adversaries capture a secure packet, they cannot read the packet’s movement or its destination, which in turn ensures the privacy of its origin. The following assumptions were made while developing the encryption mechanism, which is based on a random key approach and dynamic mathematical computations:
  • Two master keys (k1 and k) generated with a pseudo-random function are injected into each sensor node while it is flashing its read-only memory (ROM). Here, k1 is a master key for the new node, and k is a master key for all nodes.
  • Before deployment, every node is set with a hard mathematical function and its reverse computation.
Figure 2. State machine diagram for packet encryption and decryption [27].
The flow diagram of the encryption and decryption process is presented in [27]. In this paper, the state machine diagram is presented in Figure 2 and is explained in detail to elucidate every step and process at the hardware level. Whether the data arrive from the application layer or a data packet is received from a neighboring node, the BIOSARP routing state is called. If the data to be forwarded arrive from the application layer, then the E-BIOSARP routing mechanism sends a request to the Mathematical Encryption Function for encryption. The mathematical function reads the packet details and acquires the values of Pkt_ID, D_ID and S_ID. D_ID and S_ID are encrypted by the mathematical function based on k and Pkt_ID. The encrypted packet, with hidden D_ID and S_ID values, is sent to the MAC layer, as shown in Figure 2, for the frame to be forwarded to the optimal neighboring node. The encryption of all data in a packet is avoided because this process would consume an enormous amount of energy and because the information is split into a number of data packets (because the packet size in a WSN is very small). Moreover, because of the encoding of the packet sequence ID, source ID and destination ID, the data packets become fully secure because they cannot be processed by adversaries and thus are unrecognizable to them.
When a data packet is received from the MAC layer, the BIOSARP routing mechanism sends a request to the mathematical function for decryption, as shown in Figure 2. In the decryption process, the algorithm decrypts the destination ID (D_ID) and source ID (S_ID). Because every self-node in the network contains a random generator function, each node can generate the same random key based on the values of Pkt_ID and k to decrypt the header fields of the packet. The decryption function performs authentication by evaluating the output. The status is marked as normal by the authentication state if the output is between 0 and R, and as a result, the mathematical decryption function is returned to the BIOSARP routing mechanism to process the packet. Furthermore, in the case that a new wireless node wishes to join the network, a control packet is transmitted that contains the newly encrypted R with the master key k1.
In BIOSARP, the AIS-based autonomous security mechanism requires a certain amount of time after deployment to accrue the necessary knowledge and to begin classification [23,24,25]. A WSN in this initialization phase is insecure and, as a result, can be hacked, taken over or damaged by adversaries. Therefore, E-BIOSARP is enhanced with packet encryption to secure the WSN during the initialization stage. During communication over a WSN, the proposed mechanism encrypts and decrypts the control and data packets. The algorithm pseudo codes for encryption with authentication and decryption with authentication are presented in Figure 3 and Figure 4, respectively. Both processes begin with the reading of the packet header fields D_ID and S_ID. The node will further process the packet if it is authenticated; otherwise, the node drops/discards the packet.
Figure 3. Encryption with authentication.
Figure 4. Decryption with authentication.
During the encryption process, the Pkt_ID, D_ID, and S_ID values are obtained from the header of the packet that has just been received. Of the extracted values, Pkt_ID and k are utilized to generate a pseudo-random number. The Mathematical Encryption Function is then used to encrypt the packet header fields before the secure packet is sent. The maximum field size is 4 bytes (231 − 1), and if the encryption function generates a number greater than this maximum size, the modulo function will be used, as shown in Figure 3.
At the other end of the transmission process, when a node receives a packet with encrypted header fields, it calls the Mathematical Decryption Function to perform the decryption based on the Pkt_ID, D_ID, and S_ID values extracted from the received packet header and the pseudo-random number calculated using Pkt_ID and k, as shown in Figure 4. The D_ID and S_ID values are verified using the modulo function (231 − 1) in reverse to ensure the authenticity of the packet. If the value obtained in this reverse process is between 0 and R, then the packet is categorized as legitimate and is further processed; otherwise, it is discarded.

