Advertisement

Efficient and Secure Keying Mechanism for Communication in Sensor Networks

  • Vinayak Musale
  • Devendra Chaudhari
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)

Abstract

Now a days the wireless sensor technologies are mostly being used in a typical application areas including environmental, defence, medical, military and commercial enterprises. In upcoming years, wireless sensor networks will integrate more tiny sensors into a variety of application scenarios like cyber physical systems, IoT etc. The security of sensor networks is an important constraint for the healthy operations of overall system in untrusted areas as these entities may disturb the proper functioning of applications by injecting wrong data into sensor networks. One way to address this issue is to provide more security to sensor nodes and encrypt the communication among them. This paper presents methodology to design attack-aware efficient secure keying mechanism that provides secure data transmission from one sensor node to another.

Keywords

Energy Network Node Security Sensor Wireless 

Notes

Acknowledgement

I would like to express my sincere gratitude towards my research supervisor, Dr. Devendra Chaudhari, Professor, Research Centre for Computer Science and Engineering, Government College of Engineering, Amravati, for giving me the opportunity to do research and providing invaluable guidance throughout this research. His dynamism, vision, sincerity and motivation have deeply inspired me. He has taught me the research methodology for presenting the research work as clearly as possible.

References

  1. 1.
    Luk, M., Mezzour, G., Perrig, A., Gligor, V.: Minisec: a secure sensor network communication architecture. In: 6th International Symposium on Information Processing in Sensor Networks (IPSN), pp. 479–488, April 2007Google Scholar
  2. 2.
    Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. IEEE JSAC 23(4), 839–850 (2005)Google Scholar
  3. 3.
    Kraub, C., Schneider, M., Bayarou, K., Eckert, C.: STEF: a secure ticket-based en-route filtering scheme for wireless sensor networks. In: The 2nd International Conference on Availability, Reliability and Security (ARES), pp. 310–317, April 2007Google Scholar
  4. 4.
    Hou, H., Corbett, C., Li, Y., Beyah, R.: Dynamic energy-based encoding and filtering in sensor networks. In: Proceedings of the IEEE MILCOM, October 2007Google Scholar
  5. 5.
    Roman, R., Alcaraz, C., Lopez, J.: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mob. Netw. Appl. 12(4), 231–244 (2007)CrossRefGoogle Scholar
  6. 6.
    Ma, M.: Resilience of sink filtering scheme in wireless sensor networks. Elsevier Comput. Commun. 30(1), 55–65 (2006)CrossRefGoogle Scholar
  7. 7.
    Hyun, J., Kim, S.: Low energy consumption security method for protecting information of wireless sensor networks. LNCS Adv. Web Netw. Technol. Appl. 3842, 397–404 (2006)CrossRefGoogle Scholar
  8. 8.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy (2004)Google Scholar
  9. 9.
    Yu, Z., Guan, Y.: A dynamic en-route scheme for filtering false data injection in wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 1–12, April 2006Google Scholar
  10. 10.
    Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Commun. Mag. 44(4), 122–130 (2006)CrossRefGoogle Scholar
  11. 11.
    Gungor, V.C., Hancke, G.P.: Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 50, 4258 (2009)CrossRefGoogle Scholar
  12. 12.
    Zheng, L., Zhang, K., Zhang, D.: An energy efficient dynamic address encoding scheme for wireless sensor network. Int. J. Distrib. Sens. Netw. (2014)Google Scholar
  13. 13.
    Luo, W., Ma, W., Gao, Q.: A dynamic trust management system for wireless sensor networks. Wiley Online Library, 16 November 2015Google Scholar
  14. 14.
    Zhu, Y., Li, E., Chi, K.: Encoding scheme to reduce energy consumption of delivering data in radio frequency powered battery-free wireless sensor networks. IEEE Trans. Veh. Technol. 67(4) (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringGovernment College of EngineeringAmravatiIndia
  2. 2.Department of Electronics and Telecommunication EngineeringGovernment College of EngineeringAmravatiIndia

Personalised recommendations