Abstract
Sensor nodes around monitoring area have various distances to the target node. Therefore, it is difficult to ensure security of broadcasting data transferred from a single wireless sensor node to base station. Multi-hop transmission of data between sensor nodes wastes network resource. In this case, a distributed data secure transmission scheme is proposed in a wireless sensor network. Data transmission is classified into two stages: constructing a collection of receiving nodes and selecting a unique forwarding node from this collection. These are implemented using analysis of relative movement distance between nodes and transfer time competitive mechanism. Besides, we have assumed a network model for distributed data secure transmission to improve efficiency of data transfer. This design includes secure model of node competition, data perception model, and anti-resistance model. Moreover, the security of competition transfer for nodes in wireless sensor network is evaluated. Finally, simulation proves that the proposed scheme has good performance in security and stability compared to similar schemes.
Keywords
Introduction
Wireless sensor network (WSN) is widely applied in many fields, such as military battlefield, disaster rescue, environment monitoring, traffic management, trail report, and medical care.1–3 As shown in Figure 1, WSN consists of mobile sensor nodes and sink node. Sensor node is deployed on mobile entity for collecting necessary information. Sink node can be fixed or mobile for receiving information from sensor nodes and transmitting it to backbone network. Different with traditional network, this network has features such as rapid mobility of nodes, dynamical network topology, and requirement of high security and reliability.4–8

