A Distributed Data Secure Transmission Scheme in W
A Distributed Data Secure Transmission Scheme in W
Abstract
Sensor nodes around monitoring area have various distances to the target node. Therefore, it is difficult to ensure secu-
rity of broadcasting data transferred from a single wireless sensor node to base station. Multi-hop transmission of data
between sensor nodes wastes network resource. In this case, a distributed data secure transmission scheme is proposed
in a wireless sensor network. Data transmission is classified into two stages: constructing a collection of receiving nodes
and selecting a unique forwarding node from this collection. These are implemented using analysis of relative movement
distance between nodes and transfer time competitive mechanism. Besides, we have assumed a network model for dis-
tributed data secure transmission to improve efficiency of data transfer. This design includes secure model of node com-
petition, data perception model, and anti-resistance model. Moreover, the security of competition transfer for nodes in
wireless sensor network is evaluated. Finally, simulation proves that the proposed scheme has good performance in
security and stability compared to similar schemes.
Keywords
Wireless sensor network, distributed data, distributed data secure transmission, data perception model, security
evaluation
Creative Commons CC-BY: This article is distributed under the terms of the Creative Commons Attribution 4.0 License
(http://www.creativecommons.org/licenses/by/4.0/) which permits any use, reproduction and distribution of the work without
further permission provided the original work is attributed as specified on the SAGE and Open Access pages (http://www.uk.sagepub.com/aboutus/
openaccess.htm).
2 International Journal of Distributed Sensor Networks
Recently, researchers conducted much work on sta- scheme has balanced transmission efficiency and over-
tic WSN because the mobility of nodes in mobile WSN head. The used theory is simple but effective. High
will change network topology, interrupt, or invalidate transmission efficiency is achieved. Blum et al.32 pro-
the routing path.25,26 So, many data transmission pro- posed an implicit geographic transfer protocol. The for-
tocols in WSN cannot be applied to MSN. warding area is limited within a sector of 60°. Waiting
Some clustering-based data transmission protocols time of sender node is set on basis of the distance
are proposed in MSN. The famous low-energy adaptive between receiver node and sink node and its remaining
clustering hierarchy (LEACH) protocol22 assumes energy. It has solved the problem of multi-cast inhibi-
nodes are static. When these nodes move, LEACH tion and considered energy.
loses lots of data. It proves the protocol is not suitable
for MSN. DS Kim and YJ Chung27 proposed low-
energy adaptive clustering hierarchy–mobile (LEACH- DDST protocol
M) protocol by improving LEACH to support mobile
nodes. In each transmission, an acknowledge message Network model
is sent to cluster head to confirm whether a mobile Data transmission protocol in MSN is studied in this
node can communicate with cluster head. Compared to article. The network model should satisfy four condi-
LEACH, LEACH-M obviously improves data trans- tions as follows:
mission success rate. However, LEACH-M selects clus-
ter head with random probability, which is the same (1) Assume that N sensor nodes with communica-
with LEACH. The mobility of cluster head is not con- tion radius R are randomly deployed in a mon-
sidered. If the cluster head moves out of its cluster itoring area Q, as shown in Figure 2. After
before cluster head rotation, the cluster will be broken, being deployed, these nodes can move with a
causing lots of packet loss. slow speed and each has a unique ID, namely,
Replication-based transmission protocol is that mul- 1, 2, ..., n. The ID of sink node is set as 0. Sink
tiple data copies will be transmitted to improve data node cannot move and other nodes are ran-
transmission success rate. Wang and Wu28 proposed a domly deployed with high density to ensure
message fault tolerance-based adaptive data delivery connectivity of this network.
scheme (FAD). The computation of data transmission (2) Each wireless sensor node can sense its remain-
rate is the same with that of replication-based efficient ing energy in real time. Initial energy of each
data delivery scheme (RED). Queue is managed using node could be different and not be added. This
fault tolerance value. When the queue is full and queue case is more close to real network.
message updates, some messages with the fault toler- (3) Each node in WSN carries a module-like global
ance value greater than the threshold value will be positioning system (GPS). So, the information
dropped. FAD is an improvement of RED, which has such as position, movement speed, and direc-
better data transmission rate. But the energy consump- tion could be sensed by itself.
