An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process.
Keyword:HMAC Pair-wise key establishment Security WSN
Copyright © 2018 Institute of Advanced Engineering and Science.All rights reserved.
Corresponding Author:Manjunath B. E., Dept. of ECE, Jain University, Bangalore, India. Email: manjunathbephd@gmail.com
INTRODUCTIONA WSN is formed with sensor nodes (SNs) using ad-hoc technology. Due to ad hoc technology, SNs are self-configured and operates the data transfer without any access points as well the computing takes place in a distributed manner. Traditionally, there exist many communication protocols such as Direct Communication (DC), Minimum transmission energy (MTE) protocol like hop-by-hop. The problem found in DC is the remote node from the sink die soon and is reserves in MTE, where nearby node die soon. A hierarchal routing mechanism, where the entire network is divided into groups called clusters, and a local sink in each cluster is elected which is called as a cluster head (CH) or aggregator node.In initial cluster-based protocols, the cluster was static, which provides inconsistency of energy use because of the successive election of the same node as CH. The limitation of the static cluster is overcome in a state of artwork LEACH [1], wherein every communication cycle a new set of the cluster is formed and CH election. Since LEACH, enormous efforts are made by various other researchers towards developing new protocols for routing or communication, the collective information can be found in [2]. The WSNs having exploding usage into different critical applications since its conceptualization on the timeline, and the few to name includes (a) smart farming, (b) structural health monitoring, (c) fire detection in forest, (d) traffic congestion, etc. till Internet of Things (IoT) application so it is not just limited to military applications rather it has become a lifeline. The threats of attacks on this network are distinct philosophical to any network