Open Access Open Access  Restricted Access Subscription or Fee Access

Mobile Algorithm for Key Distribution and Periodic Rekeying in Wireless Sensor Networks


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v11i8.10118

Abstract


In many critical applications of wireless sensor networks, the security of data exchanged between nodes is critical to ensure good functioning of networks and maintain their effectiveness. In this paper we propose a mobile algorithm to secure data transmitted by structured nodes in clusters. The idea is based on a mobile node with significant resources of calculations and energy, responsible for generation, management and periodic rekeying. The cryptography method used in this paper is based on elliptic curves and the key management is based on an AVL tree. However, the main challenges of this approach are to improve security and to increase network’s lifetime by minimizing the energy consumed by nodes belonging to a cluster while generating, storing keys and exchanging packets. To evaluate the performance of the proposed algorithm, we will compare the metrics simulation with two approaches based on elliptic curves: Driven Routing Key Management and Keys Management Method Based on an AVL tree.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Wireless Sensor Networks; Elliptic Curve Cryptography; Mobile Algorithm; Periodic Rekeying

Full Text:

PDF


References


M. F. Othman, K. Shazali, Wireless sensor network applications: A study in environment monitoring system. Procedia Engineering, 2012, vol. 41, p. 1204-1210.
http://dx.doi.org/10.1016/j.proeng.2012.07.302

A. Jain, K. Kant, M. R. Tripathy, Security solutions for wireless sensor networks. 2012 Second International Conference on Advanced Computing & Communication Technologies. IEEE, 2012. pp. 430-433.
http://dx.doi.org/10.1109/acct.2012.102

A. Pandey, R. C. Tripathi, A survey on wireless sensor networks security. International Journal of Computer Applications, 2010, vol. 3, no 2, p. 43-49.
http://dx.doi.org/10.5120/705-989

Adnan, A., Hanapi, Z., Geographic Routing Protocols for Wireless Sensor Networks: Design and Security Perspectives, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (4), pp. 197-211.
http://dx.doi.org/10.15866/irecap.v5i4.6252

S. Chandra, S. Paira, S. Alam, A comparative survey of symmetric and asymmetric key cryptography. International Conference on Electronics, Communication and Computational Engineering (ICECCE), 2014. IEEE, 2014. p. 83-93.
http://dx.doi.org/10.1109/icecce.2014.7086640

S. Sasi, D. Dixon, J. Wilson, A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security. IOSR Journal of Engineering, 2014, vol. 4, no 3, p. 1.
http://dx.doi.org/10.9790/3021-04330104

Kandasamy, R., Krishnan, S., Enhanced Energy Efficient Method for WSN to Prevent Far-Zone, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (4), pp. 137-142.
http://dx.doi.org/10.15866/irecap.v4i4.3034

E. Munivel, M. Ajit, "Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks ", International conference on Wireless Communication and Sensor Computing, February 2010
http://dx.doi.org/10.1109/icwcsc.2010.5415904

Y. Zhang, W. Yang, K. Kim, M. Park, "An A VL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network ", International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 2008.
http://dx.doi.org/10.1109/iih-msp.2008.138

I. Setiadi, A. Kistijantoro, A. Miyaji, Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems. 2nd International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA) 2015. IEEE, 2015. pp. 1-6.
http://dx.doi.org/10.1109/icaicta.2015.7335349

X. Du, M. Guizani, Y. Xiao, H. Chen, "A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks", IEEE International Conference on Communications, ICC 2007, Glasgow, August 2007.
http://dx.doi.org/10.1109/twc.2009.060598

H. Boumerzoug, A. Boucif, A lightweight key management scheme based on an AVL tree and ECC cryptography for wireless sensor networks. Concurrency and Computation: Practice and Experience 2016; 28(6):1831–1847.
http://dx.doi.org/10.1002/cpe.3153

Z. Qin, X. Zhang, K. Feng, An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks. International Journal of Distributed Sensor Networks 2015, vol. 2015, p. 198.
http://dx.doi.org/10.1155/2015/691498

Anitha, R., Nawaz, G., Development of a Secure, Energy Efficient and Reliable Routing Protocol for Mobile Wireless Sensor Networks, (2014) International Review on Computers and Software (IRECOS), 9 (3), pp. 487-494.

J. F. Kazienko, I. M. Moraes, C. V. Albuquerque, (2015). On the performance of a secure storage mechanism for key distribution architectures in wireless sensor networks. International Journal of Distributed Sensor Networks, 2015, 44.
http://dx.doi.org/10.1155/2015/392495

Y. T. Tsou, C. S. Lu, S. Y. Kuo, (2013). MoteSec-aware: a practical secure mechanism for wireless sensor networks. IEEE Transactions on Wireless Communications, 2013,12(6), 2817-2829.
http://dx.doi.org/10.1109/twc.2013.050313.120929

Mohammed, O., Hussin, B., Hasan Basari, A., Reliable Enhanced Leach Protocol for Controlling Data Traffic in Event Tracking Systems, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (3), pp. 144-153.
http://dx.doi.org/10.15866/irecap.v5i3.5925

Geetha, R., Kannan, E., Secure Communication Against Framing Attack in Wireless Sensor Network, (2015) International Review on Computers and Software (IRECOS), 10 (4), pp. 393-398.
http://dx.doi.org/10.15866/irecos.v10i4.5520

D. Martins, H. Guyennet, Wireless sensor network attacks and security mechanisms: A short survey. 13th International Conference on Network-Based Information Systems (NBiS). IEEE, 2010. p. 313-320.
http://dx.doi.org/10.1109/nbis.2010.11

N. Gura, A. Patel, A. Wander, Comparing elliptic curve cryptography and RSA on 8-bit CPUs. International Workshop on Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, 2004. pp. 119-132.
http://dx.doi.org/10.1007/978-3-540-28632-5_9

A. Enge, Elliptic curves and their applications to cryptography: an introduction. Springer Science & Business Media, 2012.

R. Anderson, S. Seitz, "CSE 326: Data Structures AVL Trees." (2014).

M. S. Salah, A. Maizate, M. Ouzzif, Security approaches based on elliptic curve cryptography in wireless sensor networks. 27th International Conference on Microelectronics (ICM). IEEE, 2015. p. 35-38.
http://dx.doi.org/10.1109/icm.2015.7437981

H. P. Gupta, S. V. Rao, V. Tamarapalli, "Analysis of the redundancy in coverage of a heterogeneous wireless sensor network." 2013 IEEE International Conference on Communications (ICC). IEEE, 2013.
http://dx.doi.org/10.1109/icc.2013.6654800

W. Heinzelman, A. Chandrakasan, H. Balakrishnan, " Energy-Efficient Communication Protocol for Wireless Micro sensor Networks", In proc of the Hawaii International Conférence on Systems Science, vol. 8, pp. 8020, January 2000.
http://dx.doi.org/10.1109/hicss.2000.926982

Garci , a, E.M., Bermu , dez, A. , Casado, R. , "Range-free localization for air-dropped WSNs by filtering node estimation improvements", 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE , November 2010.
http://dx.doi.org/10.1109/wimob.2010.5645023


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize