You are on page 1of 4

ISSN: 2395-0560

International Research Journal of Innovative Engineering


www.irjie.com
Volume1, Issue 4 of April 2015

Energy Efficient Data Transmission Schemes in Wireless


Sensor Networks
Shilpy Ghai1, Prof. V.K.Katiyar2
1
M.M.Engineering College, Maharishi Markandeshwar University, Mullana, Haryana, India (Research Scholar)
M.M.Engineering College, Maharishi Markandeshwar University, Mullana, Haryana, India (Professor, CSE Department)

Abstract:
Efficient utilization of energy and security has been a core area of research in wireless sensor networks. Sensor nodes used
in a network are battery operated having low power capabilities. Batteries of these nodes cannot be recharged frequently in
the field setting, so energy optimization becomes paramount in increasing the battery-life and, consequently, the network
lifetime. To design a secure sensor network, that has low energy consumption, is a challenging issue. In this paper, we will
study about energy-efficient security protocols which provide strong security and decreases energy consumption.
Keywords: wireless sensor networks, sensor nodes, transmission, security, energy efficiency.

Introduction
A Wireless Sensor Network consists of a large number of sensors, each of which are physically small devices, and are
equipped with the capability of sensing the physical environment, data processing, and communicating wirelessly with
other sensors. Generally, we assume that each sensor in a wireless sensor network has certain constraints with respect to its
energy source, power, memory, and computational capabilities.
Wireless Sensor Networks (WSN) has emerged as one of the most exciting fields in Computer Science research over
decades. Processors with on-board sensors are said to be nearing the size of a dust. Applications of WSN include military
surveillance, habitat monitoring, structural monitoring and medical and health etc.
Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have
very low processing power and radio ranges, permit very low energy consumption and perform limited and specific
monitoring and sensing functions. Several such wireless sensors in a region self-organize and form a WSN. Information
based on sensed data can be used in agriculture and livestock, driving or even in providing security at home or in public
places. A key requirement from both the technological and commercial point of view is to provide adequate security
capabilities. Fulfilling privacy and security requirements in an appropriate architecture for WSNs offering pervasive
services is essential for user acceptance. Five key features need to be considered when developing WSN solutions:
scalability, security, reliability, self-healing and robustness. The security in wireless sensor networks (WSNs) is a critical
issue due to the inherent limitations of computational capacity and power usage. Security is broadly used term
encompassing the characteristics of authentication, integrity, privacy and non repudiation. The more the dependency on the
information provided by the networks has been increased, the more the risk of secure transmission of information over the
network has increased. For the secure transmission of various types of information over networks, several cryptographic,
steganographic and other techniques are used.

Review of literature
In this paper, author explores various security issues in wireless sensor networks and tries to give a comparative note of
various existing security approaches. Their contribution is therefore to provide a detailed yet concise analysis of various
existing techniques which will enable the WSN implementers to approach security in an organised way [1].
In this paper, therefore, it is proposed that a key establishment and a data encryption scheme for secure and energy-efficient
data transmission in WSNs be used. The key establishment scheme is an advanced hybrid key establishment scheme which
has not only the efficiency of using a unique secret key but also the security of using a random key of each pair nodes. The
data encryption scheme which is suitable for WSNs uses only exclusive-OR (XOR) operation, message authentication code
(MAC), and time-spacing key derivation function (TSDF) for efficiency and security [2]. This paper investigates the
coalition-based cooperative data transmission mechanism (CCDTM), analyzes its entire energy consumption, and finds out
the optimal number of sensor nodes needed in the cooperative data transmission. The condition under which CC-DTM is
more energy-saving than the cluster approach is also deduced. Furthermore, an energy-load balanced node selection
strategy is proposed. The results of simulation experiment show the validity of this energy efficient data transmission
mechanism.

