Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic


eISSN: 1178-5608



VOLUME 8 , ISSUE 3 (September 2015) > List of articles


M. Roseline Juliana * / S. Srinivasan *

Keywords : Data gathering, Key exchange, Key generation, Malicious nodes, Network lifetime, Residual energy, Sensor nodes, and Wireless Sensor Networks (WSNs)

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 8, Issue 3, Pages 1,748-1,767, DOI:

License : (CC BY-NC-ND 4.0)

Received Date : 12-April-2015 / Accepted: 10-August-2015 / Published Online: 01-September-2015



Recent trends in wireless sensor networks leads to the development of new protocols for data gathering. In this paper, a secure energy efficient location aware data gathering approach is introduced to secure data gathering. An Elliptic Curve Diffie Hellman Key Exchange (ECDHKE) algorithm is utilized for key generation and key exchange between the sensor nodes to maintain security and prevent the data from malicious nodes. The performance of the proposed scheme is validated in terms of packet drop, throughput, energy consumption, residual energy and network lifetime. The proposed scheme achieves better performance than the existing EEHA and SMART schemes.

Content not available PDF Share



[1] S. Yoo, S.-h. Kang, and J. Kim, "SERA: a secure energy reliability aware data gathering for sensor networks," Multimedia Tools and Applications, pp. 1-30, 2011/01/29 2011.
[2] Y. M. Zhou and L. Y. Li, "A Trust-Aware and Location-Based Secure Routing Protocol for WSN," Applied Mechanics and Materials, vol. 373, pp. 1931-1934, 2013.
[3] E. Ahvar, A. Pourmoslemi, and M. J. Piran, "Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks," arXiv preprint arXiv:1108.2777, 2011.
[4] J. Bahi, C. Guyeux, and A. Makhoul, "Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach," in Ad Hoc Networks. vol. 49, J. Zheng, D. Simplot-Ryl, and V. M. Leung, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 344-358.
[5] A. T. Boloorchi and M. H. Samadzadeh, "Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach," The Journal of Supercomputing, vol. 65, pp. 961-977, 2013/08/01 2013.
[6] W. Jin, C. Jinsung, L. Sungyoung, C. Kwang-Cheng, and L. Young-Koo, "Hop-based energy aware routing algorithm for wireless sensor networks," IEICE transactions on communications, vol. 93, pp. 305-316, 2010.
[7] V. Kumar and S. Madria, "Secure Data Aggregation in Wireless Sensor Networks," in Wireless Sensor Network Technologies for the Information Explosion Era. vol. 278, T. Hara, V. Zadorozhny, and E. Buchmann, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 77-107.
[8] C. Ranhotigamage and S. C. Mukhopadhyay, “Field Trials and Performance Monitoring of Distributed Solar Panels Using a Low Cost Wireless Sensors Network for Domestic Applications”, IEEE Sensors Journal, Vol. 11, No. 10, October 2011, pp. 2583-2590.
[9] B. Kumari, N. Vikram, and M. M. Reddy, "Secure Data Collection in Wireless Sensor Networks Using Random Routing Algorithms," International Journal of Computer Science and Telecommunications, vol. 2, pp. 50-55, 2011.
[10] H. Li, K. Li, W. Qu, and I. Stojmenovic, "Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks," in Algorithms and Architectures for Parallel Processing. vol. 7016, Y. Xiang, A. Cuzzocrea, M. Hobbs, and W. Zhou, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 2-13.
[11] W. Lu, Y. Liu, and D. Wang, "A Distributed Secure Data Collection Scheme via Chaotic Compressed Sensing in Wireless Sensor Networks," Circuits, Systems, and Signal Processing, vol. 32, pp. 1363-1387, 2013/06/01 2013.
[12] P. Samundiswary, M. P. Kumar, and P. Dananjayan, "Trust Based Energy Aware Greedy Perimeter Stateless Routing for Wireless Sensor Networks," Journal of Communication and Computer, vol. 8, pp. 848-854, 2011.
[13] T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, "A novel trust-aware geographical routing scheme for wireless sensor networks," Wireless personal communications, vol. 69, pp. 805-826, 2013.
[14] H.-C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, "Combining trust with location information for routing in wireless sensor networks," Wireless Communications and Mobile Computing, vol. 12, pp. 1091-1103, 2012.
[15] G. Zhan, W. Shi, and J. Deng, "Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs," Dependable and Secure Computing, IEEE Transactions on, vol. 9, pp. 184-197, 2012.
[16] G. V. Crosby, L. Hester, and N. Pissinou, "Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks," IJ Network Security, vol. 12, pp. 107-117, 2011.
[17] R. Feng, X. Xu, X. Zhou, and J. Wan, "A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory," Sensors, vol. 11, pp. 1345-1360, 2011.
[18] H. Zhao, Y. Li, M. Zhang, R. Zheng, and Q. Wu, "A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks," International Journal of Computer Science Issues (IJCSI), vol. 10, 2013.
[19] J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, "TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks," International Journal of Distributed Sensor Networks, vol. 2014, 2014.
[20] Y. Mao, "A secure mechanism for data collection in wireless sensor networks," Applied Mathematics & Information Sciences, vol. 5, pp. 97-103, 2011.
[21] S.-I. Huang, S. Shieh, and J. Tygar, "Secure encrypted-data aggregation for wireless sensor networks," Wireless Networks, vol. 16, pp. 915-927, 2010.
[22] L. A. Villas, A. Boukerche, H. A. De Oliveira, R. B. De Araujo, and A. A. Loureiro, "A spatial correlation aware algorithm to perform efficient data collection in wireless sensor networks," Ad Hoc Networks, vol. 12, pp. 69-85, 2014.
[23] S. Xiao, B. Li, and X. Yuan, "Maximizing precision for energy-efficient data aggregation in wireless sensor networks with lossy links," Ad Hoc Networks, vol. 26, pp. 103-113, 2015.
[24] K. Yi, J. Wan, L. Yao, and T. Bao, "Partial Matrix Completion Algorithm for Efficient Data Gathering in Wireless Sensor Networks," IEEE Communications Letters,, vol. 19, pp. 54-57, 2015.
[25] M. Naznin and A. S. Chowdhury, "ZDG: Energy efficient zone based data gathering in a wireless sensor network," in International Conference on Networking Systems and Security (NSysS), 2015, pp. 1-7.
[26] B. Wu, Y. Feng, and H. Zheng, "POSTERIOR BELIEF CLUSTERING ALGORITHM FOR ENERGY-EFFICIENT TRACKING IN WIRELESS SENSOR NETWORKS," International Journal on Smart Sensing and Intelligent Systems, vol. 7, pp. 925-941, 2014.
[27] X. Zhao, J. Minz, and S. K. Lim, "Low-power and reliable clock network design for through-silicon via (TSV) based 3D ICs," IEEE Transactions on Components, Packaging and Manufacturing Technology, vol. 1, pp. 247-259, 2011.
[28] H. Wenbo, L. Xue, N. Hoang, K. Nahrstedt, and T. Abdelzaher, "PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks," in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2007, pp. 2045-2053.