STWSN: A novel secure distributed transport protocol for wireless sensor networks

Published on Dec 1, 2018in International Journal of Communication Systems1.278
· DOI :10.1002/dac.3827
Amit Dvir9
Estimated H-index: 9
(Ariel University),
Vinh-Thong Ta13
Estimated H-index: 13
(UCLan: University of Central Lancashire)
+ 1 AuthorsLevente Buttyán44
Estimated H-index: 44
(BME: Budapest University of Technology and Economics)
Several transport protocols for wireless sensor networks (WSNs) have been designed to fulfill efficiency requirements such as energy and reliability. Unfortunately, most of these transport protocols do not include sufficient security mechanisms and hence are vulnerable to numerous reliability and energy attacks. To address these vulnerabilities, this paper proposes a novel secure transport protocol, named as secure transport protocol for wireless sensor networks (STWSN). On the basis of distributed transport for sensor networks (DTSN) protocol, our protocol adds a new security extension in order to provide secure transport protocol. We provide both informal and formal security analyses of STWSN and show that it resists attacks on energy efficiency and reliability requirements. Last but not least, a performance analysis and simulation results are also presented.
  • References (25)
  • Citations (0)
📖 Papers frequently viewed together
2013ICC: International Conference on Communications
3 Authors (Amit Dvir, ..., Ta Vinh Thong)
6 Citations
2006ICIEA: Conference on Industrial Electronics and Applications
3 Authors (Debao Xiao, ..., Ying Zhou)
22 Citations
2009CTS: Collaboration Technologies and Systems
8 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
#1Run Ye (University of Electronic Science and Technology of China)H-Index: 2
#2Azzedine Boukerche (U of O: University of Ottawa)H-Index: 50
Last. Bin Yan (University of Electronic Science and Technology of China)H-Index: 3
view all 5 authors...
Retransmission is the most common data transmission mechanism in wireless sensor networks, and can improve data transmission reliability via the acknowledgement mechanism. However, the simple acknowledgement retransmission is associated with some negative factors such as data delay, low throughput among others. To overcome the shortcomings of the retransmission mechanism, redundancy coding is introduced to wireless communications, which has been widely applied in 4G communication. Unfortunately,...
8 CitationsSource
#1Maryam Kordlar (IAU: Islamic Azad University)H-Index: 2
#2Gholamhossein Ekbatanifard (IAU: Islamic Azad University)H-Index: 6
Last. Ramin Ahmadi (IAU: Islamic Azad University)H-Index: 2
view all 4 authors...
Due to the energy constraint and high packet loss rate, energy-efficient and reliable data transmission are crucial issues in WSNs. In order to increase the network reliability and throughput, multipath forwarding is used in many applications. However because of using multiple paths between source and destination, the multipath forwarding mechanism increases the network overhead. By splitting the original messages and forwarding each sub-packet through multipath routing protocols energy consumpt...
1 CitationsSource
Congestion control is deemed to be one of the most significant challenges in Wireless Sensor Networks (WSNs) which is attributed to resource constraint specification and the number of deployed nodes. In WSNs, congestion is caused by the following factors: packet collision, node buffer overflow, transmission channel contention, transmission rate, many-to-one data transmission scheme and dynamic time variation transmission channel. Indeed, congestion has a significant impact on Quality of Services...
90 CitationsSource
#1Muhammad Adeel Mahmood (Victoria University of Wellington)H-Index: 3
#2Winston K. G. Seah (Victoria University of Wellington)H-Index: 29
Last. Ian Welch (Victoria University of Wellington)H-Index: 16
view all 3 authors...
Ensuring energy efficient and reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems. The two techniques typically used in WSNs to achieve reliability are either retransmission or redundancy.Most of the existing research focuses on traditional retransmission-based reliability, where reliable transmission of data packets is ensured in terms of recovering the lost pac...
138 CitationsSource
Jun 9, 2013 in ICC (International Conference on Communications)
#1Amit Dvir (BME: Budapest University of Technology and Economics)H-Index: 9
#2Levente Buttyán (BME: Budapest University of Technology and Economics)H-Index: 44
Last. Ta Vinh Thong (BME: Budapest University of Technology and Economics)H-Index: 4
view all 3 authors...
Transport protocols for Wireless Sensor Networks (WSNs) are designed to fulfill both reliability and energy efficiency requirements. Distributed Transport for Sensor Networks (DTSN) [1] is one of the most promising transport protocols designed for WSNs because of its effectiveness; however, it does not address any security issues, hence it is vulnerable to many attacks. The first secure transport protocol for WSN was the secure distributed transport protocol (SDTP) [2], which is a security exten...
6 CitationsSource
1 Citations
#1Levente Buttyán (BME: Budapest University of Technology and Economics)H-Index: 44
#2António Grilo (University of Lisbon)H-Index: 13
We propose a secure distributed transport protocol for wireless sensor networks that resists against attacks on the reliability service provided by the protocol, as well as against energy depleting attacks. Our protocol is based on the Distributed Transport for Sensor Networks (DTSN) protocol, to which we add a security extension that consists in an efficient, symmetric key based authentication scheme for control packets. Besides describing the operation of our protocol, we also provide its anal...
14 CitationsSource
#1Sean TurnerH-Index: 8
#2Lily ChenH-Index: 2
This document updates the security considerations for the MD5 message digest algorithm. It also updates the security considerations for HMAC-MD5.
31 Citations
May 24, 2010 in PerCom (IEEE International Conference on Pervasive Computing and Communications)
#1Levente Buttyán (BME: Budapest University of Technology and Economics)H-Index: 44
#2Laszlo Csik (BME: Budapest University of Technology and Economics)H-Index: 1
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols specifically designed for wireless sensor networks have been proposed in the literature. Besides providing end-to-end reliability, some of those protocols also address the problems of fairness and congestion control, and they are all optimized for low energy consumption. However, in this paper, we show that most of those ...
24 CitationsSource
Jan 1, 2010 in NDSS (Network and Distributed System Security Symposium)
#1Amir Herzberg (BIU: Bar-Ilan University)H-Index: 30
#2Haya Shulman (BIU: Bar-Ilan University)H-Index: 13
We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a new family of adversaries, the stealth denial and degradation of service (DoS) adversaries. These advers...
13 Citations
Cited By0
#1Khalid Haseeb (Islamia College University)H-Index: 8
#2Ikram Ud Din (University of Haripur)H-Index: 9
Last. Naveed Islam (Islamia College University)H-Index: 7
view all 4 authors...
Wireless sensor networks (WSNs) have demonstrated research and developmental interests in numerous fields, like communication, agriculture, industry, smart health, monitoring, and surveillance. In the area of agriculture production, IoT-based WSN has been used to observe the yields condition and automate agriculture precision using various sensors. These sensors are deployed in the agricultural environment to improve production yields through intelligent farming decisions and obtain information ...
1 CitationsSource
#1Khalid Haseeb (Islamia College University)H-Index: 8
#2Naveed Islam (Islamia College University)H-Index: 7
Last. Ikram Ud Din (University of Haripur)H-Index: 9
view all 4 authors...
The infrastructure of wireless sensor networks (WSN) is structured in an ad-hoc manner and organized nodes reporting the events to the Base Station (BS). A WSN is integrated with smart technologies to develop fast Internet of Things (IoT) communications among different applications. Recently, many researchers proposed their solutions to optimize IoT data transmissions in an energy efficient manner with cost effective support. However, most of the solutions have focused on the design and developm...
8 CitationsSource