4. Security Analysis

This section presents a security analysis of our proposed E-BIOSARP system. We utilize the security analysis method presented in Wang et al. [30]. To simplify the analysis, we focus on the critical components of our model, including packet elements and secure transmission. We begin the analysis from the discovery phase, which involves the secure transfer of information between self-nodes to form a private community or to communicate with a new node.
When a node broadcasts a route replay request packet, it encrypts the important contents, which can only be decrypted by nodes that can understand the received packets, that is, only self-nodes. These neighboring self-nodes will then replay their encrypted information to the node that broadcasted the packet. In this manner, a secure private community is constructed to monitor the transmission. The monitored encrypted data are then transferred hop by hop to their destination, namely, the sink node, as shown in Figure 5.
Figure 5. Network simulation grid (source nodes (blue), sensor nodes (green), malicious nodes (red), and sink node (black)).
E-BIOSARP combines BIOSARP with the encryption mechanism of SRTLD because BIOSARP offers better packet transfer behavior and the SRTLD encryption mechanism provides better communication security with minimal processing time. Under E-BIOSARP, the packet header fields (Pkt_ID, D_ID, and S_ID) are encrypted instead of the payload or the complete packet, which has already been fragmented. As a result, if malicious nodes and/or adversaries capture a secure packet, they cannot read the packet’s movement or its destination, thereby ensuring the integrity and confidentiality of the network.
The encryption process is based on a function that verifies the integrity of a message via sender identification and ensures that the data are received exactly as sent. The encryption algorithm is based on the maximum value of a 32-bit signed integer, the prime number equal to 231 − 1. The plaintext in important header fields is encrypted and converted to cipher text at every hop. Therefore, the use of this algorithm counters the possible attacks listed below.
  • Attack based on packet dropping: The proposed encryption mechanism rapidly identifies and only replies to and/or forwards data packets to self-nodes. The authentication process is fast because of the reduced overhead of the proposed encryption mechanism, as elaborated in Section 3, and thus can efficiently handle packet drop attacks.
  • Redirection with modified hop counts: Redirections [41] are avoided because of the E-BIOSARP authentication process; moreover, the E-BIOSARP RTR packet, as described in [35], does not contain a hopcount field. Thus, the network is secure against this type of attack.
  • Node replication or cloning attack: This type of attack is initiated when an adversary takes the complete information of a node, replicates/clones a node with the same information, and inserts the clone into the network to execute further attacks. E-BIOSARP protects the network from remote node replication or cloning attacks by rapidly identifying non-self/compromised nodes and thus avoids the receiving or sending of any packet from or to such a node.
  • Brute-force search (or exhaustive key search attack): In a brute-force search attack, the adversary attempts to acquire a user ID and password. The proposed encryption mechanism uses a random key (Pkt_ID and k) that changes at the processing of every packet. Furthermore, E-BIOSARP’s rapid identification process makes it extremely difficult for an attacker to acquire the fragmented data or, if they are acquired, to reconstitute them [29].
  • Eavesdropping attack: The random-key-based encryption mechanism avoids eavesdropping attacks by encrypting the main contents S_ID and D_ID of the communication; thus, monitoring is secret, and hijacking of confidential data is impossible.
Other types of attacks that are addressed by the general SRTLD encryption mechanism and thus are also efficiently addressed by E-BIOSARP are listed below.
  • Altered, spoofed, or replayed routing information attack or wormhole attack: In this type of attack, the adversary or malicious node targets the routing information exchanged between nodes. The rapid authentication process in E-BIOSARP protects the network from these types of attacks by protecting the packet header. Therefore, when a sensor node transmits a packet, it encrypts the header, and upon receipt, the proposed mechanism confirms that certain fields are encrypted with the correct key. If not, the packet is dropped without being opened, as shown in Figure 6.
    Figure 6. The output of actions taken by E-BIOSARP against adversaries.
  • Acknowledgment spoofing and selective forwarding: A malicious node executes this type of attack by receiving and dropping packets as they travel through the network; as a result, the nodes at one hop conclude that there is a problem with the forwarding of data packets through the nodes in the routing table. Alternatively, a malicious node may use feedback to alter a node’s decision regarding which strong link to use to send packets. The fast authentication process in E-BIOSARP protects the WSN from acknowledgment spoofing and selective forwarding attacks by rapidly identifying and dropping non-self packets, as shown in Figure 6.
  • Sybil attack: In a Sybil attack, a malicious node begins advertising itself with multiple IDs. When a self-node receives these RTR packets, they cannot be authenticated because of their different header structure and/or field values, and they are consequently dropped, as presented in Figure 6.
  • HELLO flood attack: An invader deploys a strong device that generates and broadcasts RTR/HELLO packets with a high signal strength to convince the WSN nodes that the adversary node is a neighboring self-node. Under E-BIOSARP, the possibility of forwarding data to such non-self or HELLO-flood-generated nodes is avoided through the dropping of these false packets.

