Efficient Random Key based Encryption System for Data Packet Confidentiality in WSNs

被引:12
|
作者
Saleem, Kashif [1 ]
Khalil, Mohammed Sayim [1 ]
Fisal, Norsheila [2 ]
Ahmed, Adel Ali [2 ]
Orgun, Mehmet A. [3 ]
机构
[1] KSU, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[2] Univ Teknol Malaysia, Fac Elect Engn, Telemat Res Grp, Skudai, Malaysia
[3] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
Authentication; Decryption; Encryption; Human Immune Blood Brain Barrier; Malicious; Multihop; Random Key; Routing; Secure; Wireless Sensor Network;
D O I
10.1109/TrustCom.2013.206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.
引用
收藏
页码:1662 / 1668
页数:7
相关论文
共 50 条
  • [1] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [2] Data Encryption and Decryption Algorithms using Key Rotations for Data Security in Cloud System
    Prakash, G. L.
    Prateek, Manish
    Singh, Inder
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 624 - 629
  • [3] Efficient Public Key Encryption Based on Ideal Lattices
    Stehle, Damien
    Steinfeld, Ron
    Tanaka, Keisuke
    Xagawa, Keita
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 617 - +
  • [4] An efficient hybrid data gathering algorithm based on multihop and mobile elements in WSNs
    Ghaleb, Mukhtar
    Subramaniam, Shamala
    Othman, Mohamed
    Zukarnain, Zuriati
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (01) : 605 - 621
  • [5] Reversible data mixing procedure for efficient public-key encryption
    Matyas, M
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1998, 17 (03) : 265 - 272
  • [6] A Low Power Circuit Design for Chaos-Key Based Data Encryption
    Ngoc Nguyen
    Loan Pham-Nguyen
    Nguyen, Minh B.
    Kaddoum, Georges
    IEEE ACCESS, 2020, 8 : 104432 - 104444
  • [7] Efficient identity-based encryption without random oracles
    Waters, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 114 - 127
  • [8] An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm
    Shankar, K.
    Eswaran, P.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015, 2016, 394 : 705 - 714
  • [9] An Efficient Sound and Data Steganography Based Secure Authentication System
    Datta, Debajit
    Garg, Lalit
    Srinivasan, Kathiravan
    Inoue, Atsushi
    Reddy, G. Thippa
    Reddy, M. Praveen Kumar
    Ramesh, K.
    Nasser, Nidal
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (01): : 723 - 751
  • [10] Efficient Selective Identity-Based Encryption Without Random Oracles
    Boneh, Dan
    Boyen, Xavier
    JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 659 - 693