tion is higher than that of RED. Li et al.29 proposed a (4) The time of all nodes in WSN is synchronized.
receiver-based cross-layer forwarding (RCF) protocol. Data are transmitted by cooperation to avoid
The protocol utilizes a self-adaptive mechanism for for- collision and save energy.
warding right contention. Also, it deals with the data
collision and multi-cast suppression better through the
dual-channel communication model and puts forward
an efficient routing void bypass mechanism. RCF has
good reliability, but dual-channel communication con-
sumes more energy. Lu and Li30 proposed a novel
probability distribution–based dynamic and predicted
(PDDP) data forward strategy. It utilizes mobility of
sensor nodes to create dynamic path which can achieve
a network delay close to optimum value, at the same
time, consume network resource efficiently. This strat-
egy has high robustness and practicality. The geo-
graphic information–based data transmission protocol
can be classified into two categories: sender-based pro-
tocol and receiver-based protocol. Wang and Wu31 pre-
sented an RED. It utilizes history data–based
forwarding method to compute transmission rate and
introduces erasure coding to improve efficiency. This Figure 2. Network model of DDST protocol.
4 International Journal of Distributed Sensor Networks
In this article, a DDST protocol is proposed in small yellow circle. Assume the node of ID 1 is the
WSN. DDST divides data transmission into two stages, sending node with original perception data. The com-
namely, constructing a collection of receiving nodes munication radius is R. The circle with the center of
and selecting a unique forwarding node from this col- node 1 and radius of R is called communication range.
lection. DDST uses relative movement analysis and Node 1 is used to send data. Nodes with ID 11, 12, 13,
competitive mechanism based on forwarding time. This and 14 exceed the communication radius of node 1,
protocol achieves effective, rapid, and precious data which cannot receive data. They can do nothing but
transmission. sleep. The nodes with ID of 6, 7, 8, 9, and 10 are within
The first stage is to construct a collection of receiv- the communication area. They can receive data from
ing nodes. A unique forwarding node is selected from node 1, but cannot be added to collection of candidates
this collection. This article has set two conditions for because they are far away from sink node and cannot
candidates. First, candidate node will not move out of satisfy the second condition. Nodes with ID 3, 5, 15,
the communication range in data transmission period. and 16 are within the communication area, which can
Second, candidate node should be set within the inter- receive data and satisfy the second condition. But the
section of communication area and the 60-degree-sec- first condition is not satisfied. So, these nodes cannot
tor-oriented sink node. The candidates should satisfy be candidates. Node 4 satisfies both conditions, which
both conditions. It reduces data receiving and the will be added in collection of candidates. But the for-
speed, which is energy saving. warding competitive time is long, so it cannot be
It is unnecessary for every node to receive data. selected as forwarding node. Only node 2 satisfies both
After constructing the collection of candidates, the sec- conditions and has shorter forwarding competitive
ond stage starts. This stage selects a unique forwarding time. It is selected as unique forwarding node.
node from the collection of candidates. The competitive DDST is described as follows. At the stage to collect
mechanism based on forwarding time is used in this receiving nodes, communication is unnecessary. When
stage. We introduce this mechanism as follows. After the source node wants to send data, other nodes will
receiving data, the mechanism will compute forwarding compute collection of candidates based on algorithm of
competitive time of each candidate, t = (k d T )4Er . receiving nodes. The candidates receive data packages
Here, the parameters Er , d, T , and k are, respectively, from source node. It achieves high data-reception rate
remaining energy, distance to sink node, communica- with lower energy consumption. As shown in Figure 3,
tion period, and regulation parameter. The parameter the sending node 1 broadcasts its location. Nodes with
k makes it satisfy 0\(k d)4Er \1. The node with the ID from 2 to 16 can receive the information, but nodes
minimum forwarding competitive time is selected as from 11 to 14 are out of communication area. The
data forwarding node. From the expression to compute nodes satisfying both conditions above are suitable for
t, more remaining energy and short distance to sink data transmission. From Figure 3, node 2 and node 4
node make t the minimum. receive data package.