__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved

Page -1

ISSN: 2395-0560

International Research Journal of Innovative Engineering


www.irjie.com
Volume1, Issue 4 of April 2015
In this paper, we analyze the entire energy consumption of coalition-based data transmission, including the part of date
aggregation and broadcasting, compare the result with cluster approach, and draw some conclusions. Furthermore, an
energy-load balanced node selection strategy is proposed [3].
This paper presents a password-based authenticated key agreement protocol that allows mutual authentication and secure
data transmission between sensor network and user. The protocol is well-suited in the resource-constrained sensor nodes,
secure and efficient compared to related security protocols in sensor networks. In this paper, the author designs a protocol
for WSN that provides mutual authentication and secures data transmission between communicating entities. The design of
protocol uses public key operations in such as way that the sensor node requires to compute only one public key operation
to establish an authenticated session key for securing data transmissions [4]. In this paper, an improved energy-efficient
security scheme is proposed for resource constrained sensor networks. The proposed scheme provides an improved security
mechanism to detect energy consuming and useless packets that enemy injects into sensor network. Also, in this paper we
present a simple wormhole detection for better security [5].
This paper mainly focus on minimizing end to end latency and energy efficiency as primary design objectives of routing
protocols for WSN without overshadowing the other design factors. We present a survey of low latency, energy efficient
and time critical routing protocols. TEEN (Threshold - sensitive Energy Efficient sensor Network protocol), a reactive
network protocol which is well suited for time critical data sensing applications is quite efficient in terms of energy
consumption and response time. APTEEN (Adaptive Periodic Threshold sensitive Energy Efficient sensor Network
protocol), a hybrid network protocol which gives the overall picture of the network at periodic intervals in a very energy
efficient manner. SPEED is a Stateless, highly efficient and scalable protocol for sensor networks which achieves end to
end soft real time communication by maintaining a desired delivery speed across the network through a novel combination
of feedback control and non deterministic geographic forwarding. RAP, a real -time communication architecture for large
scale sensor networks which significantly reduces the end to end latency by using Velocity Monotonic Scheduling
(VMS). RPAR, Real Time Power Aware Routing Protocol which supports energy efficient real - time communication by
dynamically adapting transmission power and routing decisions. We also discuss the advantages and performance issues of
each routing protocol [6].
This paper proposed an energy-aware mechanism to determine the most efficient set of packets to be processed according
with the resource consumed and the packets delivery requirements.
In this paper, the author propose a run-time mechanism to deal with the optimization of security while retaining the
possibility to guarantee packet delivery; this is performed by providing an efficient priority-based delivery of packets
towards a sink node, while optimizing packet security requirements subject to specific energy constraints. The solution
increases WSN nodes lifetime at the cost of security or network latency degradation. Different strategies are used to favour
either security or packet delivery. The strategy to be used and the way in which it will be applied depend on specific node
energy conditions [7].
In this paper, the author proposed a Distributed and Energy efficient algorithm for Collection of Raw data in sensor
networks called DECOR. DECOR exploits spatial correlation to reduce the communication energy in sensor networks with
highly correlated data. In this approach, at each neighbourhood, one sensor shares its raw data as a reference with the rest
of sensors without any suppression or compression. Other sensors use this reference data to compress their observations by
representing them in the forms of mutual differences. In a highly correlated network, transmission of reference data
consumes significantly more energy than transmission of compressed data. Thus, author first attempt to minimize the
number of reference transmissions. Then, they try to minimize the size of mutual differences. The paper derive analytical
lower bounds for both these phases and based on theoretical results, and propose a two step distributed data collection
algorithm which reduces the communication energy significantly compared to existing methods. In addition, we modify our
algorithm for lossy communication channels and evaluate its performance through simulation [8]. Based on homomorphic
encryption technology and the non-repudiation transmission protocol, a novel approach to protect sensor data secure is
proposed. Because of fully using symmetric encryption algorithm, the protocol is efficient. Security analysis shows that the
proposed protocol can guarantee data end-to-end confidentiality and authentication [9].
It is a practical challenge to provide reliable and efficient communication for data transmission in wireless sensor networks.
To recover from packet losses, conventional approaches tried to use retransmission or FEC mechanisms. However, these
mechanisms may introduce excessive energy overhead for reliability guarantee. By exploiting the wireless broadcast nature
and the node overhearing capability, we propose a novel cooperative communication scheme EECC to improve data
transmission performance for wireless sensor networks. In this scheme, cooperative reply is performed at each hop by the
best suited node elected from those that have successfully overheard the transmitted packet. EECC is not a routing protocol
but rather works as an augment to minimize the impact of packet losses on network performance.

