Efficient Random Key based Encryption System for Data Packet Confidentiality in WSNs

被引:12
作者
Saleem, Kashif [1 ]
Khalil, Mohammed Sayim [1 ]
Fisal, Norsheila [2 ]
Ahmed, Adel Ali [2 ]
Orgun, Mehmet A. [3 ]
机构
[1] KSU, Ctr Excellence Informat Assurance CoEIA, Riyadh, Saudi Arabia
[2] Univ Teknol Malaysia, Fac Elect Engn, Telemat Res Grp, Skudai, Malaysia
[3] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
来源
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) | 2013年
关键词
Authentication; Decryption; Encryption; Human Immune Blood Brain Barrier; Malicious; Multihop; Random Key; Routing; Secure; Wireless Sensor Network;
D O I
10.1109/TrustCom.2013.206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.
引用
收藏
页码:1662 / 1668
页数:7
相关论文
共 50 条
  • [41] An Energy Efficient Odd-Even Round Number Based Data Collection using Mules in WSNs
    Singh, Sunil Kumar
    Kumar, Prahhat
    Singh, Jyoti Prakash
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1255 - 1259
  • [42] An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups
    Meng, Ru
    Zhou, Yanwei
    Ning, Jianting
    Liang, Kaitai
    Han, Jinguang
    Susilo, Willy
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 39 - 56
  • [43] Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search
    Li, Le
    Zheng, Dong
    Zhang, Haoyu
    Qin, Baodong
    IEEE ACCESS, 2023, 11 : 28688 - 28698
  • [44] A new encryption and decryption algorithm for privacy data in wireless sensor network based on dynamic key
    Deng, Hongli
    Yang, Tao
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (04) : 376 - 390
  • [45] MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system
    Anuradha, M.
    Justus, J. Jean
    Sheela, L. Mary Immaculate
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (02) : 924 - 943
  • [46] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    INFORMATION SCIENCES, 2020, 511 (511) : 94 - 113
  • [47] An efficient framework for big data security based on selection encryption on AmazonEC2
    Sakr, Ahmed S.
    Abdullkader, Hatem M.
    El-kafrawy, P. M.
    Ibrahem, Hani M.
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [48] dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT
    Li, Xiaoxiao
    Xie, Yong
    Wang, Hui
    Su, Xing
    Li, Haifeng
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 584 - 596
  • [49] Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation
    Bouslehi, Hamdi
    Seddik, Hassene
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 30841 - 30863
  • [50] Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation
    Hamdi Bouslehi
    Hassene Seddik
    Multimedia Tools and Applications, 2018, 77 : 30841 - 30863