🏆
Global Research Platform
Serving Researchers Since 2012

Secured Servant MODLEACH Heterogeneous Routing Protocol for Large Scale Wireless Sensor Networks

DOI : https://doi.org/10.5281/zenodo.19495877
Download Full-Text PDF Cite this Publication

Text Only Version

Secured Servant MODLEACH Heterogeneous Routing Protocol for Large Scale Wireless Sensor Networks

(1) Fuseini Jibreel, (2) Karim Azumah, (3) Yakubu Abdul-Wahab Nawusu, (4) Diyawu Mumin, (5) Shiraz Ismail

(1345) Department of Computer Science, , (2) Statistical Sciences Department, Tamale Technical University, Ghana.

Abstract – A Wireless Sensor Network (WSN) consists of tiny devices called sensor nodes. These devices can sense, compute, and transmit sensed data. They are usually deployed to capture data in hostile environments and transmit it to a Base Station for analysis. However, WSNs are vulnerable to various attacks and threats, which can compromise data credibility. Security, therefore, becomes a major concern in these networks. Servant-MODELACH is a heterogeneous routing protocol that was proposed without security features, making it unsuitable for insecure environments. In this paper. Secured Servant MODLEACH (SS-MODLEACH) is proposed. The new scheme uses asymmetric cryptography with effective key management to secure captured data from sensor nodes to the Base Station. SS-MODLEACH’s performance was evaluated using MatLab 2018a, and simulation results show that the new scheme effectively encrypts and decrypts data with reasonable energy consumption.

Keywords – Wireless Sensor Networks, Security, Attacks, RSA

  1. INTRODUCTION

    Wireless Sensor Networks (WSNs) are networks of low-cost devices used in many applications to transmit sensitive data from one device to another. Deploying wireless sensor networks in sensitive environments such as nuclear facilities or battlefield surveillance is challenging due to security implications. Securing communications is crucial in such environments, given the risk of active and passive attacks [1]. Cryptography can be used for security in WSNs, but the Cryptographic algorithms should be designed to use less memory, power and energy so the network lifetime can be increased [2]. Cryptography techniques can be classified into three types: Symmetric Cryptographic techniques, Asymmetric Cryptographic techniques and Hybrid Cryptographic techniques [3]. Symmetric cryptography uses a shared secret key for encryption and decryption between nodes. It’s popular for being hardware-friendly and energy- efficient, and since the key is not sent with the message, decryption by unauthorised parties is tough. Only those with the shared key can decrypt it. Key distribution in this scheme is a major issue the key needs to reach the recipient securely before the actual message, and using communication channels to transmit it can be insecure. Also, it does not support non- repudiable digital signatures [4][5]. However, Asymmetric cryptography uses a private key for decryption and signing,

    while a public key is used for encryption and verification. The private key stays secret, but the public key can be shared openly. This boosts security since private keys are not transmitted or exposed. It is also known as public key cryptography, and it solves the key distribution problem since keys do not need to be exchanged [6]. Hybrid cryptography combines symmetric and asymmetric cryptography approaches to leverage their strengths [7]. In cryptographic systems, the symmetric key cryptography alone is not enough for WSN security due to the key distribution challenge across distant nodes. Public key cryptography (PKC), on the other hand, is needed to efficiently distribute shared symmetric keys [8][9]. The PKC’s computational complexity is the major challenge for WSN nodes, but previous works suggest that it can still be viable with constrained microcontrollers [10][11]. There are two main public key schemes that are being used in these networks. These are: ECC (elliptic curve cryptography) and RSA (Rivest Shamir Addleman) [12]. ECC is popular in WSNs due to its shorter key size (160-bit for security), whereas RSA needs a larger 1024-bit key for similar security. Still, RSA’s widespread use in general computing and internet apps makes it a consideration for WSN systems needing compatibility with existing RSA-based infrastructure [13]. Therefore, this research proposes a secure servant MODLEACH using RSA. Many schemes based on symmetric or public key cryptography have been employed in wireless sensor networks to secure data transmission on the networks. A lightweight and efficient RSA hybrid messaging system (SHRSA) was implemented and analysed using a four-layer authentication stack by [14]. This approach addressed the issue of slow decryption speeds in low-level systems by leveraging passwords, digital certificates, and third-party authentication. The authors in [15] proposed a key-sharing algorithm combined with RSA encryption to enhance security in cloud computing data transfers between users and the cloud. In [16], Elliptic Curve Cryptography (ECC) was implemented as a lightweight encryption solution on a popular WSN operating system, utilising the TinyECC library to execute ECC operations. In [17], an efficient and robust authentication approach leveraging elliptic curve encryption and the ElGamal signature scheme was introduced. This method can authenticate hop-by-hop message content without exceeding the built-in threshold limitations. An RSA scheme was proposed to defend against DoS attacks in networks [18].