__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved

Page -2

ISSN: 2395-0560

International Research Journal of Innovative Engineering


www.irjie.com
Volume1, Issue 4 of April 2015
Extensive analytical and experimental results confirm that our scheme is very effective in improving both energy
efficiency and end-to-end delay for data transmission in lossy networks [10]. Intrusion detection plays an important role in
the area of security in WSN. Detection of any type of intruder is essential in case of WSN. WSN consumes a lot of energy
to detect an intruder. Therefore, an algorithm for energy efficient external and internal intrusion detection is derived. This
paper also analyse the probability of detecting the intruder for heterogeneous WSN. This paper considers single sensing and
multi sensing intruder detection models [11]. This paper proposed a way to apply full encryption to image transmission
over WSNs by offloading the computational workload of sensors to a server. Based on the experimental results, the
proposed approach can ensure both the higher security level and the energy-efficiency at a sensor with acceptable image
quality [12].
This paper focused on the security issue of WSNs and proposed a protocol based on public key cryptography for external
agent authentication and session key establishment. The proposed protocol is efficient and secure in compared to other
public key based protocols in WSNs [13]. This paper analyzes security requirements in wireless sensor networks and
summarizes key issues, attacks and threats that should be solved for achieving the ad hoc security. We also present some
secure solutions for achieving the security in wireless sensor networks [14]. SPIN, Sensor Protocol for Information via
Negotiation, is one of the widely used efficient routing protocol in WSNs that completely ignores the security aspect. SPIN
overcome the performance deficiencies of conventional protocols by implementing data negotiation, nodes communicating
with each other about the data that they have send already and also the data they still need to obtain, and resource adaption,
that is, nodes monitor and adapting to changes in their own energy resources [15].
This paper mainly propose an alternate routing protocol which routes the data similar to SPIN, but with additional security
features. The energy performance characteristics, large number of nodes and percentage of malicious nodes are compared
with SPIN and MS-SPIN in NS2. This paper proposes a secure data transmission scheme based on digital watermarking
technique. The sensor node calculates the hash value of sensitive data, which collected at two different times. Then, the
sensitive data are embedded into the hash value as watermark information according to the digital watermark algorithm.
The target node extracts the watermark information from the hash sequence exactly. It calculates the hash value in the same
way as source nodes did, and compares to the remaining part of hash sequence which not changed during the extraction
operation to verify whether the data have been tampered with. Analysis shows that our scheme can effectively prevent the
data eavesdropping and verify whether the data to be tampered with during transmission process [16]. This paper proposed
Encompression (encryption + compression) as a strategy to achieve low-energy secure data transmission in sensor
networks. This proposal combines, compressive sensing (CS), a powerful and general approach for exploiting sparsity of
sensor data, with encryption and integrity checking of the compressively sensed data. This paper presents an evaluation of a
hardware implementation of encompression, wherein the CS, encryption, and integrity checking algorithms are realized
using a 65-nm CMOS technology. The results also demonstrate that the total sensor node energy consumption with
encompression may even be less than the case where neither cryptography nor compression is employed (for a compression
ratio of 10, this energy bonus can be upto 14%). These results suggest that the use of CS may be a game changer in
enabling state-of-the-art cryptography to be employed in highly energy-constrained sensor networks [17].
This paper proposed a novel scheme for efficiently and securely preserving source nodes location privacy. This scheme
uses efficient cryptographic operations to change the packets appearance at each hop to prevent packet correlation. It also
creates a cloud with irregular shape of fake traffic to enable the real source node to send its data anonymously to a fake
source node to send to the sink and to camouflage the real source node in the nodes creating the cloud. To reduce the
energy cost, clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud to
reduce the number of fake packets and boost privacy preservation. Simulation and analytical results demonstrate that this
scheme can provide stronger privacy preservation than routing-based schemes and requires much less energy cost than
global-adversary-based schemes [18].

Research methodology
To study existing protocols related to security and energy efficiency in Wireless Sensor Networks and propose some
mechanisms for data aggregation to reduce redundancy. We will study to design an energy efficient protocol that provides
scalable network support on Wireless Sensor Networks. As the energy efficient data transmission increases the lifetime of
each sensor node, we will propose a system which provides reliable and secure data transmission. In wireless sensor
network, the original message is splitted into packets and then transmitted in form of packets between nodes. For efficient
and secure transmission, we will use data compression with tag. In our approach, we first compress the data and then
transmit it to the other node. With the help of compression, the energy consumption of the nodes can be decreased because
less amount of data will be sent to another node.

