files/journal/2022-09-02_11-59-20-000000_418.png

Asian Journal of Information Technology

ISSN: Online 1993-5994
ISSN: Print 1682-3915
115
Views
1
Downloads

A Secure and Fault-Tolerant Routing Protocol Based on GDDA and HLUA

A. Gopi Saminathan and S. Karthik
Page: 208-216 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Data aggregation protocols are required in Wireless Sensor Networks (WSNs) to extend the network lifetime by reducing the energy consumption. The existing DAO-LEACH (Data Aggregation-Optimal LEACH) protocol for WSN is insecure and prone to false data injection. This is enhanced in terms of security and fault-tolerance based on Gracefully Degraded Data Aggregation (GDDA) to ensure the integrity of the aggregated data and Hybrid Layer User Authentication (HLUA) to ensure the confidentiality of the aggregated data. This data aggregation scheme rejects the false data from compromised and malfunctioning Sensor Nodes (SNs). HLUA consists of a combination of Secret Key Cryptography (SKC) Method such as MAC (Message Authentication Code) algorithm and Public Key Cryptography (PKC) Method such as Elliptic Curve Cryptography (ECC). MAC algorithm is used between the Cluster Heads (CHs) and SNs to fulfill lower power demand while ECC is applied for User Authentication (UA) between CHs and users. The enhanced DAO-LEACH protocol is resistant to security attacks such as replay attacks, node compromising attacks and impersonation attacks. It performs better in terms of energy consumption, number of alive nodes, End to End Delay (EED) and false data detection, compared to SCAR (Simple Cluster-based data Aggregation and Routing), ESPA (Energy-efficient Secure Path Algorithm), DKS-LEACH (Deterministic Key management based LEACH), SEDAN (Secure and Efficient Data Aggregation protocol for WSNs) and DAA (Data Aggregation and Authentication).


How to cite this article:

A. Gopi Saminathan and S. Karthik. A Secure and Fault-Tolerant Routing Protocol Based on GDDA and HLUA.
DOI: https://doi.org/10.36478/ajit.2013.208.216
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2013.208.216