    Simulation results showed that RSA’s stability against DoS attacks leads to reduced energy consumption and increased network lifetime.

  2. MATERIAL AND METHODS

    In this section, the new scheme called Secured Servant MODLEACH(SS-MODLEACH) is explained.

    1. Proposed system

      The original unsecured scheme was proposed by the authors in [19]. The scheme adopted energy conservation techniques that can provide some amount of the energy required by some aspect of RSA application. Some of the strategies include selecting cluster head based on residual energy, servant nodes being introduced to aggregate data received from the nodes, a multi-hop transmission method used to convey reports from nodes to BS and the implementation of hard and soft thresholds before data transmission. It was also argued by the authors in [20] that ECC decrypts faster but encrypts slower than RSA, while RSA encrypts faster but decrypts slower. Therefore, RSA is employed in this research work.

    2. Key generationn

      In the proposed system, the BS is assumed to be a resourceful node having unconstrained computational capabilities and energy supply. The BS software system has three primary components: the database, the user interface, and the RSA algorithm. Therefore, the private and public keys are generated by the BS using the RSA algorithm, and it is explained below:

      1. Two random prime numbers t and w, are generated by the BS such that t . These prime numbers are generated using Equation (1)

        (1)

        Where is a positive integer. The prime numbers are confirmed using is_prime function.

        The BS uses Equations (2), (3) and (4) to determine the public and private keys.

      2. Modulus (2)

      3. (3)

      4. Public exponent and

        is chosen and then

      5. Private exponent is determined. (4)

      Hence, the public key and the private key generated are

      respectively and }

    3. Key Distribution

      When the BS generates the keys, it transmits the public key to the cluster heads (CHs). Applying the energy dissipation model discussed by authrs in [22], the energy required for the transmission of the keys in bit to the CHs is given by the Equation (5)

      (5)

      Where is the energy dissipated by the BS, is the public key being transmitted in bits, energy used by the electronics of the transmitter, , is the energy used for free space and is the gap between the BS and CH.

      The CHs will also share the received key with the servant CHs in their respective clusters using the Equation (6)

      (6)

      Where is the intervals between the CH and SCH.

    4. Encryption process

      1. Encryption process

        Encryption is done using the public key, consists of

        which was generated and distributed by the BS. Hence, any time the SCHs receive data from the normal sensor nodes, they encrypt data with the public keys received from the CHs using the following procedure:

        1. The normal nodes capture data from the environment as a positive integer ( ) including their ID such that

        2. The energy required to transmit their data (k bits) to the SCHs is given by Equation (7) and (8)

          H = (7)

          H = (8)

          Where is the intervals between the sensor nodes (SN) and SCH

        3. The energy required by SCHs to received and

          aggregated the received data, bit ( is given by Equation (8)

          = (8)

          Where is the clusters number in the network and is the energy for data aggregation.

        4. It then encrypts it, using equation (9)

          (9)

        5. The ciphertext is now sent to the CHs.

          The energy required by the SCH to send the encrypted data to the CH is given by Equation (10)

          (10)

          Where is the distance between the SCH and CH.

          Also, the energy needed by the head to convey the aggregated and encrypted report to the Sink is given by Equation (11)

          (11)

          Table 1: Simulation Parameters

          S/N

          Parameter

          Values

          1

          Eelect

          50nJ/bit

          2

          E fs

          10pJ/bit/m2

          4

          Emp

          0.0013pJ/bit/m2

          6

          0.5J

          7

          k

          4000

          8

          n

          100

          9

          0.1

          10

          2357

          11

          2551

          12

          1036250

          13

          1: STATISTICS.PACKETS_TO_BS(r+1)

          14

          15

          5nJ/bit/message

          Where is the intervals between the CH and BS

    5. Decryption process

    The Sink accepts the encoded report and then decodes it using its private key {d, } to get the original message. It is only the BS which has this private key to decrypt.