Structure of wireless sensor network.
Nodes in WSN have high energy consumption and low success rate of data transmission.15–17 We analyze previous data transmission protocol and propose a distributed data secure transmission (DDST) protocol in WSN. DDST divides data transmission into two stages, namely, constructing a collection of receiving nodes and selecting a unique forwarding node from this collection. DDST uses relative movement analysis and competitive mechanism based on forwarding time. This protocol has the following features: (1) receiver-based data transmission. Generally, sender-based data transmission needs to create global routing from source node to sink node. This global routing is not necessary in receiver-based data transmission. A proper candidate node is selected in neighboring nodes of sending node for receiving data. (2) Success rate of data transmission. This article has set two conditions. First, candidate node will not move out of the communication range in data transmission period. Second, candidate node should be set within the intersection of communication area and the 60-degree-sector-oriented sink node. The candidate should satisfy both conditions. (3) Competitive mechanism based on forwarding time. This mechanism is applied in selection of forwarding node. It forwards data instead of multiple nodes. In this case, the number of communication nodes and energy consumption are reduced. (4) Secure data forwarding protocol. The protocol weeds out candidate receiving nodes continuously, changing it from working state to dormant state to save energy. In addition, the forwarding time–based competitive mechanism selects the forwarding node with the most energy. The simulation proves DDST can effectively prolong network lifetime and achieve better data transmission rate.
This article is organized as follows. The second part gives an overview of related work. The DDST protocol is introduced in the third section. After that, the implementation of DDST is concretely illustrated. The fifth section analyzes and compares the experimental results. Finally, this work is concluded.
Related work
WSN is designed to sense and acquire information in objective physical world.18–21 Data transmission protocol is the foundation of various applications in mobile sensor network (MSN) and should be considered in network construction. To design a data transmission protocol, one should consider not only energy consumption of each node but also network lifetime.
Mobile WSN has different application fields, which requires various transmission protocols. On this basis, data transmission protocol in WSN can be classified into four categories, namely, transmission protocols based on replication, clustering, quality of service, and geographic information. Geographic information–based data transmission protocol is widely used. Node position has large impact on data transmission.22–24 In network service, the sensing data of nodes is meaningful only after the geographic information is obtained.
Recently, researchers conducted much work on static WSN because the mobility of nodes in mobile WSN will change network topology, interrupt, or invalidate the routing path.25,26 So, many data transmission protocols in WSN cannot be applied to MSN.
Some clustering-based data transmission protocols are proposed in MSN. The famous low-energy adaptive clustering hierarchy (LEACH) protocol 22 assumes nodes are static. When these nodes move, LEACH loses lots of data. It proves the protocol is not suitable for MSN. DS Kim and YJ Chung 27 proposed low-energy adaptive clustering hierarchy–mobile (LEACH-M) protocol by improving LEACH to support mobile nodes. In each transmission, an acknowledge message is sent to cluster head to confirm whether a mobile node can communicate with cluster head. Compared to LEACH, LEACH-M obviously improves data transmission success rate. However, LEACH-M selects cluster head with random probability, which is the same with LEACH. The mobility of cluster head is not considered. If the cluster head moves out of its cluster before cluster head rotation, the cluster will be broken, causing lots of packet loss.
Replication-based transmission protocol is that multiple data copies will be transmitted to improve data transmission success rate. Wang and Wu 28 proposed a message fault tolerance-based adaptive data delivery scheme (FAD). The computation of data transmission rate is the same with that of replication-based efficient data delivery scheme (RED). Queue is managed using fault tolerance value. When the queue is full and queue message updates, some messages with the fault tolerance value greater than the threshold value will be dropped. FAD is an improvement of RED, which has better data transmission rate. But the energy consumption is higher than that of RED. Li et al. 29 proposed a receiver-based cross-layer forwarding (RCF) protocol. The protocol utilizes a self-adaptive mechanism for forwarding right contention. Also, it deals with the data collision and multi-cast suppression better through the dual-channel communication model and puts forward an efficient routing void bypass mechanism. RCF has good reliability, but dual-channel communication consumes more energy. Lu and Li 30 proposed a novel probability distribution–based dynamic and predicted (PDDP) data forward strategy. It utilizes mobility of sensor nodes to create dynamic path which can achieve a network delay close to optimum value, at the same time, consume network resource efficiently. This strategy has high robustness and practicality. The geographic information–based data transmission protocol can be classified into two categories: sender-based protocol and receiver-based protocol. Wang and Wu 31 presented an RED. It utilizes history data–based forwarding method to compute transmission rate and introduces erasure coding to improve efficiency. This scheme has balanced transmission efficiency and overhead. The used theory is simple but effective. High transmission efficiency is achieved. Blum et al. 32 proposed an implicit geographic transfer protocol. The forwarding area is limited within a sector of 60°. Waiting time of sender node is set on basis of the distance between receiver node and sink node and its remaining energy. It has solved the problem of multi-cast inhibition and considered energy.
DDST protocol
Network model
Data transmission protocol in MSN is studied in this article. The network model should satisfy four conditions as follows:
Assume that
Each wireless sensor node can sense its remaining energy in real time. Initial energy of each node could be different and not be added. This case is more close to real network.
Each node in WSN carries a module-like global positioning system (GPS). So, the information such as position, movement speed, and direction could be sensed by itself.
The time of all nodes in WSN is synchronized. Data are transmitted by cooperation to avoid collision and save energy.

Network model of DDST protocol.
DDST protocol analysis
This section gives some important definitions before analyzing DDST protocol:
In this article, a DDST protocol is proposed in WSN. DDST divides data transmission into two stages, namely, constructing a collection of receiving nodes and selecting a unique forwarding node from this collection. DDST uses relative movement analysis and competitive mechanism based on forwarding time. This protocol achieves effective, rapid, and precious data transmission.
The first stage is to construct a collection of receiving nodes. A unique forwarding node is selected from this collection. This article has set two conditions for candidates. First, candidate node will not move out of the communication range in data transmission period. Second, candidate node should be set within the intersection of communication area and the 60-degree-sector-oriented sink node. The candidates should satisfy both conditions. It reduces data receiving and the speed, which is energy saving.
It is unnecessary for every node to receive data. After constructing the collection of candidates, the second stage starts. This stage selects a unique forwarding node from the collection of candidates. The competitive mechanism based on forwarding time is used in this stage. We introduce this mechanism as follows. After receiving data, the mechanism will compute forwarding competitive time of each candidate,
Description of DDST protocol
In DDST protocol, data transmission has six cases, as shown in Figure 3. Wireless sensor node is denoted by small yellow circle. Assume the node of ID 1 is the sending node with original perception data. The communication radius is