After that, we use competitive mechanism in collec-
tion of receiving nodes to determine node time. First, a
Description of DDST protocol time interval t is set. Each candidate automatically per-
In DDST protocol, data transmission has six cases, as forms forwarding competitive mechanism to compute
shown in Figure 3. Wireless sensor node is denoted by the forwarding competitive time. The node with the
Liang et al. 5
The candidates should satisfy both conditions. For jOM j = d v1 T cos a v2 T cos b
condition 1, nodes which will not move out of commu- ð1Þ
= d (v1 cos a + v2 cos b) T
nication area during period of data sending can be
added to candidate collection. The nodes are mobile, so When b is between 90° and 270°
relative motion analysis between nodes is required to
judge whether it will move out of communication range jOM j = d v1 T cos a + v2 T cos b
during a period. It lays foundation for the second stage. ð2Þ
= d (v1 cos a v2 cos b) T
Only those nodes satisfying conditions can become
receiving nodes. Otherwise, nodes go to sleep.
In the direction vertical to connection of two nodes,
The communication period T of a node is short, and
the relative displacement is computed as follows.
node movement is regarded as uniform linear motion.
When b is between 0° and 180°
We focus on the motion of receiving node to analyze
the relative motion between nodes. The details are illu- jOEj = v1 T sin a + v2 T sin b
strated as follows. ð3Þ
The main parameters are set as follows. Assume that = (v1 sin a + v2 sin b) T
the movement speed of sending node is v1 and candi-
When b is between 180° and 360°
date moves with speed of v2 . The angle between motion
direction of sending node and receiving node is denoted
jOEj = v1 T sin a v2 T sin b
as a. The angle between motion direction of receiving ð4Þ
node and sending node is denoted as b. The communi- = ðv1 sin a v2 sin bÞ T
cation radius is R. d and t are distances from sending
node to candidate node and communication period, After time T, the distance d 0 between two nodes
respectively. could be computed through equations (1)–(4)
In Figure 4, node S is the sender and N is a neighbor- qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
ing candidate of S. After a period, we need to analyze d0 = jOEj2 + jOM j2 ð5Þ
whether N will move out of communication area of the
sender. After time T, S moves to E and N moves to M. By comparing d 0 to R, we can determine which node
Now, we compute d 0 , namely, the value of ||ME||. will be data receiving node. If d 0 \R, the first condition
d 0 \R demonstrates that N will not move out of com- to be forwarding node is satisfied. Otherwise, it cannot
munication area after time T. The first condition is sat- be the forwarding node. Candidate node should be set
isfied and it can be selected as data receiving node. within the intersection of communication area and the
6 International Journal of Distributed Sensor Networks
sending node, it will broadcast its information to candi- Table 1. Simulation parameters.
dates and change its role. Candidates receive this infor-
mation and compute the forwarding competitive time Parameters Values
to select a unique forwarding node. After that, the Network size (m2) 300 3 300
information will be further forwarded to sink node. Number of nodes 200
The proposed algorithm is described as follows. All Movement speed of nodes (m/s) 0.6
nodes are synchronized before starting the algorithm. Position of sink node (120,120)
First, sensor node senses data from neighboring nodes. Initial energy of nodes (J) 100
Communication radius (m) 20–80
On basis of received data and its own information, the Energy consumption in sending (J) 2 3 1023
node can judge whether it can be the receiving node. If Energy consumption in receiving (J) 1 3 1024
both conditions are satisfied, the node will enter the Packet size (bytes) 128
competition of forwarding node. Otherwise, the node Storage space (bytes) 2048
goes to sleep.
After that, random selection algorithm for forward-
ing node is performed. Based on the conditions of
being receiving node, the forwarding node is randomly
selected from receiving nodes. With the forwarding
competitive time, forwarding node is selected for data
forwarding. To address random data transmission, a
distributed data transmission scheme is designed in
WSN. This scheme uses multiple-path competition
optimization between sending node and receiving node.
Encoded data is transformed redundantly. After receiv-
ing enough redundant data, receiving node could
decode it to get original data. When decoding fails,
extra data transmission is necessary. This scheme could
save communication overhead and have good security.
Figure 8. The network lifetime under energy-constrained Figure 9. Comparison of transmission success ratio with
environment. various communication radii.