    The energy required by the BS to receive the encrypted data is

    given by Equation (12)

    (12)

    The BS uses the following Equation (12) to decrypt the received data.

    . (13)

    The resourced node extracts the plaintext from the integer representative m. It checks the of the sending nodes before it will decide to discard it or accept it. Figure 1 shows

    how the encrypted data is sent to the BS.

    Fig. 1: Transmission of encrypted data to Base station

  3. SIMULATION RESULTS AND ANALYSIS

    The SS-MODLEACH model is simulated using MATLAB R2017a. This is to assess the effectiveness of the new secure algorithm. In this experiment, 200 nodes are deployed in 200*200 region and the BS was placed (100,250) away from the centre. Lets initialize the optimum probability, = 0.1 and assume that 40% of devices will be advanced sensors ( =0.2) and 20% servant nodes ( =0.1). The simulation parameters used are shown in Table1. However, prime numbers and are included in these standard values to generate the keys.

    Table 2 shows the keys generated by the Base station (BS).

    The BS chooses two prime numbers and then generates both the public and private keys from these numbers.

    Table 2: Generation of keys by the Base station

    Proposed system

    Module(n):

    6012707

    Phi:

    6007800

    Public key generated:

    (75913,6012707 )

    Private key generated:

    (4433377,6012707)

    Table 3 and Figure 2 show an encrypted packet from the CHs to the BS and decryption of the data by the BS at 250 rounds simulation period respectively. Thus r = 250.

    Table 3: Encrypted Data

    1

    48

    47

    4

    25

    56

    43

    92

    9

    0

    11

    88

    37

    64

    75

    16

    33

    32

    19

    0

    21

    28

    27

    24

    25

    76

    23

    72

    29

    0

    31

    68

    17

    84

    75

    36

    13

    12

    39

    0

    41

    8

    7

    44

    25

    96

    3

    52

    49

    0

    51

    48

    97

    4

    75

    56

    93

    92

    59

    0

    61

    88

    87

    64

    25

    16

    83

    32

    69

    0

    71

    28

    77

    24

    75

    76

    73

    72

    79

    0

    81

    68

    67

    84

    25

    36

    63

    12

    89

    0

    91

    8

    57

    44

    75

    96

    53

    52

    99

    0

    1

    48

    47

    4

    25

    56

    43

    92

    9

    0

    11

    88

    37

    64

    75

    16

    33

    32

    19

    0

    21

    28

    27

    24

    25

    76

    23

    72

    29

    0

    31

    68

    17

    84

    75

    36

    13

    12

    39

    0

    41

    8

    7

    44

    25

    96

    3

    52

    49

    0

    51

    48

    97

    4

    75

    56

    93

    92

    59

    0

    61

    88

    87

    64

    25

    16

    83

    32

    69

    0

    71

    28

    77

    24

    75

    76

    73

    72

    79

    0

    81

    68

    67

    84

    25

    36

    63

    12

    89

    0

    91

    8

    57

    44

    75

    96

    53

    52

    99

    0

    1

    48

    47

    4

    25

    56

    43

    92

    9

    0

    11

    88

    37

    64

    75

    16

    33

    32

    19

    0

    21

    28

    27

    24

    25

    76

    23

    72

    29

    0

    31

    68

    17

    84

    75

    36

    13

    12

    39

    0

    41

    8

    7

    44

    25

    96

    3

    52

    49

    0

    51

    48

    97

    4

    75

    56

    93

    92

    59

    0

    61

    88

    87

    64

    25

    16

    83

    32

    69

    0

    71

    28

    77

    24

    75

    76

    73

    72

    79

    0

    81

    68

    67

    84

    25

    36

    63

    12

    89

    0

    91

    8

    57

    44

    75

    96

    53

    52

    99

    0

    1

    48

    47

    4

    25

    56

    43

    92

    9

    0

    11

    88

    37

    64

    75

    16

    33

    32

    19

    0

    21

    28

    27

    24

    25

    76

    23

    72

    29

    0

    31

    68

    17

    84

    75

    36

    13

    12

    39

    0

    41

    8

    7

    44

    25

    96

    3

    52

    49

    0

    51

    The decrypted message is shown in Figure 2. Similarly, after the simulation of the decryption algorithm, the results obtained are picked from the MATLAB platform to a Microsoft word environment.