Role classification of DDST protocol.
DDST is described as follows. At the stage to collect receiving nodes, communication is unnecessary. When the source node wants to send data, other nodes will compute collection of candidates based on algorithm of receiving nodes. The candidates receive data packages from source node. It achieves high data-reception rate with lower energy consumption. As shown in Figure 3, the sending node 1 broadcasts its location. Nodes with ID from 2 to 16 can receive the information, but nodes from 11 to 14 are out of communication area. The nodes satisfying both conditions above are suitable for data transmission. From Figure 3, node 2 and node 4 receive data package.
After that, we use competitive mechanism in collection of receiving nodes to determine node time. First, a time interval
Construction of candidates nodes
The main task of first stage is to select candidates from neighboring nodes of sending node. The neighboring nodes analyze their information and determine whether they satisfy the following two conditions:
The candidates should satisfy both conditions. For condition 1, nodes which will not move out of communication area during period of data sending can be added to candidate collection. The nodes are mobile, so relative motion analysis between nodes is required to judge whether it will move out of communication range during a period. It lays foundation for the second stage. Only those nodes satisfying conditions can become receiving nodes. Otherwise, nodes go to sleep.
The communication period
The main parameters are set as follows. Assume that the movement speed of sending node is
In Figure 4, node S is the sender and N is a neighboring candidate of S. After a period, we need to analyze whether N will move out of communication area of the sender. After time

Model of relative motion between the nodes.
As shown in Figure 4, in the direction parallel to connection of two nodes, relative displacement ||OM|| could be computed when the value of
When
When
In the direction vertical to connection of two nodes, the relative displacement is computed as follows.
When
When
After time
By comparing

Position relationship between candidate nodes and sink node.
In Figure 5, S is sending node,
Selection a unique forwarding node from candidate nodes
In this section, the forwarding node will be selected from the candidates using competitive mechanism, namely, forwarding-based competitive mechanism. After receiving nodes receive data, the competition for data forwarding starts. Senor nodes could be aware of its information. So, it can compute the forwarding competitive time. After that, each receiving node detects the busy signal. If there is no busy signal when its forwarding competitive time comes, the node will send a data package to sending node and tell that it can forward data. When the sending node receives package, inhibition package is generated to stop sending other request packages. If busy signal is detected, the received data will be dropped. As known, the receiving node with the minimum forwarding competitive time has superiority of information interaction with sending node. It successfully becomes the node to forward data.
Two parameters are required to compute forwarding competitive time: remaining energy
The consideration of energy and distance to sink node is to balance energy consumption and reduce hops of data forwarding. From equation (6), the forwarding competitive time is inversely proportional to the distance to sink node and is proportional to remaining energy. The node with more remaining energy and short distance to sink node has more chance to be the unique forwarding node.
The competition procedure for receiving node to be forwarding node is described as follows. Each receiving node can compute its forwarding competitive time. Before the competitive time, receiving node first detects busy signal. If busy signal is not detected, receiving node will send a request frame. The sending node receives request frame and sends a busy signal to stop other receiving nodes sending request frames. In this case, only a receiving node can be the node to forward data, and other nodes will drop received data.
Implementation of DDST scheme
The DDST protocol includes two critical code segments: receiving node–based protocol and forwarding competitive mechanism–based protocol. The main flow of protocol design is shown in Figure 6. Nodes in network are initialized. When the communication period comes and communication channel is idle, the first thing is to judge the role of node. If the node is a sending node, it will broadcast its information to candidates and change its role. Candidates receive this information and compute the forwarding competitive time to select a unique forwarding node. After that, the information will be further forwarded to sink node.

