A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the data. Therefore, efficient methods are needed to process the data. One solution to minimize traffic on large-scale wire...
Saved in:
Published in | Peer-to-peer networking and applications Vol. 14; no. 4; pp. 1917 - 1942 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.07.2021
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A wireless sensor network (WSN) consists of a set of sensor nodes that are widely scattered in inaccessible areas. When deployed in large areas, WSNs generate a large volume of the data. Therefore, efficient methods are needed to process the data. One solution to minimize traffic on large-scale wireless sensor networks is to use data aggregation schemes. In this paper, a secure data aggregation method is proposed. The proposed secure data aggregation scheme has three phases: intra-cluster data aggregation, inter-cluster data aggregation, and data transfer. In the intra-cluster data aggregation phase, a fuzzy scheduling system is designed to adjust the appropriate data transmission rates of the cluster member nodes. In the inter-cluster data aggregation phase, an aggregation tree is created between the cluster head nodes. The dragonfly algorithm (DA) is used to find the optimal aggregation tree between cluster head nodes. In the data transfer phase, the columnar transposition cipher method is used to establish a secure connection between cluster member nodes and their cluster head node. Also, a symmetric and lightweight encryption method based on the residue number system (RNS) is utilized to provide secure communications between the cluster head nodes. We modify RNS and call it RNS+. Finally, the simulation results of the proposed scheme are compared to three data aggregation methods including Sign-share, Sham-share, and RCDA. The results show that the proposed data aggregation scheme outperforms other data aggregation methods in terms of network lifetime, delay and packet delivery rate. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 1936-6442 1936-6450 |
DOI: | 10.1007/s12083-021-01116-3 |