Funding
Figure 13. Relationship between probability for capturing data The author(s) disclosed receipt of the following financial sup-
and network size N. port for the research, authorship, and/or publication of this
article: This work was supported by the National Science
Foundation of China (grant no. 61572188), Hunan Provincial
better security because its path selection is controlled
Natural Science Foundation of China (grant no. 2016jj2058),
by original node and intermediate node.
Scientific Research Project of Hunan University of Science
and Technology (grant no. E51697), and Scientific Research
Fund of Hunan Provincial Education Department (grant no.
Conclusion 14A047).
This article targets at security in data transmission and
proposes a DDST approach. DDST divides data trans- References
mission into two stages, namely, constructing a collec- 1. Cui L, Ju HL, Miao Y, et al. Research on wireless sensor
tion of receiving nodes and selecting a unique network. J Comput Res Dev 2005; 42: 163–174.
forwarding node from this collection. DDST uses rela- 2. Xie K, Wang X, Wen JG, et al. Cooperative routing
tive movement analysis and competitive mechanism with relay assignment in multi-radio multihop wire-
based on forwarding time. This protocol achieves effec- less networks. IEEE/ACM T Networking 2016; 24:
tive, rapid, and precious data transmission. 859–872.
The main work is concluded as follows: (1) select 3. Mongiovi M, Singh AK, Yan X, et al. Efficient multi-
proper nodes as data receivers among all neighboring casting for delay tolerant networks using graph indexing.
nodes of the sender. The following two conditions are In: Proceedings of the 2012 international conference on
computer communications, 2012, pp.22–30. Santa Bar-
satisfied: candidate node will not move out the commu-
bara, CA: ACM Press, http://www-bcf.usc.edu/~kpsou-
nication range in data transmission period and candi-
nis/Papers/indexing.pdf
date node should be set within the intersection of 4. Zhang S, Cao J, Chen L, et al. Locating nodes in mobile
communication area and the 60-degree-sector-oriented sensor networks more accurately and faster. In: Proceed-
sink node. The candidates should satisfy both condi- ings of the 5th annual IEEE communications society con-
tions. (2) The competitive mechanism based on for- ference on sensor mesh and ad hoc communications and
warding time is used. After receiving data, the networks, San Francisco, CA, 16–20 June 2008, pp.37–
mechanism will compute forwarding competitive time 45. New York: IEEE.
itself with remaining energy Er and distance to sink 5. Zhang S, Cao J, Chen L, et al. Accurate and energy-
node. The candidate with the minimum competitive efficient range-free localization for mobile sensor net-
time will be selected to forward data. Other nodes will works. IEEE T Mobile Comput 2010; 9: 897–910.
6. Xing G and Wang T. Rendezvous planning in wireless
drop the received data.
sensor networks with mobile elements. IEEE T Mobile
At present, data transmission in network mainly
Comput 2008; 7: 1430–1443.
focuses on a single node. Data transmission among all 7. Li G, Shi W and Wang Y. Automatic ARIMA time
nodes has various energy, computation ability, storage, series modeling for data aggregation in wireless sensor
sensing areas, and communication distances. So, we networks. Int J Digital Content Tech Appl 2012; 6:
should simplify this issue to master the essence. The 438–447.
parameters of nodes in WSN are not always consistent 8. Feng Y, Gong H, Fan M, et al. A distance-aware replica
due to various factors. In this case, reasonable alloca- adaptive data gathering protocol for delay tolerant
tion and scheduling on work period of nodes should be mobile sensor networks. Sensors 2011; 11: 4104–4117.
Liang et al. 11
9. Lan F and Su W. A survey on sensor networks. IEEE 22. Heinzelma WR, Chandrakasan A and Balakrishnan H.
Commun Mag 2002; 40: 102–114. Energy-efficient communication protocol for wireless
10. Zhang S, Zeng Y, Chen L, et al. Performance evaluation microsensor networks. In: Proceedings of the 33rd Hawaii
of localization algorithms for mobile sensor networks. J international conference on system sciences, Maui, HI, 7
Software 2011; 22: 1597–1611. January 2000, p.223. New York: IEEE.
11. Guo LJ, Raheem A and Li YS. SMITE: a stochastic com- 23. Mohanty P and Kabat MR. Energy efficient reliable
pressive data collection protocol for mobile wireless sen- multi-path data transmission in WSN for healthcare
sor networks. In: Proceedings of the IEEE INFOCOM, application. Int J Wireless Inform Network 2016; 23:
Shanghai, China, 10–15 April 2011, pp.1611–1619. New 162–172.
