Efficient Random Key based Encryption System for Data Packet Confidentiality in WSNs

被引:12
|
作者
Saleem, Kashif [1 ]
Khalil, Mohammed Sayim [1 ]
Fisal, Norsheila [2 ]
Ahmed, Adel Ali [2 ]
Orgun, Mehmet A. [3 ]
机构
[1] KSU, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[2] Univ Teknol Malaysia, Fac Elect Engn, Telemat Res Grp, Skudai, Malaysia
[3] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
Authentication; Decryption; Encryption; Human Immune Blood Brain Barrier; Malicious; Multihop; Random Key; Routing; Secure; Wireless Sensor Network;
D O I
10.1109/TrustCom.2013.206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.
引用
收藏
页码:1662 / 1668
页数:7
相关论文
共 50 条
  • [11] Data Encryption Scheme Based On Adaptive System
    Najam, Shaheryar
    Rehman, Mujeeb Ur
    Ahmed, Jameel
    2020 GLOBAL CONFERENCE ON WIRELESS AND OPTICAL TECHNOLOGIES (GCWOT), 2020,
  • [12] A new public key cipher system based on image encryption
    Alam, MGR
    Hassan, MM
    Hossain, N
    Quadir, SMM
    Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 1735 - 1738
  • [13] A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud
    Maddila, Suresh Kumar
    Vadlamani, Nagalakshmi
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2023, 22 (06)
  • [14] Structural Cryptanalysis of the Message Based Random Variable Length Key Encryption Algorithm (MRVLK)
    Davahli, Azam
    Mirvaziri, Hamid
    Aminian, Media
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2014, 12 (03): : 201 - 210
  • [15] An Encryption Scheme Based on Key Pre-distribution for Wireless Sensor Network in Electromechanical System
    Yang Shao-Chun
    Zhang Guo-Qing
    Wang Peng
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 405 - +
  • [16] Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing
    Xu, Guangwei
    Ji, Wenrui
    Wang, Yan
    Shi, Xiujin
    Huang, Qiubo
    Gan, Yanglan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [17] Conglomerate Energy Efficient Elgamal Encryption Based Data Aggregation Cryptosystems in Wireless Sensor Network
    Babu T.G.
    Jayalakshmi V.
    International Journal of Engineering, Transactions A: Basics, 2022, 35 (02): : 417 - 424
  • [18] Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT
    Zhang, Qingyang
    Fu, Yujie
    Cui, Jie
    He, Debiao
    Zhong, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5797 - 5809
  • [19] A fast and efficient multiple images encryption based on single-channel encryption and chaotic system
    Xinyu Gao
    Jun Mou
    Li Xiong
    Yuwen Sha
    Huizhen Yan
    Yinghong Cao
    Nonlinear Dynamics, 2022, 108 : 613 - 636
  • [20] A fast and efficient multiple images encryption based on single-channel encryption and chaotic system
    Gao, Xinyu
    Mou, Jun
    Xiong, Li
    Sha, Yuwen
    Yan, Huizhen
    Cao, Yinghong
    NONLINEAR DYNAMICS, 2022, 108 (01) : 613 - 636