5. Complexity Analysis

In this section, the complexity of E-BIOSARP is studied and compared with those of the security schemes TinyHash, TinySec-AE, TinySec-Auth, EBSS, LBRS-Auth, and SRTLD. The complexity is studied based on the functions involved in each security mechanism by considering the number and processing time of the functions that are executed, which determine the time is required by a node to process a packet. The results of the comparison are presented in Table 2. In the table, we use the following notations: D, P, and H denote the size of a complete data packet, the size of the data payload of a packet, and the header size of a packet, respectively, such that D = P + H. Encrypt(D) and MAC(D) are functions that return the computing times required to apply the Encryption and MAC algorithms, respectively, to information of size D.
Table 2. Comparison of security schemes.
In TinySec-AE, a data payload of size P is encrypted using the ciphertext stealing technique [42] to create encrypted data of the same size as the plaintext. TinySec-AE then applies a MAC algorithm to the encrypted data and the packet header, which leads to a computing time of [Encrypt(P’) + MAC(D)]. For TinySec-Auth, this time is reduced to MAC(D) because only the data packet is authenticated with a MAC. The computing time for TinyHash is [Encrypt(D) + MAC(D)] because it uses HMAC for authentication and SHA1 for message digestion. LRBS-Auth and EBSS each create a MAC for the data payload.
Table 2 shows the ranking of the security schemes in terms of the security functions used or complexity. The lowest complexity corresponds to the highest ranking; that is, number “1” represents the highest ranking. The encryption function has a shorter processing time than the MAC algorithm [43]; moreover, (S_ID + D_ID + Pkt_ID) < H < P. Therefore, SRTLD and E-BIOSARP incur the lowest complexity because these approaches need only to encrypt three fields of the packet header, namely, S_ID, D_ID and Pkt_ID.

6. Simulation-Based Implementation, Experimental Results and Discussion

In the simulation, the network model was based on IEEE 802.15.4 MAC and physical layers; the network parameters that were used to configure the WSN scenario in ns-2 are given in Table 3. In all simulations, a many-to-one traffic pattern was utilized, and after every 180 s, the routing table record was deleted to keep the neighboring information updated. Similar to the topology used by Ahmed and Fisal [26], the simulation topology consists of 121 nodes distributed in an 80 m × 80 m region, as shown in Figure 5. The nodes numbered 120, 110, 100 and 90 are the source nodes, node 0 is the sink node, and nodes 24, 25, 31 and 36 are the adversary nodes. The performance of E-BIOSARP was evaluated in terms of energy consumption, data packet overhead, and packet delivery ratio.
Table 3. Network parameters used to simulate the security mechanism.

6.1. Simulation of Abnormalities and Attack Countermeasures

Figure 6 shows the countermeasures taken against abnormalities detected in a WSN with the aid of the proposed mechanism. A packet from malicious node 31 is received and dropped, as shown in Figure 6. The encryption/decryption mechanism is the main process that strives to achieve confidentiality, which is the primary requirement for security. Therefore, all sent packets are encrypted, and hence, all received packets must be decrypted. For example, when the sink (or an intermediate node) receives a packet, it will execute the decryption process. If the received packet is decrypted with a legal output, then the sink will consider this packet to be a legal packet originating from a legitimate node. Otherwise, the sink (or intermediate node) will regard this packet as an attack packet. Subsequently, if and when the same node has launched a certain number of attacks at the sink (or intermediate node), then that node will be regarded as an adversary and removed from the neighbor table. Hence, the random-key-based efficient encryption mechanism secures the network from the time of deployment.