York: IEEE. 24. Srouji MS, Bonny T and Henkel J. High-speed encoding/
12. Haneef M and Deng Z. Design challenges and compara- decoding technique for reliable data transmission in wire-
tive analysis of cluster based routing protocols used in less sensor networks. In: Proceedings of the 2014 11th
wireless sensor networks for improving network life time. annual IEEE international conference on sensing, commu-
Adv Inform Serv Sci 2012; 4: 450–459. nication, and networking, Singapore, 30 June–3 July 2014,
13. Zhang J and Li L. Maximum life-time broadcast authen- pp.1449–1454. New York: IEEE.
tication protocol for wireless sensor networks. Adv Inform 25. Marappan P and Rodrigues P. An energy efficient rout-
Serv Sci 2012; 4: 146–154. ing protocol for correlated data using CL-LEACH in
14. Katti S, Rahul H and Hu W. XORs in the air: practical WSN. Wirel Netw 2016; 22: 1415–1423.
wireless network coding. IEEE T Netw 2008; 16: 497–510. 26. Rani S, Malhotra J and Talwar R. Energy efficient chain
15. Wark T, Corke P, Sikka P, et al. Transforming agricul- based cooperative routing protocol for WSN. Appl Soft
ture through pervasive wireless sensor networks. IEEE Comput 2015; 35: 386–397.
Pervas Comput 2007; 6: 50–57. 27. Kim DS and Chung YJ. Self-organization routing
16. Li Z, Li M, Wang J, et al. Ubiquitous data collection for protocol supporting mobile node for wireless sensor net-
mobile users in wireless sensor networks. In: Proceedings work. In: Proceedings of the first international multi-
of the IEEE INFOCOM, Shanghai, China, 10–15 April symposiums on computer and computational sciences,
2011, pp.2246–2254. New York: IEEE. Hangzhou, China, 20–24 June 2006, pp.622–626. New
17. Wang Y, Wu H, Dang H, et al. Analytic, simulation, and York: IEEE.
empirical evaluation of delay/fault-tolerant mobile sensor 28. Wang Y and Wu H. DFT-MSN: the delay/fault tolerant
networks. IEEE T Wirel Commun 2007; 1: 3287–3296. mobile sensor network for pervasive information gather-
18. Maurice J, Chadi M and Fawaz F. Disruption-tolerant ing. IEEE T Mobile Comput 2007; 6: 1021–1034.
networking: a comprehensive survey on recent develop- 29. Li L, Jiang W, Sun L, et al. A receiver-based cross-layer
ments and persisting challenges. IEEE Commun Surv Tut forwarding protocol for mobile sensor networks. Chin J
2012; 14: 2–15. Comput Res Dev 2009; 46: 120–128.
19. Sha L and Gup T. An adaptive and efficient data delivery 30. Lu W and Li G. A prediction-based and low redundancy
scheme for DFT-MSNS (delay and disruption tolerant data forward strategy in mobile wireless sensor networks.
mobile sensor networks). In: Proceedings of the IEEE J Comput Res Dev 2011; 48: 125–130.
international conference on advances in engineering, science 31. Wang Y and Wu H. Replication-based efficient data
and management, Nagapattinam, India, 30–31 March delivery scheme (RED) for delay/fault tolerant mobile
2012, pp.99–104. New York: IEEE. sensor network (DFT-MSN). In: Proceedings of the 4th
20. Zhang K, Zeng J and Liu W. Data delivery scheme of annual IEEE international conference on pervasive comput-
DTMSN based on probability replication and its perfor-
ing and communications workshops, Pisa, 13–17 March
mance research. J Electron Inform Tech 2010; 32:
2006, pp.485–489. New York: IEEE.
677–681.
32. Blum B, He T, Son S, et al. A robust state-free communi-
21. Carlo C, Rosario F and Marco L. DTN bundle layer over
cation protocol for sensor networks. Charlottesville, VA:
TCP: retransmission algorithms in the presence of chan-
University of Virginia, 2003.
nel disruptions. J Commun 2010; 5: 106–116.