__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved

Page -3

ISSN: 2395-0560

International Research Journal of Innovative Engineering


www.irjie.com
Volume1, Issue 4 of April 2015

Conclusion
Security of wireless sensor network is main issue in WSNs. Routing, QoS, Provisioning, energy efficiency, security and
multicasting are challenges in wireless sensor networks. We will study to design an energy efficient protocol that provides
scalable network support on Wireless Sensor Networks. This paper represents various security issues and energy efficient
data transmission so that the life time of each sensor node can be increased.

REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.

17.
18.

Kalpana Sharma. (2010). A Comparative Study of Various Security Approaches Used in Wireless Sensor
Networks. International Journal of Advanced Science and Technology, Vol. 17.
Sang-Eon Lee. (2008). Wireless Sensor Network Protocols for Secure and Energy-Efficient Data
Transmission. 7th Computer Information Systems and Industrial Management Applications.
Na Xia. (2008). Energy Efficient Data Transmission Mechanism in Wireless Sensor Networks. International
Symposium on Computer Science and Computational Technology.
Manik Lal Das (2008). Efficient User Authentication and Secure Data Transmission in Wireless Sensor
Networks. ICON.
Akbar Abbasi. (2009). Better Security for Wireless Sensor Networks, 2009 International Conference on Future
Networks.
D.Baghyalakshmi; J. Ebenezer; S.A.V. Satyamurty. (2010). Low Latency and Energy Efficient Routing
Protocols for Wireless Sensor Networks, ICWCSC.
A.V Taddeo; A. Ferrante. (2010). Security and Packets Delivery Trade-off for WSN. IEEE CCNC.
S.Sharafkandi; David H.C Du; Alireza Razavi. (2010). A Distributed and Energy Efficient Algorithm for Data
Collection in Sensor Networks. 39th International Conference on Parallel Processing Workshops, pp 571-580.
Z. Peng; YU Jian-ping. (2010). Secure Data Aggregation for Sensor Networks. ICSP, pp 1853-1856.
W. Fang et al. (2010). Energy-Efficient Cooperative Communication for Data Transmission in Wireless
Sensor Networks. IEEE Transactions on Consumer Electronics, Vol. 56, No. 4, November2010, pp 2185-2192.
Mohamed Mubarak T; et al. (2011). Intrusion detection: An Energy efficient approach in Heterogeneous
WSN. PROCEEDINGS OF ICETECT 2011, pp 1092-1096.
S. Lee; et al. (2011). Secure and Energy-Efficient Image Transmission for Wireless Sensor Networks, IEEE
Computer Society, pp 137-140.
V.C Sekhar; M. Sarvabhatla. (2012). Security in Wireless Sensor Networks with Public Key Techniques.
International Conference on Computer Communication and Informatics, Jan. 10 12, 2012.
Abhishek Jain; Kamal Kant; M. R. Tripathy. (2012). Security Solutions for Wireless Sensor Networks. Second
International Conference on Advanced Computing & Communication Technologies, pp430-433.
L Arivazhagan; R. Kurunjimalar.(2012).Secure Data Transmission Routing Protocol For Multicasting. IEEEInternational Conference on Advances In Engineering, Science And Management, 2012, pp 586-591.
L.Zhou; Z. Zhang. (2012). A Secure Data Transmission Scheme for Wireless Sensor Networks Based on
Digital Watermarking, 9th International Conference on Fuzzy Systems and Knowledge Discovery, pp 20972102.
M. Zhang; etal. (2013). Energy-efficient and Secure Sensor Data Transmission Using Encompression. 26th
International Conference on VLSI Design and the 12th International Conference on Embedded Systems, pp 31-36.
M. E Mahmoud; X. Shen. (2012). Secure and Efficient Source Location Privacy-Preserving Scheme for
Wireless Sensor Networks. IEEE ICC 2012 - Communication and Information Systems Security Symposium, pp
1123-1127.

__________________________________________________________________________________________
2015 ,IRJIE-All Rights Reserved

Page -4

You might also like