6.2. Impact of an Increasing Number of Malicious Nodes

Attacks on the network layer strongly impact the data routing performance. By considering an increasing number of non-self nodes in a WSN, the effect of such attacks is studied in this section. In the simulation, 49 nodes were arranged in a region of 80 m × 80 m, similar to the topology used by Ahmed and Fisal [26]. The packet rate was fixed at 9.6 packets/s, and the number of malicious nodes was varied from 4 to 20. The worst-case scenario with 20 malicious nodes is illustrated in Figure 7.
Figure 7. Worst-case scenario with 20 malicious nodes, as indicated in red.
The performance of E-BIOSARP in terms of data throughput was reasonably maintained, even as the number of malicious nodes increased. E-BIOSARP treats malicious nodes as the hole problem [44]. The hole problem occurs when the nodes in a certain region cannot forward data packets toward their destination. Table 4 shows that as soon as the number of malicious nodes reaches 20, the delivery ratio declines because of communication disruption between the sink and nodes 43, 31 and 37, which are generating the data packets, as demonstrated in Figure 7. At the same time, the energy consumption increases because the transmitting nodes must use considerable power to transmit bits over large distances, as shown in Table 4.
Table 4. Influence of malicious nodes on network performance.
In Table 5, the detection rate and accuracy of E-BIOSARP and SRTLD are compared for the same scenario, as described earlier in this section and shown in Figure 7. The detection rate is defined as the number of illegitimate packets that are detected by the security mechanism at all self-nodes divided by the total number of illegitimate packets received, and this quantity, expressed as a percentage, is the detection accuracy. The detection rate and accuracy are measured as follows:
Detection rate is X/(X + Y), and Accuracy is (X/(X + Y)) × 100%
where:
Table 5. Influence of malicious nodes on network performance in terms of security.
X is the number of illegitimate packets detected and dropped at all nodes andY is the number of illegitimate packets that are received from adversary nodes and are not detected.

6.3. Processing Time Comparison

In Section 5, we analyzed the performance of the security schemes in terms of the processing time required to perform cryptographic operations. The simplest way to monitor this metric is to record the system times immediately before and after the execution of the security mechanism. The problem with this approach is that the system clock in a sensor is not precise. To address this issue, we used the clock of the host PC (i.e., the sink node) and measured another metric equivalent to the processing time, called the security processing time per hop. This metric is defined by Liu et al. [45] as follows:
Δ T 1 = T e n d s e c T s t a r t s e c
Δ T 2 = T e n d T s t a r t
where:
  • T e n d s e c : time of packet dispatch from the sending node with the security scheme.
  • T s t a r t s e c : time of packet reception at the receiving node with the security scheme.
  • T s t a r t : time of packet dispatch from the sending node without the security scheme.
  • T e n d : time of packet reception at the receiving node without the security scheme.
Thus, the time period required for the operating system to execute the security scheme on a node (i.e., the security processing time per hop) is given by the following:
Δ T sec = Δ T 1 Δ T 2
The processing time is a very important parameter in the routing protocol because it affects the overall performance of the network in terms of data throughput and battery power consumption. In [26], the authors showed that compared with LBRS-Auth, TinySec-Auth, EBSS, TinyHash, and TinySec-AE, SRTLD requires the least processing time.
The network topology was configured as in [26] to acquire ns-2-based simulation results. Figure 8 shows the times for the transfer of an encrypted data packet; the transfer time for data packet 4747 was 9.9701 ms, and similarly, from Figure 9, we calculate a transfer time without encryption of 5.17005 ms. The results were generated for both BIOSARP and E-BIOSARP as shown in Figure 8 and Figure 9. Moreover, 100 samples were acquired from different parts of both the result files (approximately 140,000 lines) to calculate the average time difference (i.e., the average time added by the encryption mechanism).
Figure 8. Packet transfer with encryption.
Figure 9. Packet transfer without encryption.
In Figure 10, the processing time values used for TinyHash, TinySec-AE, TinySec-Auth, EBSS, and LBRS-Auth were obtained from Ahmed and Fisal [26]. The experimental results confirm the rankings obtained in Section 5. Although LBRS-Auth and EBSS were found to incur the same processing time in the previous analysis, EBSS was superior to LBRS-Auth in the experiments because EBSS uses a smaller data payload size than that of LBRS-Auth. Furthermore, the results demonstrate that the average processing time per hop incurred by the E-BIOSARP encryption mechanism is less than that of SRTLD although they have the same complexity level, as described in Section 5.
Figure 10. A comparison of the processing time for E-BIOSARP with those for other state-of-the-art security mechanisms: TinyHash, TinySec-AE, Tiny-Sec Auth, EBSS, LBRS-Auth, and SRTLD.
The shorter processing time per hop of E-BIOSARP is primarily attributable to the efficiency, reduced complexity and better performance provided by the enhanced ACO-based routing algorithm that assists in the cost-effective encryption process. The proposed mechanism is also beneficial for network-based applications that require long durations for the transfer of data packets from a source to a destination, i.e., in which the route contains numerous hops. In Section 5, we assumed that the routing functionalities, such as packet processing, packet buffering, channel access contention, and packet transfer, take the same time for all nodes and for all types of implementation (i.e., with and without a security scheme). This assumption does not hold when measuring Δ T sec . The routing decision scheme adopted by E-BIOSARP, which is based on end-to-end delay and link quality, reduces packet transfer time and further reduces the security processing time per hop.

