Efficient Random Key based Encryption System for Data Packet Confidentiality in WSNs

被引:12
|
作者
Saleem, Kashif [1 ]
Khalil, Mohammed Sayim [1 ]
Fisal, Norsheila [2 ]
Ahmed, Adel Ali [2 ]
Orgun, Mehmet A. [3 ]
机构
[1] KSU, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[2] Univ Teknol Malaysia, Fac Elect Engn, Telemat Res Grp, Skudai, Malaysia
[3] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
Authentication; Decryption; Encryption; Human Immune Blood Brain Barrier; Malicious; Multihop; Random Key; Routing; Secure; Wireless Sensor Network;
D O I
10.1109/TrustCom.2013.206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.
引用
收藏
页码:1662 / 1668
页数:7
相关论文
共 50 条
  • [21] EEEDCS: Enhanced energy efficient distributed compressive sensing based data collection for WSNs
    Sekar, K.
    Devi, Suganya K.
    Satti, Satish Kumar
    Srinivasan, P.
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2023, 38
  • [22] Novel quantum key distribution and attribute based encryption for cloud data security
    Verma, Garima
    Kumar, Ashutosh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21)
  • [23] Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption
    Kumar, Atul
    Dua, Mohit
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (18) : 27785 - 27805
  • [24] Design of High Speed AES System for Efficient Data Encryption and Decryption System using FPGA
    Kumar, Santhosh R.
    Shashidhar, R.
    Mahalingaswamy, A. M.
    Kumar, Praveen M. S.
    Roopa, M.
    2018 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT - 2018), 2018, : 1279 - 1282
  • [25] An Efficient Implementation of Enhanced Key Generation Technique in Data Encryption Standard (DES) Algorithm using VHDL
    Chabukswar, Punam Milind
    Kumar, Manoj
    Balaramudu, P.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 917 - 921
  • [26] Power system real time data encryption system based on DES algorithm
    Cui, Ajun
    Zhao, Hong
    Zhang, Xu
    Zhao, Bo
    Li, Zhiru
    2021 13TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2021), 2021, : 220 - 228
  • [27] Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments
    Ma, Sha
    Zhong, Yijian
    Huang, Qiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3758 - 3772
  • [28] Efficient attribute-based encryption with attribute revocation for assured data deletion
    Xue, Liang
    Yu, Yong
    Li, Yannan
    Au, Man Ho
    Du, Xiaojiang
    Yang, Bo
    INFORMATION SCIENCES, 2019, 479 : 640 - 650
  • [29] Steganography in Medical Images Using Advanced Reversible Data Hiding Scheme Based Encryption System
    Chitradevi, B.
    Manikandan, S.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (13): : 276 - 282
  • [30] Energy-Efficient Advanced Data Encryption System Using Spin-Based Computing-in-Memory Architecture
    Nisar, Arshid
    Dhull, Seema
    Shreya, Sonal
    Kaushik, Brajesh Kumar
    IEEE TRANSACTIONS ON ELECTRON DEVICES, 2022, 69 (04) : 1736 - 1742