Energy-efficient and reliable data collection in wireless sensor networks

被引:3
作者
Puneeth, Deepa [1 ]
Joshi, Nishanth [1 ]
Atrey, Pradeep Kumar [2 ]
Kulkarni, Muralidhar [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun Engn, Surathkal, Karnataka, India
[2] SUNY Albany, Dept Comp Sci, New York, NY USA
关键词
Wireless sensor networks; secret sharing; AES; semantic security; energy efficiency; SECURE; SCHEME;
D O I
10.3906/elk-1702-78
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ensuring energy efficiency, data reliability, and security is important in wireless sensor networks (WSNs). A combination of variants from the cryptographic secret sharing technique and the disjoint multipath routing scheme is an effective strategy to address these requirements. Although Shamir's secret sharing (SSS) provides the desired reliability and information -theoretic security, it is not energy efficient. Alternatively, Shamir's ramp secret sharing (SRSS) provides energy efficiency and data reliability, but is only computationally secure. We argue that both these approaches may suffer from a compromised node (CN) attack when a minimum number of nodes is compromised. Hence, we propose a new scheme that is energy efficient, provides data reliability, and is secure against CN attacks. The core idea of our scheme is to combine SRSS and a round -reduced AES cipher, which we call "split hop AES (SHAES)". Both the simulation results and the theoretical analysis are employed to validate the near-sink CN attack, and a secure reliable scheme using SHAES is proposed.
引用
收藏
页码:138 / 149
页数:12
相关论文
共 22 条
  • [1] [Anonymous], 2002, DESIGN RIJNDAEL
  • [2] Biham E, 2000, AES 2000 C 13 14 APR
  • [3] Low-Data Complexity Attacks on AES
    Bouillaguet, Charles
    Derbez, Patrick
    Dunkelman, Orr
    Fouque, Pierre-Alain
    Keller, Nathan
    Rijmen, Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (11) : 7002 - 7017
  • [4] Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks
    Challal, Y.
    Ouadjaout, A.
    Lasla, N.
    Bagaa, M.
    Hadjidj, A.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1380 - 1397
  • [5] Securing wireless sensor networks against aggregator compromises
    Claveirole, Thomas
    de Amorim, Marcelo Dias
    Abdalla, Michel
    Viniotis, Yannis
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 134 - 141
  • [6] INSENS: Intrusion-tolerant routing for wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    [J]. COMPUTER COMMUNICATIONS, 2006, 29 (02) : 216 - 230
  • [7] RMER: Reliable and Energy-Efficient Data Collection for Large-Scale Wireless Sensor Networks
    Dong, Mianxiong
    Ota, Kaoru
    Liu, Anfeng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (04): : 511 - 519
  • [8] Noncommutative Lightweight Signcryption for Wireless Sensor Networks
    Gu, Lize
    Pan, Yun
    Dong, Mianxiong
    Ota, Kaoru
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [9] A novel linear multi-secret sharing scheme for group communication in wireless mesh networks
    Hsu, Ching-Fang
    Cui, Guo-Hua
    Cheng, Qi
    Chen, Jing
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 464 - 468
  • [10] A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks
    Li, Yue
    Chen, Dehua
    Li, Wei
    Wang, Gaoli
    Smith, Paul
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,