6.4. Delivery Ratio Comparison of E-BIOSARP, BIOSARP and SRTLD

The average simulated delivery ratio results obtained for E-BIOSARP, BIOSARP and SRTLD at various packet rates for the scenario depicted in Figure 5 are summarized in Table 6. E-BIOSARP provides a higher data delivery ratio compared with the state-of-the-art SRTLD routing protocol but a lower delivery ratio than that of BIOSARP, as shown in Figure 11. The results presented in Table 6 and Figure 11 show that in the absence of malicious nodes, the delivery ratio of E-BIOSARP is superior to that of SRTLD because the processing time required by E-BIOSARP to transfer the packets is less. The advantage gained by reducing the processing time ultimately helps to decrease the delay in the secure delivery of data packets. Moreover, also in the absence of malicious nodes, the delivery ratio of E-BIOSARP is reduced only negligibly compared with that of BIOSARP as a result of the introduction of the encryption process. Furthermore, the results presented in Table 6 and Figure 11 demonstrate that when malicious traffic is present in the network, E-BIOSARP successfully handles the attacks and largely maintains its delivery ratio, with only a slight decrease due to the time required to process, classify and drop the malicious packets.
Table 6. Delivery ratio comparison.
Figure 11. Delivery ratio comparison.
The proposed mechanism reduces the broadcast overhead and the overall processing time by avoiding repetitive rediscoveries, replies, and recalculations; this, in turn, helps to reduce processing delays and the consumption of power from the batteries of the wireless sensor nodes, thereby increasing the WSN lifetime.

6.5. Energy Consumption Comparison for E-BIOSARP, BIOSARP and SRTLD

The average energy consumption results for E-BIOSARP, BIOSARP, and SRTLD are compared in Table 7. Figure 12 shows that the consumption of battery power needed for SRTLD to process the packets is higher than that needed for E-BIOSARP. The latter is close to BIOSARP in terms of the energy required to process a packet. The energy consumption is reduced for E-BIOSARP compared with SRTLD because the data encryption processing time is shorter and there are fewer rediscoveries. Furthermore, Table 7 and Figure 12 show that even with the presence of malicious activity and attacks in the network, the level of energy consumption of E-BIOSARP is maintained, demonstrating the efficiency of the proposed mechanism.
Table 7. Energy consumption comparison.
Figure 12. Energy consumption comparison.

6.6. Packet Overhead Comparison between E-BIOSARP, BIOSARP and SRTLD

The average packet overhead results for E-BIOSARP, BIOSARP, and SRTLD are compared in Table 8. Figure 13 shows the large differences between E-BIOSARP and BIOSARP on the one hand and SRTLD on the other hand. The results for E-BIOSARP are very close to the results for BIOSARP. The results for E-BIOSARP justify the reduced rediscovery and calculation process, which causes the overhead per packet received to be much less with E-BIOSARP, even when the WSN suffers from malicious activity.
Table 8. Data packet overhead comparison.
Figure 13. Packet overhead comparison.

6.7. Detection Rate and Accuracy Comparison between E-BIOSARP and SRTLD

Table 9 shows a comparison between E-BIOSARP and SRTLD in terms of the detection rate and accuracy, as determined based on the WSN scenario depicted in Figure 5. The detection rate and accuracy were calculated as described in Section 6.2.
Table 9. Detection rate and accuracy comparison.

6.8. Comparative Analysis of E-BIOSARP and ESPA

E-BIOSARP and a recent ESPA [29] were compared in an ns-2-based simulation analysis. The network topology was defined using the simulation parameters given in [29]. ESPA exhibits much better performance than EEABR [46] and SERP [15], as presented in [29]. A WSN with 300 wireless sensor nodes was deployed in a 300 m × 300 m region, with a base station with ID 0 in the center of the network. The real-time traffic scenario was configured by using a UDP transport layer to handle the generated CBR traffic. The average difference in energy consumption between E-BIOSARP and ESPA is presented in Table 10, revealing a 7.6% increase in energy consumption when E-BIOSARP is utilized in a WSN. The advantage of E-BIOSARP based on random key encryption is illustrated in Figure 14. As the level of malicious activity increases, the performance of ESPA dramatically decreases, whereas that of E-BIOSARP remains more stable.
Table 10. Energy consumption comparison.
Figure 14. Average remaining energy.

