A dual-mode energy efficient encryption protocol for wireless sensor networks

被引:3
作者
Moh'd, Abidalrahman [1 ]
Aslam, Nauman [2 ]
Phillips, William [1 ]
Robertson, William [1 ]
机构
[1] Dalhousie Univ, Dept Engn Math & Internetworking, Halifax, NS B3J 2X4, Canada
[2] Northumbria Univ, Fac Engn & Environm, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
关键词
Energy efficiency; Security; Encryption protocols; Wireless sensor networks;
D O I
10.1016/j.adhoc.2013.07.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel link-layer encryption protocol for wireless sensor networks. The protocol design aims to reduce energy consumption by reducing security related communication overhead. This is done by merging security related data of consecutive packets. The merging (or combining packets) based on simple mathematical operations helps to reduce energy consumption by eliminating the requirement to send security related fields in headers and trailers. We name our protocol as the Compact Security Protocol referred to as C-Sec. In addition to energy savings, the C-Sec protocol also includes a unique security feature of hiding the packet header information. This feature makes it more difficult to trace the flow of wireless communication, and helps to minimize the cost of defending against replay attacks. We performed rigorous testing of the C-Sec protocol and compared it with well-known protocols including TinySec, MiniSec, SNEP and Zigbee. Our performance evaluation demonstrates that the C-Sec protocol outperforms other protocols in terms of energy savings. We also evaluated our protocol with respect to other performance metrics including queuing delay and error probability. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:2588 / 2604
页数:17
相关论文
共 31 条
  • [1] Allen Michael, 2010, WIRELESS SENSOR NETW
  • [2] Alliance ZigBee, 2008, 053474R17 ZIGBEE ALL
  • [3] [Anonymous], 2004, TINYSEC LINK LAYER S
  • [4] [Anonymous], 2010, WIRELESS SENSOR NETW
  • [5] Bellare M., 1994, LECT NOTES COMPUTER, V839, P340
  • [6] Bolch G., 2006, Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications
  • [7] FORRE R, 1990, LECT NOTES COMPUT SC, V403, P450
  • [8] Opportunistic encryption: A trade-off between security and throughput in wireless networks
    Haleem, Mohamed A.
    Mathur, Chetan N.
    Chandramouli, R.
    Subbalakshmi, K. P.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) : 313 - 324
  • [9] Hu SQ, 2008, LECT NOTES COMPUT SC, V4982, P26
  • [10] Karl H., 2007, Protocols and Architectures for Wireless Sensor Networks