{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T15:14:49Z","timestamp":1723216489224},"reference-count":46,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T00:00:00Z","timestamp":1459382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia","award":["IRG14-07B"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.<\/jats:p>","DOI":"10.3390\/s16040460","type":"journal-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T14:27:21Z","timestamp":1459434441000},"page":"460","source":"Crossref","is-referenced-by-count":15,"title":["Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8062-3301","authenticated-orcid":false,"given":"Kashif","family":"Saleem","sequence":"first","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 12372, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6498-1528","authenticated-orcid":false,"given":"Abdelouahid","family":"Derhab","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 12372, Saudi Arabia"}]},{"given":"Mehmet","family":"Orgun","sequence":"additional","affiliation":[{"name":"Intelligent Systems Group (ISG), Department of Computing, Macquarie University, Sydney, NSW 2109, Australia"},{"name":"Faculty of Information Technology, Macau University of Science and Technology, Avenida Wai Long, Macau 999078, China"}]},{"given":"Jalal","family":"Al-Muhtadi","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 12372, Saudi Arabia"},{"name":"College of Computer and Information Sciences (CCIS), King Saud University, Riyadh 12372, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 12372, Saudi Arabia"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, University of Beira Interior, Marqu\u00eas d\u2019\u00c1vila e Bolama, Covilh\u00e3 6201-001, Portugal"},{"name":"University of Fortaleza (UNIFOR), Fortaleza-CE 60115-170, Brazil"}]},{"given":"Mohammed","family":"Khalil","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 12372, Saudi Arabia"}]},{"given":"Adel","family":"Ali Ahmed","sequence":"additional","affiliation":[{"name":"Information Technology, FCITR, King Abdulaziz University, Rabigh 21911, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"key":"ref_1","unstructured":"Cerpa, A., Wong, J.L., Kuang, L., Potkonjak, M., and Estrin, D. (2005, January 25\u201327). Statistical model of lossy links in wireless sensor networks. Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, ACM\/IEEE IPSN, Los Angeles, CA, USA."},{"key":"ref_2","unstructured":"Saleem, K. (2011). Biological Inspired Self-Organized Secure Autonomous Routing Protocol for Wireless Sensor Networks. [Ph.D. Thesis, Universiti Teknologi Malaysia]."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A survey of intrusion detection systems in wireless sensor networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2495","DOI":"10.1002\/sec.354","article-title":"A survey of key distribution in wireless sensor networks","volume":"7","author":"Chen","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.jcss.2013.06.014","article-title":"Management and applications of trust in wireless sensor networks: A survey","volume":"80","author":"Han","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TNET.2009.2039492","article-title":"DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis","volume":"18","author":"Fadlullah","year":"2010","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","article-title":"ReTrust: Attack-resistant and lightweight trust management for medical sensor networks","volume":"16","author":"He","year":"2012","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.3390\/s110201383","article-title":"A study of IEEE 802.15.4 security framework for wireless body area networks","volume":"11","author":"Saleem","year":"2011","journal-title":"Sensors"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Silva, B.M., Rodrigues, J.J., Canelo, F., Lopes, I.C., and Zhou, L. (2013). A data encryption solution for mobile health apps in cooperation environments. J. Med. Internet Res., 15.","DOI":"10.2196\/jmir.2498"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TIFS.2013.2296437","article-title":"Toward incentivizing anti-spoofing deployment","volume":"9","author":"Liu","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","article-title":"Security in cloud computing: Opportunities and challenges","volume":"305","author":"Ali","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11227-013-1021-9","article-title":"Wireless sensor networks: A survey on recent developments and potential synergies","volume":"68","author":"Rawat","year":"2013","journal-title":"J. Supercomput."},{"key":"ref_13","unstructured":"Yang, X. (2007). Security in Distributed Grid, Mobile, and Pervasive Computing, CRC Press."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1016\/j.chb.2015.01.023","article-title":"Secure transfer of environmental data to enhance human decision accuracy","volume":"51","author":"Saleem","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","article-title":"Secure routing in wireless sensor networks: Attacks and countermeasures","volume":"1","author":"Karlof","year":"2003","journal-title":"Ad Hoc Netw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Pathan, A.K., Lee, H.W., and Hong, C.S. (2006, January 20\u201322). Security in wireless sensor networks: Issues and challenges. Proceedings of the 8th IEEE ICACT 2006, Phoenix Park, Korea.","DOI":"10.1109\/ICACT.2006.206151"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Misra, S., and Woungang, I. (2009). Guide to Wireless Ad Hoc Networks, Springer.","DOI":"10.1007\/978-1-84800-328-6"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khurram Khan, M., Li, X., and Wang, X. (2015). Geographic wormhole detection in wireless sensor networks. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0115324"},{"key":"ref_19","unstructured":"Junqi, Z., Shankaran, R., Orgun, M.A., Varadharajan, V., and Sattar, A. (2010, January 10\u201314). A trust management architecture for hierarchical wireless sensor networks. Proceedings of the 2010 IEEE 35th Conference on Local Computer Networks (LCN), Denver, CO, USA."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Eigen, M., and Schuster, P. (1979). The Hypercycle: A Principle of Natural Self Organization, Springer-Verlag.","DOI":"10.1007\/978-3-642-67247-7"},{"key":"ref_21","unstructured":"Yovitts, M.C., and Cameron, S. (1960). Self-Organizing Systems, Pergamon Press."