7. Concluding Remarks

In this paper, to ensure the security of WSNs beginning in the deployment phase, BIOSARP was enhanced through the incorporation an encryption mechanism that was originally applied in SRTLD to take advantage of the best features of both schemes. This approach was taken because BIOSARP achieves superior data packet routing performance compared with SRTLD, whereas the SRTLD encryption mechanism provides better communication security with minimal processing time. Under the enhanced BIOSARP (E-BIOSARP), the data to be transmitted are fragmented and only some of the important packet header fields are encrypted instead of the complete packet to save processing time and battery power. As a result, if malicious nodes and/or adversaries capture a secure packet, they cannot read the packet’s movement or its destination, which ensures network integrity and confidentiality. In addition, E-BIOSARP is capable of providing countermeasures against selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. The performance of E-BIOSARP was analyzed by varying the number of malicious nodes in the network. Overall, E-BIOSARP demonstrated improved performance compared with SRTLD and ESPA, and the simulation results confirm the efficiency of the proposed mechanism. Because of the encryption process, E-BIOSARP provides better security compared with BIOSARP while incurring only a minimal performance penalty because of the additional processing time required for encryption. Future work will address the enhancement of the security mechanism with additional rounds of encryption, and we will test different variations of E-BIOSARP in a real-time experimental WSN test bed for further analysis.

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia, for funding this work through international research group project (No. IRG14-07B). The work of Joel J.P.C. Rodrigues was supported by Visiting Professor Program at King Saud University, by the Instituto de Telecomunicações, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT—Fundação para a Ciência e a Tecnologia through the UID/EEA/50008/2013 Project.

