SCUR: Secure communications in Wireless Sensor Networks using Rabbit

被引:0
作者
Tahir, Ruhma [1 ]
Javed, Muhammad Younas [2 ]
Ahmad, Attiq [1 ]
Iqbal, Raja [3 ]
机构
[1] NUST, Dept Informat Secur, Coll Signals, Lalkurti, Rawalpindi Cant, Pakistan
[2] NUST, Comp Engn Dept, Coll Elect & Mech Engn, Rawalpindi, Pakistan
[3] NUST, Engn Div, Coll Signals, Lalkurti, Rawalpindi Cant, Pakistan
来源
WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II | 2008年
关键词
confidentiality; SCUR; Wireless Sensor Networks; Rabbit;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure communication where the communication nodes have limited processing and storage capabilities while requiring sufficient levels of security. The features of SCUR lead to the conclusion that this particular scheme might be more efficient in terms of security and resource consumption than the existing schemes for providing data confidentiality for the domain of WSNs.
引用
收藏
页码:523 / +
页数:2
相关论文
共 50 条
  • [31] Secure Quantized Target Tracking in Wireless Sensor Networks
    Mansouri, Majdi
    Khoukhi, Lyes
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 713 - 718
  • [32] A SECURE MECHANISM FOR QOS ROUTING IN WIRELESS SENSOR NETWORKS
    Alwan, Hind
    Agarwal, Anjali
    2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
  • [33] Cut Detection and Secure Routing in Wireless Sensor Networks
    Wagh, Pradnya
    Mahamuni, Pratik
    Rajeshirke, Kaustubh
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 143 - 148
  • [34] Modeling on Secure and Efficient Clustering for Wireless Sensor Networks
    Hu Xiangdong
    Wei Qinfang
    Cui Ping
    Cai Jun
    Liu Guangcai
    Luo Wei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3848 - 3850
  • [35] An Investigation of Secure Authentication Systems in Wireless Sensor Networks
    Vani, Girija
    Shariff, Noorullah C.
    Biradar, Raj Kumar L.
    INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (03) : 4725 - 4733
  • [36] SGR:Secure Geographical Routing in Wireless Sensor Networks
    Lata, B. T.
    Tejaswi, V
    Shaila, K.
    Raghavendra, M.
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 284 - 289
  • [38] Secure and reliable object tracking in wireless sensor networks
    Oracevic, Alma
    Akbas, Serkan
    Ozdemir, Suat
    COMPUTERS & SECURITY, 2017, 70 : 307 - 318
  • [39] Survey on Secure Data Aggregation in Wireless Sensor Networks
    Gaikwad, Priyanka B.
    Dhage, Manisha R.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 242 - 246
  • [40] Secure and reliable connectivity in heterogeneous wireless sensor networks
    Eletreby, Rashad
    Yagan, Osman
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2880 - 2884