Algorithm flowchart of DDST programming.
The proposed algorithm is described as follows. All nodes are synchronized before starting the algorithm. First, sensor node senses data from neighboring nodes. On basis of received data and its own information, the node can judge whether it can be the receiving node. If both conditions are satisfied, the node will enter the competition of forwarding node. Otherwise, the node goes to sleep.
After that, random selection algorithm for forwarding node is performed. Based on the conditions of being receiving node, the forwarding node is randomly selected from receiving nodes. With the forwarding competitive time, forwarding node is selected for data forwarding. To address random data transmission, a distributed data transmission scheme is designed in WSN. This scheme uses multiple-path competition optimization between sending node and receiving node. Encoded data is transformed redundantly. After receiving enough redundant data, receiving node could decode it to get original data. When decoding fails, extra data transmission is necessary. This scheme could save communication overhead and have good security.
Experimental analysis and comparison
Simulation parameters
In this section, simulation experiment is conducted to verify performance of DDST. Additionally, we analyze node number within sensing area and the effect of various constraint values on data transmission. The experiment platform is implemented by C++ language. Network simulator (NS2) is used to quantify performance in real environment. The nodes are randomly distributed in the target area. Here, the following parameters are considered: network size is set as 300 × 300 m2. The number of nodes in experiment network is 200. On basis of network model, sensor nodes slowly move at a constant speed. In simulation, we set the speed of nodes to be 0.6 m/s. Sink node is fixed at position (120,120). Initial energy of each sensor node is 100 J. The communication radius ranges from 20 to 80 m. One time of data sending and data receiving consumes energy 2 × 100−3 and 1 × 10−4 J, respectively. The size of data package is 128 bytes. Each node can store 2048 bytes of data. All the parameters are set as shown in Table 1.
Simulation parameters.
Comparison of network lifetime
Network lifetime is a critical indicator to evaluate performance of data transmission protocol in MSN. It can be described by the relationship between surviving nodes and running rounds of network.
Figure 7 compares network lifetime for three data transmission schemes, namely, RCF, FAD, and DDST. We simulate and analyze energy consumption of three schemes to evaluate network lifetime. In Figure 7, the number of nodes is set as 100. We conducted 850 rounds of experiments. The results show that DDST obviously improves surviving time of nodes by comparing to RCF and FAD. Although the time of first dead node in DDST is earlier than that of RCF, the node dies with a slow speed rate. Finally, the lifetime of DDST is longer than that of FAD and RCF. Because DDST uses data transmission based on receiving node, it is unnecessary to create global routing. Candidates are selected from neighboring nodes of sending node to receive data. In addition, a competitive mechanism based on forwarding time is proposed to select a unique forwarding node. The forwarding node transmits data instead of multiple nodes. It reduces energy consumption. So, DDST is an energy-efficient protocol. In design of this protocol, it weeds out the candidate receiving nodes continuously, changing it from working state to dormant state to save energy. In addition, the forwarding time–based competitive mechanism makes the forwarding node be that of more energy. In this case, network lifetime is prolonged.

Analysis of the nodes life cycle.
From Figure 8, all data transmission algorithms (RCF, FAD, and DDST) have the same rate to generate message. Some algorithms consume energy rapidly, so less data is transmitted. By comparing to above simulation results, DDST can obviously prolong network lifetime and have better performance of data transmission under energy constrained environment.

The network lifetime under energy-constrained environment.
Under the same WSN environment, different transmission methods lead to different network lifetimes. As shown in Figure 8, under energy-constrained environment, DDST has long network lifetime and better security compared to other transmission methods because DDST is a dynamic distributed data transmission with less energy consumption. Compared to other methods, it consumes less energy and time in data transmission and prolongs network lifetime.
Comparison of data transmission performance
The authors compare the DDST scheme with several classic routing algorithms (RCF and FAD) in terms of routing performance and energy efficiency. We mainly consider three indicators including transmission success ratio, delivery cost, and delivery delay. Transmission success ratio is the ratio of the number of successful transmitted messages from source node to target node to the number of totally generated messages. Delivery cost is the energy consumption during data transmission. Delivery delay is the time interval of the message generated from source node and sent to target node.
First, we simulate RCF, FAD, and DDST with different communication radii and compare data transmission success rates. The experiment results are shown in Figure 9. Communication radius ranges from 10 to 60 m. Obviously, when communication radius ranges from 10 to 30 m, the hops from a node to sink node are increasing in three algorithms. DDST has set two conditions in selection of candidates. Candidates should satisfy both conditions, which makes the hops of DDST to sink node be less than that of other two methods. With the increase in communication radius, the superiority of DDST is not obvious.