Author Contributions

Kashif Saleem, Mehmet A. Orgun, Joel J. P. C. Rodrigues and Adel Ali Ahmed conceived and designed the experiments. Kashif Saleem performed the experiments. Kashif Saleem, Abdelouahid Derhab, Mohammed Sayim Khalil, Jalal Al-Muhtadi, Mehmet A. Orgun and Joel J. P. C. Rodrigues analyzed the data. Kashif Saleem, Adel Ali Ahmed, Mohammed Sayim Khalil, Joel J. P. C. Rodrigues and Jalal Al-Muhtadi contributed materials and analysis tools. Kashif Saleem and Abdelouahid Derhab designed the algorithm and experimental methods. Kashif Saleem programmed and compiled the data. Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun and Jalal Al-Muhtadi wrote the paper. All authors read, revised and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cerpa, A.; Wong, J.L.; Kuang, L.; Potkonjak, M.; Estrin, D. Statistical model of lossy links in wireless sensor networks. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, ACM/IEEE IPSN, Los Angeles, CA, USA, 25–27 April 2005; pp. 81–88.
  2. Saleem, K. Biological Inspired Self-Organized Secure Autonomous Routing Protocol for Wireless Sensor Networks. Ph.D. Thesis, Universiti Teknologi Malaysia, Johor Bahru, Malaysia, 2011. [Google Scholar]
  3. Butun, I.; Morgera, S.D.; Sankar, R. A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 2014, 16, 266–282. [Google Scholar] [CrossRef]
  4. Chen, C.-Y.; Chao, H.-C. A survey of key distribution in wireless sensor networks. Secur. Commun. Netw. 2014, 7, 2495–2508. [Google Scholar] [CrossRef]
  5. Han, G.; Jiang, J.; Shu, L.; Niu, J.; Chao, H.-C. Management and applications of trust in wireless sensor networks: A survey. J. Comput. Syst. Sci. 2014, 80, 602–617. [Google Scholar] [CrossRef]
  6. Fadlullah, Z.M.; Taleb, T.; Vasilakos, A.V.; Guizani, M.; Kato, N. DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Trans. Netw. 2010, 18, 1234–1247. [Google Scholar] [CrossRef]
  7. He, D.; Chen, C.; Chan, S.; Bu, J.; Vasilakos, A.V. ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 2012, 16, 623–632. [Google Scholar] [PubMed]
  8. Saleem, S.; Ullah, S.; Kwak, K.S. A study of IEEE 802.15.4 security framework for wireless body area networks. Sensors 2011, 11, 1383–1395. [Google Scholar] [CrossRef] [PubMed]
  9. Silva, B.M.; Rodrigues, J.J.; Canelo, F.; Lopes, I.C.; Zhou, L. A data encryption solution for mobile health apps in cooperation environments. J. Med. Internet Res. 2013, 15. [Google Scholar] [CrossRef] [PubMed]
  10. Liu, B.; Bi, J.; Vasilakos, A.V. Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Secur. 2014, 9, 436–450. [Google Scholar] [CrossRef]
  11. Ali, M.; Khan, S.U.; Vasilakos, A.V. Security in cloud computing: Opportunities and challenges. Inf. Sci. 2015, 305, 357–383. [Google Scholar] [CrossRef]
  12. Rawat, P.; Singh, K.D.; Chaouchi, H.; Bonnin, J.M. Wireless sensor networks: A survey on recent developments and potential synergies. J. Supercomput. 2013, 68, 1–48. [Google Scholar] [CrossRef]
  13. Walters, J.P.; Liang, Z. Wireless sensor network security: A survey. In Security in Distributed Grid, Mobile, and Pervasive Computing; Yang, X., Ed.; CRC Press: Boca Raton, FL, USA, 2007; pp. 368–403. [Google Scholar]
  14. Saleem, K.; Derhab, A.; Al-Muhtadi, J.; Shahzad, B.; Orgun, M.A. Secure transfer of environmental data to enhance human decision accuracy. Comput. Hum. Behav. 2015, 51, 632–639. [Google Scholar] [CrossRef]
  15. Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 2003, 1, 293–315. [Google Scholar] [CrossRef]
  16. Pathan, A.K.; Lee, H.W.; Hong, C.S. Security in wireless sensor networks: Issues and challenges. In Proceedings of the 8th IEEE ICACT 2006, Phoenix Park, Korea, 20–22 February 2006; pp. 1043–1048.
  17. Chen, D.; Varshney, P.K. Geographic routing in wireless Ad Hoc networks. In Guide to Wireless Ad Hoc Networks; Misra, S., Woungang, I., Eds.; Springer: London, UK, 2009; pp. 151–188. [Google Scholar]
  18. Sookhak, M.; Akhundzada, A.; Sookhak, A.; Eslaminejad, M.; Gani, A.; Khurram Khan, M.; Li, X.; Wang, X. Geographic wormhole detection in wireless sensor networks. PLoS ONE 2015, 10. [Google Scholar] [CrossRef]
  19. Junqi, Z.; Shankaran, R.; Orgun, M.A.; Varadharajan, V.; Sattar, A. A trust management architecture for hierarchical wireless sensor networks. In Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks (LCN), Denver, CO, USA, 10–14 October 2010; pp. 264–267.
  20. Eigen, M.; Schuster, P. The Hypercycle: A Principle of Natural Self Organization; Springer-Verlag: Berlin, Germany, 1979. [Google Scholar]
  21. Von Foerster, H. On self-organizing systems and their environments. In Self-Organizing Systems; Yovitts, M.C., Cameron, S., Eds.; Pergamon Press: New York, NY, USA, 1960; pp. 31–50. [Google Scholar]
  22. Dressler, F. Benefits of bio-inspired technologies for networked embedded systems: An overview. In Dagstuhl Seminar Proceedings, Organic Computing—Controlled Emergence; Internationales Begegnungs—Und Forschungszentrum fur Informatik (IBFI): Schloss Dagstuhl, Germany, 2006; pp. 1–17. [Google Scholar]
  23. Saleem, K.; Fisal, N.; Abdullah, M.S.; Ariffin, S.H.S. Biological inspired secure autonomous routing mechanism for wireless sensor networks. Int. J. Intell. Inf. Database Syst. 2011, 5, 313–337. [Google Scholar] [CrossRef]