},{"key":"ref_22","unstructured":"Dressler, F. (2006). Dagstuhl Seminar Proceedings, Organic Computing\u2014Controlled Emergence, Internationales Begegnungs\u2014Und Forschungszentrum fur Informatik (IBFI)."},{"key":"ref_23","first-page":"313","article-title":"Biological inspired secure autonomous routing mechanism for wireless sensor networks","volume":"5","author":"Saleem","year":"2011","journal-title":"Int. J. Intell. Inf. Database Syst."},{"key":"ref_24","unstructured":"Mastorakis, N.E., Demiralp, M., and Mladenov, V.M. (2011). Computers and Simulation in Modern Science, Included in ISI\/SCI Web of Science and Web of Knowledge, WSEAS Press."},{"key":"ref_25","unstructured":"Herrero, \u00c1., and Corchado, E. Computational Intelligence in Security for Information Systems, Springer."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1002\/sec.214","article-title":"Secure real-time routing protocol with load distribution in wireless sensor networks","volume":"4","author":"Ahmed","year":"2011","journal-title":"Secur. Commun. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Saleem, K., Khalil, M.S., Fisal, N., Ahmed, A.A., and Orgun, M.A. (2013, January 16\u201318). Efficient random key based encryption system for data packet confidentiality in WSNs. Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2013), Melbourne, Australia.","DOI":"10.1109\/TrustCom.2013.206"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Lim, C.H. (2008, January 17\u201320). LEAP++: A robust key establishment scheme for wireless sensor networks. Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China.","DOI":"10.1109\/ICDCS.Workshops.2008.93"},{"key":"ref_29","first-page":"1","article-title":"Energy-efficient secure path algorithm for wireless sensor networks","volume":"2012","author":"Assouma","year":"2012","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Wang, H., Sheng, B., Tan, C.C., and Li, Q. (2008, January 17\u201320). Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control. Proceedings of the 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.77"},{"key":"ref_31","first-page":"1","article-title":"Integrated protocols to ensure security services in wireless sensor networks","volume":"2013","author":"Faisal","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s12243-008-0042-5","article-title":"SERP: Secure energy-efficient routing protocol for densely deployed wireless sensor networks","volume":"63","author":"Pathan","year":"2008","journal-title":"Ann. Telecommun."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Guo, S., Lloret, J., Manzoni, P., and Ruehrup, S. (2014). Ad-Hoc, Mobile, and Wireless Networks, Springer International Publishing.","DOI":"10.1007\/978-3-319-07425-2"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"2232","DOI":"10.1109\/JSEN.2014.2308725","article-title":"Empirical studies of bio-inspired self-organized secure autonomous routing protocol","volume":"14","author":"Saleem","year":"2014","journal-title":"IEEE Sens. J."},{"key":"ref_35","first-page":"669","article-title":"Ant colony inspired self-optimized routing protocol based on cross layer architecture for wireless sensor networks","volume":"9","author":"Saleem","year":"2010","journal-title":"WSEAS Trans. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Saleem, K., and Fisal, N. (2012, January 12\u201314). Enhanced ant colony algorithm for self-optimized data assured routing in wireless sensor networks. Proceedings of the 2012 18th IEEE International Conference on Networks (ICON), Singapore, Singapore.","DOI":"10.1109\/ICON.2012.6506595"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Kumar, N., Chen, J., and Rodrigues, J.J.P.C. (2015). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Secur. Commun. Netw.","DOI":"10.1002\/sec.1230"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.3390\/s150102021","article-title":"Double cluster heads model for secure and accurate data fusion in wireless sensor networks","volume":"15","author":"Fu","year":"2015","journal-title":"Sensors"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"15952","DOI":"10.3390\/s150715952","article-title":"Secure data aggregation with fully homomorphic encryption in large-scale wireless sensor networks","volume":"15","author":"Li","year":"2015","journal-title":"Sensors"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"15127","DOI":"10.3390\/s150715127","article-title":"A secure routing protocol for wireless sensor networks considering secure data aggregation","volume":"15","author":"Rahayu","year":"2015","journal-title":"Sensors"},{"key":"ref_41","unstructured":"Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., and Royer, E.M.B. (2002, January 12\u201315). A secure routing protocol for Ad Hoc networks. Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France."},{"key":"ref_42","unstructured":"Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc.. [2nd ed.]."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Xiao, S., Gong, W., and Towsley, D. (2014). Dynamic Secrets in Communication Security, Springer.","DOI":"10.1007\/978-1-4614-7831-7"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.1016\/j.chb.2014.11.030","article-title":"Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user\u2019s connectivity experience","volume":"51","author":"Saleem","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Liu, S., Gavrylyako, O.V., and Bradford, P.G. (2004, January 2\u20133). Implementing the TEA algorithm on sensors. Proceedings of the 42nd Annual Southeast Regional Conference, Huntsville, AL, USA.","DOI":"10.1145\/986537.986553"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Dorigo, M. (2006). Ant Colony Optimization and Swarm Intelligence, Springer.","DOI":"10.1007\/11839088"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/4\/460\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T18:16:06Z","timestamp":1717524966000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/4\/460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,31]]},"references-count":46,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,4]]}},"alternative-id":["s16040460"],"URL":"https:\/\/doi.org\/10.3390\/s16040460","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,31]]}}}