Comparison of transmission success ratio with various communication radii.
We also compare the transmission performance with various number of sensor nodes. The simulation and comparison are illustrated as follows. Figure 10 shows transmission success ratio with different number of sensor nodes. With the increase in sensor nodes, DDST has superiority on data transmission success ratio compared with other schemes because DDST utilizes analysis of relative movement distance between nodes and transfer time competitive mechanism.

Comparison of transmission success ratio with various sensor nodes.
The performance on delivery cost and delivery delay is shown in Figures 11 and 12, which are better than other schemes. As shown in Figure 11, we assume the energy is unlimited. Under the same condition, the proposed DDST protocol has the minimum cost compared to other algorithms. Without the limitation of resource, it is unnecessary to reduce overhead at the cost of transmission success ratio or delay time. RCF and FAD have high energy consumption and delivery delay. The use of secure model of node competition reduces frequency of using sensor nodes. So, the delivery cost and delivery delay of DDST are the minimum. The comparison of three indicators proves the transmission performance of DDST is encouraging.

Comparison chart of transmission strategy on delivery cost.

Comparison chart of transmission strategy on delivery delay.
Network security analysis
Attackers aim to acquire unauthorized accessed data, who are probably external intruders or network users. Due to the lack of security in data transmission, nodes in WSN are vulnerable to various illegal attacks by deploying or capturing nodes. We assume illegally deployed sensor nodes pretend to be normal network nodes. These nodes could steal confidential data or perform false data injection attack. Besides, it is able for attackers to capture many nodes in network. These nodes can be utilized for sending plenty of false data to consume network resource rapidly, such as energy, bandwidth, computation ability, and storage. If the transmitted data is attacked, we need to perform security analysis on attacks like forging, signature tampering, and collusion.
This article presents a distributed data transmission approach to address above issues. Each transmission of data package will generate a new path. Attackers can capture various data packages only by capturing or eavesdropping all possible routing paths. The multiple paths are generated by all participated nodes. By capturing a part of nodes will not change the result. So, it satisfies both the high efficiency and controllability.
We conduct data capturing experiments on three schemes (RCF, FAD, and DDST) to verify the relationship between probability of capturing data and network size

Relationship between probability for capturing data and network size
Conclusion
This article targets at security in data transmission and proposes a DDST approach. DDST divides data transmission into two stages, namely, constructing a collection of receiving nodes and selecting a unique forwarding node from this collection. DDST uses relative movement analysis and competitive mechanism based on forwarding time. This protocol achieves effective, rapid, and precious data transmission.
The main work is concluded as follows: (1) select proper nodes as data receivers among all neighboring nodes of the sender. The following two conditions are satisfied: candidate node will not move out the communication range in data transmission period and candidate node should be set within the intersection of communication area and the 60-degree-sector-oriented sink node. The candidates should satisfy both conditions. (2) The competitive mechanism based on forwarding time is used. After receiving data, the mechanism will compute forwarding competitive time itself with remaining energy
At present, data transmission in network mainly focuses on a single node. Data transmission among all nodes has various energy, computation ability, storage, sensing areas, and communication distances. So, we should simplify this issue to master the essence. The parameters of nodes in WSN are not always consistent due to various factors. In this case, reasonable allocation and scheduling on work period of nodes should be considered in secure data transmission. It reduces network energy consumption and prolongs network lifetime. The nodes in WSN have complex features, causing great difficulty in research. Compared to other wireless networks, the study is still in its infancy. So, research on secure data transmission in WSN will be a big challenge in future works.
Footnotes
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Science Foundation of China (grant no. 61572188), Hunan Provincial Natural Science Foundation of China (grant no. 2016jj2058), Scientific Research Project of Hunan University of Science and Technology (grant no. E51697), and Scientific Research Fund of Hunan Provincial Education Department (grant no. 14A047).
