4.5 Article

Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

Journal

PEER-TO-PEER NETWORKING AND APPLICATIONS
Volume 14, Issue 2, Pages 821-836

Publisher

SPRINGER
DOI: 10.1007/s12083-020-01038-6

Keywords

Internet of things (IoT); Wireless sensor network (WSN); Gateway; Cluster head (CH); Cryptography; Data security; Routing protocol

Ask authors/readers for more resources

Wireless Sensor Networks (WSN) are deployed in various applications connected to Internet of Things (IoT). In this paper, a cryptographic based clustering structure called OP-MDCRP is proposed for improving data privacy and energy efficient routing. Experimental comparison shows that OP-MDCRP approach provides more data security than existing methods.
Wireless Sensor Networks (WSN) are naturally resource-constrained and have been deployed in various applications such as home monitoring, health care monitoring and military systems. These applications are connected to numerous devices capable of interacting with each other over the internet called as Internet of Things (IoT). WSN application plays a main part in the IoT environment. In WSN, sensors are randomly positioned in harsh surroundings where the communication network is facing privacy issues which is the most critical for data transmission. In this paper, we proposed a cryptographic based clustering structure for preserving data privacy using Optimal Privacy-Multihop Dynamic Clustering Routing Protocol (OP-MDCRP) that improves data privacy and energy efficient routing for the heterogeneous network which uses both clustering and multi-hop communication to reduce the energy consumption of sensor node and increases the lifetime of WSN. Based on the area, the source nodes are grouped to form a cluster in the random network. This scheme also provides high data privacy using Elliptic Curve Integrated Encryption-Key Provisioning Method (ECIES-KPM) along with small key size. Besides, data security based attacks are restricted by ECIES-KPM verification process. In this way, the sensitive data is confidentiality secured with low computational overhead. Experimental comparison shows that the evaluation of OP-MDCRP approach provides more data security than existing methods in terms of computational time, packet delivery ratio, energy consumption, average delay, network overhead and network lifetime.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available