    Fig. 2: Decrypted Packets by the Base station at 250 rounds

    In order to illustrate the encryption and decryption process clearly, Figures 3, 4 and 5 are also generated.

    Figure 3 shows new prime numbers and with new keys generated by the BS. In this case, encryption and decryption are done on specific data which is 5000bits of temperature and therefore, the prime numbers were chosen such that, though to increase the security of the network at the same time not depleting the energy of the nodes.

    Fig. 4: Encryption of data by BS using the proposed system.

    The encrypted report is received by Cluster Head (CH), and then transmit the report to the BS. The BS received the report, then generate the ASCII of the message which is similar to ASCII during the encryption process. The destination node then decrypted the message as 5000 as seen in Figure 5 and then confirmed the ID of the nodes which have transmitted the message before accepting the message or rejecting it.

    Fig. 5: Decryption of data by BS using the proposed system

    Figure 6 displays the residual energy of the sensors without RSA. The initial energy of the sensor is 0.5J. This energy reduces gradually due to data transmission until the end of the simulation period. The existing scheme (S-MODEACH) has been able to minimize the energy exhaustion rate in the network better than the proposed algorithm (SS- MODLEACH). This is as a result of the absence of any security algorithm in the protocol.

    Fig. 3: Generation of new keys by the Base station

    Figure 4 shows the encrypted 5000bits of the temperature sensed and transmitted by the SCHs nodes. The sensors first generated the ASCII equivalent of the data and finally encrypted the data before transmission.

    Fig. 6.: Residual Energy without RSA algorithm

    The Figure 4 shows the residual energy of the nodes with RSA per round. It can be seen that, the new scheme, SS- MODLEACH consumed energy more than the S- MODLEACH. This is because of the security algorithm in the new protocol. The normal sensor nodes used part of their energy to encrypt the captured data before transmission. As a result, most of the nodes die between 8000 and 9000 rounds. Few nodes whose energy was not exhausted showed a sudden increase in energy level but that was for a very short period. Although, adding the security algorithm has affected the lifetime of the network, the integrity, availability and confidentiality of the data transmitted are assured.

    encrypted data from the energy detrained nodes for onward submission to the cluster heads.

    Fig. 9: Number of dead nodes with RSA algorithm per round

  4. CONCLUSION

Fig. 7: Residual Energy with RSA per round

Figure 8 displays the number of death nodes without RSA. The rate of death of the nodes increases gradually until 10000 rounds where there was a sharp increase in the death of the nodes.

In these results, Secured Servant MODLEACH (SS- MODLEACH) is proposed. The new protocol employed the RSA algorithm to protect the data being transmitted within the network. The normal nodes in SS-MODLEACH capture data and transmit the report to the Servant cluster heads (SCHs). The intermediate nodes, SCHs, encrypt the data using the RSA scheme since these nodes have higher energy than the normal nodes. The encrypted data is sent to the CHs, which then transmit it to the BS, which then decrypts the data. This key management technique has reduced the energy consumption that would have been witnessed without these strategies. Although the new algorithm consumed more energy than the existing scheme, as shown in Figures 6 and 7, the new protocol provides better security than the existing protocol. This makes the SS-MODLEACH suitable for any unsecured environment.

REFERENCES

Fig. 8: Number of death nodes without RSA algorithm

Figure 9 displays the number of death nodes when the cryptographysystem was added. The rate of death of the nodes increases gradually until 8000 rounds where there was a sharp increase in the death of the nodes. The number of deaths recorded is 2000 of the nodes. This number could have been high if the energy for intracluster communication was not reduced. The reduction in this energy is as a result of the presence of servant nodes which immediately receive the

  1. M. W.Khan, “SMS Security in Mobile Devices: A Survey,” Int. J. Advanced Networking and Applications, vol. 5, no. 2, pp. 1873-1882, 2013.

