Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Energy Mechanism for WSN and Its Implementation in NS-2

Nour El Din M. Khalifa, Mohamed H. Taha, Hesham N. Elmahdy, Imane A. Saroit

Abstract


Wireless sensor networks (WSNs) are usually deployed for gathering data from unattended or hostile environments. Therefore, securing data transmission across these environments is a must. Due to the fact that the sensors have a limited power, any security mechanism for sensor network must be energy efficient. In this paper, a secure energy efficient mechanism is introduced with a proposed scenario which leads to a significant improvement in network energy consumption. The mechanism constructs its security features in the application and transport layer as the information that the attackers seek ultimately resides within these layers. We modified the packet format for WSN. Data payload was encrypted by Advanced Encryption Standard (AES) and Message Authentication Code (MAC) was generated to assure data confidentiality and integrity. The energy consumption metric has been taken into considerations while designing and testing the mechanism to make it energy efficient as much as possible. The energy efficiency was achieved by giving a higher priority to the secured packet over the normal packet in the Interface Queue (IFQ). Through this paper, a detailed structure of the proposed mechanism is introduced and implemented using Network Simulator-2 (NS-2). This is the first research that implements security algorithms within NS-2. Since NS- 2 does not support any security features before, this research will be a
good start to begin using NS-2 as a security simulator.


Keywords


Wireless Sensor Networks, Security, Encryption, AES, MAC, NS-2, IFQ

Full Text:

PDF

References


K. Kifayat, M. Merabti, Q. Shi and D. L. Jones," Security in Wireless Sensor Networks," Handbook of Information and Communication Security, Part E, pp. 513-552, 2010.

S. Ito and K. Yoshigoe, “Performance Evaluation of Consumed-Energy-Type-Aware Routing (CETAR) for Wireless Sensor Networks,”International Journal of Wireless & Mobile Networks (IJWMN), Vol. 1,No. 2, pp. 93-104, 2009.

S. Sharma, “Energy-effcient Secure Routing in Wireless Sensor Networks,” National Institute of Technology Rourkela, Msc Thesis, May 2009.

S. Mohammadi, R. E. Atani, and H. Jadidoleslamy, “A Comparison of Link Layer Attacks on Wireless Sensor Networks,” Journal of Information Security, Vol. 2, No. 2, pp. 69-84, April 2011.

M. Holland, T. Wang, B. Tavli, A. Seyedi, and W. Heinzelman,“Optimizing Physical Layer Parameters for Wireless Sensor Networks," ACM Trans. on Sensor Networks (TOSN), Vol. 7, No. 4, pp. 1-20,February 2011.

V.C Manju, ”Study of security issues in wireless sensor network,”International Journal of Engineering. Science and Technology (IJEST),Vol.3, No.10, pp. 7347- 7352, October 2011.

R. D. Pietro, L. V. Mancini, A. Mei, “Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks”. Wireless Networks, Vol. 12, No. 6 ,pp. 709-721, December 2006

S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” Proc. of the ACM Conference on Computer and Communications Security, pp. 62–72, Washington, USA, October 2003.

H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, "Toward Resilient Security in Wireless Sensor Networks," Proc. of the Sixth ACM international symposium on Mobile ad hoc networking and computing,pp. 34-45, Illinois, USA, May 2005.

F. Massicotte, F. Gagnon, Y. Labiche, L. Briand and M. Couture, “Automatic evaluation of intrusion detection systems,” Proc. of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, pp. 361– 370, Washington,USA,2006.

H. Schulzrinne, S. Casner, R. Frederick and V. Jacobson, "RTP: A Transport Protocol for Real-Time Applications", RFC 3550, July 2003.

P.D. Khambre, S.S.Sambhare and P.S. Chavan, “Secure Data in Wireless Sensor Network via AES,” International Journal of Computer Science and Information Technologies, Vol. 3, No. 2, March 2012.

S. Desai, S. Butani and S. Valiveti, “Analyzing the Impact of Standard Encryption Approaches for Data Aggregation in a Wireless Sensor Network,” International Journal of Computer Science and Telecommunications, Vol. 3, No. 6, pp. 55-59, June 2012.

M. Dworkin, “Recommendation for Block Cipher Modes of Operation:The CMAC Mode for Authentication,” NIST Special Publication 800- 38B, National Institute of Standards and Technology (NIST),

http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf;May 2005.

S. Siraj, A. Gupta and R. Badgujar, “Network Simulation Tools Survey,” International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, No. 4, pp. 199-206, June 2012.

W. Dai. Crypto++ library . http://www. cryptopp.com/, 2012.

N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, “A study of the energy consumption characteristics of cryptographic algorithms and security protocols,” IEEE Transactions on Mobile Computing, Vol. 5,No. 2, pp. 128– 143, December 2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.