Open Access Open Access  Restricted Access Subscription or Fee Access

Energy-Based Dynamic Encryption for Wireless Sensor Networks

Y. Harold Robinson, S. Raja Rajeswari

Abstract


Designing cost-proficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are limited wireless devices. Since the sensor’s energy consumption, we introduce an Implicit Vitality Base Encryption Key (IVBEK) to avoid decayed keys. In addition to the goal of saving energy, minimal transmission is monitoring the wireless spectrum. IVBEK is a secure communication framework where sensed data is encoded using a scheme based on a permutation code generated via the ARCFOUR encryption mechanism. The key to the ARCFOUR encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific rekeying messages. IVBEK is able to efficiently detect and filter false data injected into the network by malicious outsiders.

Keywords


Wireless Sensor Networks (WSNs),Implicit Vitality Base Encryption Key (IVBEK),ARCFOUR,message authentication codes (MACs).

Full Text:

PDF

References


I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ―Wireless Sensor Networks: A Survey,‖ Computer Networks, vol. 38, no. 4, pp. 393-422, Mar. 2002.

C. Vu, R. Beyah, and Y. Li, ―A Composite Event Detection in Wireless Sensor Networks,‖ Proc. IEEE Int’l Performance, Computing, and Comm. Conf. (IPCCC ’07), Apr. 2007.

F. Ye, H. Luo, S. Lu, and L. Zhang, ―Statistical En-Route Filtering of Injected False Data in Sensor Networks,‖ IEEE J. Selected Areas in Comm., vol. 23, no. 4, pp. 839-850, Apr. 2005.

Z. Yu and Y. Guan, ―A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks,‖ Proc. IEEE INFOCOM, pp. 1-12, Apr. 2006.

S. Uluagac, R. Beyah, and J. Copeland, ―Secure Source-Based Time Synchronization (SOBAS) for Wireless Sensor Networks,‖ technical report, Comm. Systems Center, School of Electrical and Computer Eng., Georgia Inst. of Technology, 2009.

C. Kraub, M. Schneider, K. Bayarou, and C. Eckert, ―STEF: A Secure Ticket-Based En-Route Filtering Scheme for Wireless Sensor Networks,‖ Proc. Second Int’l Conf. Availability, Reliability and Security (ARES ’07), pp. 310-317, Apr. 2007.

C. Intanagonwiwat, R. Govindan, and D. Estrin, ―Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks,‖ Proc. ACM MobiCom, pp. 56-67, Aug. 2002.

K. Akkaya and M. Younis, ―A Survey on Routing Protocols for Wireless Sensor Networks,‖ Ad Hoc Networks, vol. 3, pp. 325-349, May 2005.

S. Zhu, S. Setia, S. Jajodia, and P. Ning, ―An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,‖ Proc. IEEE Symp. Security and Privacy, 2004.

A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. Tygar, ―Spins: Security Protocols for Sensor Networks,‖ Proc. ACM MobiCom, 2001.

M. Luk, G. Mezzour, A. Perrig, and V. Gligor, ―Minisec: A Secure Sensor Network Communication Architecture,‖ Proc. Sixth Int’l Symp. Information Processing in Sensor Networks (IPSN ’07), pp. 479- 488, Apr. 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.