  2. G. Saminathan and S. Karthik, “Development of an energy efficient, secure and reliable Wireless Sensor Networks Routing Protocol based on Data Aggregation and user Authentication,” American Journal of Applied Sciences, vol. 10, no. 8, pp. 832-843, 2013.

  3. A. D. Daniel and E. Roslin, “WSN Security: An Asymmetric Encryption and Hash Function based Approach,” Int. J. Engineering Research & Technology (IJERT), vol. 5, no. 2, pp. 312-314, 2016.

  4. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput. Netw., vol. 52, no. 12, pp. 2292-2330, 2008.

  5. I. F. Akyildiz, T. Melodia, and K. R. Chowdhury, “A survey on wireless multimedia sensor networks,” Comput. Netw., vol. 51, no. 4, pp. 921- 960, 2007.

  6. V. C. Gungor, B. Lu, and G. P. Hancke, “Opportunities and challenges of wireless sensor networks in smart grid,” IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557-3564, 2010.

  7. C. Y. Chong and S. P. Kumar, “Sensor networks: Evolution, opportunities, and challenges,” Proc. IEEE, vol. 91, no. 8, pp. 1247- 1256, 2003.

  8. T. ElGamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” in Advances in Cryptology: Proceedings of CRYPTO 84, G. R. Blakley and D. Chaum, Eds. Berlin/Heidelberg, Germany: Springer, 1985, pp. 10-18.

  9. P. MacKenzie, S. Patel, and R. Swaminathan, “Password-Authenticated Key Exchange Based on RSA,” in Proc. Advances in Cryptology ASIACRYPT 2000, T. Okamoto, Ed. Berlin/Heidelberg, Germany: Springer, 2000, pp. 599-613.

  10. P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, “NanoECC: Testing the limits of elliptic curve cryptography in sensor networks,” in Proc. European Conference on Wireless Sensor Networks, Bologna, Italy, 2008, pp. 305-320.

  11. C. P. L. GouvĂȘa and J. LĂłpez, “Software implementation of pairing- based cryptography on sensor networks using the MSP430 microcontroller,” in Proc. Int. Conf. Cryptology in India, NewDehli, India, 2009, pp. 248-262.

  12. N. Koblitz, “Elliptic Curve Cryptosystems,” Math. Comput., vol. 48, no. 177, pp. 203-209, 1987.

  13. U. Gulen, A. Alkhodary, and S. Baktir, “Implementing RSA for Wireless Sensor Nodes,” Sensors, vol. 19, no. 13, pp. 1-15, 2019.

  14. A. Bhattacharjy, X. Zhong, and X. Li, “A Lightweight and Efficient Secure Hybrid RSA (SHRSA) Messaging Scheme With Four-Layered Authentication Stack,” IEEE Access, 2019.

  15. M. E. Hussain and M. R. Hussain, “Securing Cloud Data using RSA Algorithm,” Suresh Gyan Vihar University, 2018.

  16. N. Saqib and S. S. Shekhawat, “Securing Wireless Sensor Networks Using Elliptic Curve Cryptography,” Int. J. Eng. Trends Technol., vol. 56, no. 1, 2018.

  17. M. Manjusha, A. Prof, M. Laxmi, B. Rananavare, and A. Prof, “A Robust Message Authentication Scheme In Multihop WSN Using Elliptical Curve Cryptography And Elgamal Signature,” Int. J. Eng. Research & Technology (IJERT), vol. 2, no. 7, 2013.

  18. R. Fotohi, S. F. Bari, and M. Yusefi, “Securing Wireless Sensor Networks Against Denial-of Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol,” Faculty of Computer Science and Engineering, Shahid Beheshti University, Tehran, Iran, 2018.

  19. F. Jibreel, M. I. Daabo, A. W. Yusuf-Asaju, and K. A. Gbolagade, “Servant-MODLEACH Energy Efficient Cluster Based Routing Protocol for Large Scale Wireless Sensor Network,” The 12th Int. Multi- Conference on ICT Applications, vol. XII, pp. 1-6, 2018.

  20. D. Mahto, “RSA and ECC: A Comparative Analysis,” vol. 12, no. 19,

pp. 9053-61, 2017.