  24. Saleem, K.; Fisal, N.; Baharudin, M.A.; Ahmed, A.A.; Hafizah, S.; Kamilah, S. BIOSARP—Bio-inspired self-optimized routing algorithm using ant colony optimization for wireless sensor network—Experimental performance evaluation. In Computers and Simulation in Modern Science, Included in ISI/SCI Web of Science and Web of Knowledge; Mastorakis, N.E., Demiralp, M., Mladenov, V.M., Eds.; WSEAS Press: Sofia, Bulgaria, 2011; pp. 165–175. [Google Scholar]
  25. Saleem, K.; Fisal, N.; Hafizah, S.; Rashid, R. An intelligent information security mechanism for the network layer of WSN: BIOSARP. In Computational Intelligence in Security for Information Systems; Herrero, Á., Corchado, E., Eds.; Springer: Berlin/Heidelberg, Germany; pp. 118–126.
  26. Ahmed, A.A.; Fisal, N.F. Secure real-time routing protocol with load distribution in wireless sensor networks. Secur. Commun. Netw. 2011, 4, 839–869. [Google Scholar] [CrossRef]
  27. Saleem, K.; Khalil, M.S.; Fisal, N.; Ahmed, A.A.; Orgun, M.A. Efficient random key based encryption system for data packet confidentiality in WSNs. In Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2013), Melbourne, Australia, 16–18 July 2013; pp. 1662–1668.
  28. Lim, C.H. LEAP++: A robust key establishment scheme for wireless sensor networks. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 376–381.
  29. Jean de Dieu, I.; Assouma, N.; Muhamad, M.; Jin, W.; Lee, S. Energy-efficient secure path algorithm for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 2012, 1–11. [Google Scholar] [CrossRef]
  30. Wang, H.; Sheng, B.; Tan, C.C.; Li, Q. Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. In Proceedings of the 28th International Conference on Distributed Computing Systems, Beijing, China, 17–20 June 2008; pp. 11–18.
  31. Faisal, M.; Al-Muhtadi, J.; Al-Dhelaan, A. Integrated protocols to ensure security services in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 2013, 1–13. [Google Scholar] [CrossRef]
  32. Pathan, A.-S.K.; Hong, C.S. SERP: Secure energy-efficient routing protocol for densely deployed wireless sensor networks. Ann. Telecommun. 2008, 63, 529–541. [Google Scholar] [CrossRef]
  33. Lasla, N.; Derhab, A.; Ouadjaout, A.; Bagaa, M.; Challal, Y. SMART: Secure multi-paths routing for wireless sensor networks. In Ad-Hoc, Mobile, and Wireless Networks; Guo, S., Lloret, J., Manzoni, P., Ruehrup, S., Eds.; Springer International Publishing: Berlin, Germany, 2014; pp. 332–345. [Google Scholar]
  34. Saleem, K.; Fisal, N.; Al-Muhtadi, J. Empirical studies of bio-inspired self-organized secure autonomous routing protocol. IEEE Sens. J. 2014, 14, 2232–2239. [Google Scholar] [CrossRef]
  35. Saleem, K.; Fisal, N.; Baharudin, M.A.; Ahmed, A.A.; Hafizah, S.; Kamilah, S. Ant colony inspired self-optimized routing protocol based on cross layer architecture for wireless sensor networks. WSEAS Trans. Commun. 2010, 9, 669–678. [Google Scholar]
  36. Saleem, K.; Fisal, N. Enhanced ant colony algorithm for self-optimized data assured routing in wireless sensor networks. In Proceedings of the 2012 18th IEEE International Conference on Networks (ICON), Singapore, Singapore, 12–14 December 2012; pp. 422–427.
  37. Zhang, Y.; Kumar, N.; Chen, J.; Rodrigues, J.J.P.C. A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Secur. Commun. Netw. 2015. [Google Scholar] [CrossRef]
  38. Fu, J.S.; Liu, Y. Double cluster heads model for secure and accurate data fusion in wireless sensor networks. Sensors 2015, 15, 2021–2040. [Google Scholar] [CrossRef] [PubMed]
  39. Li, X.; Chen, D.; Li, C.; Wang, L. Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks. Sensors 2015, 15, 15952–15973. [Google Scholar] [CrossRef] [PubMed]
  40. Rahayu, T.M.; Lee, S.G.; Lee, H.J. A secure routing protocol for wireless sensor networks considering secure data aggregation. Sensors 2015, 15, 15127–15158. [Google Scholar] [CrossRef] [PubMed]
  41. Sanzgiri, K.; Dahill, B.; Levine, B.N.; Shields, C.; Royer, E.M.B. A secure routing protocol for Ad Hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 12–15 November 2002; pp. 78–87.
  42. Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed.; John Wiley & Sons, Inc.: New York, NY, USA, 1995. [Google Scholar]
  43. Xiao, S.; Gong, W.; Towsley, D. Dynamic wireless security. In Dynamic Secrets in Communication Security; Springer: New York, NY, USA, 2014; pp. 33–53. [Google Scholar]
  44. Saleem, K.; Derhab, A.; Al-Muhtadi, J.; Orgun, M.A. Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user’s connectivity experience. Comput. Hum. Behav. 2015, 51, 1340–1350. [Google Scholar] [CrossRef]
  45. Liu, S.; Gavrylyako, O.V.; Bradford, P.G. Implementing the TEA algorithm on sensors. In Proceedings of the 42nd Annual Southeast Regional Conference, Huntsville, AL, USA, 2–3 April 2004; pp. 64–69.
  46. Camilo, T.; Carreto, C.; Silva, J.; Boavida, F. An energy-efficient ant-based routing algorithm for wireless sensor networks. In Ant Colony Optimization and Swarm Intelligence; Dorigo, M., Ed.; Springer: Berlin, Germany, 2006; pp. 49–59. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.