A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks

  • Shanta Mandal
  • Rituparna Chaki
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


A lot of research on wireless sensor network is focused on field of performance, security and energy. Public key cryptography suffers from high computational complexity and overhead, when Symmetric key schemes can be utilized more efficiently in order to provide more security. This paper proposes a more appropriate cryptography scheme for wireless sensor networks in respect of low energy consumption. The proposed security scheme overcomes the limitations of both public-key and symmetric-key protocols. The scheme is utilizes pre-distributed keys to implement data confidentiality service. Special attention has been given to data authenticity. The proposed scheme is suitable for data centric routing using direct diffusion protocols in wireless sensor networks.


Wireless Sensor Network Public Key Cryptography Symmetric Key Cryptography Elliptic Curve Cryptography Scalable Encryption Algorithm RC5 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Rivest, R.L., Shamir, A., Adleman, L.A.: A method for obtaining digital signatures and public-key crypto systems. Communications of the ACM 21(2), 120–126 (1998)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Heinzelman, W., Kulik, J., Balakrishnan, H.: Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. In: Proceedings of the 5th ACM/IEEE Mobicom, pp. 174–185 (August 1999)Google Scholar
  3. 3.
    Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Micro sensor Networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS 33), pp. 1–10 (2000)Google Scholar
  4. 4.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–402 (2001)CrossRefGoogle Scholar
  5. 5.
    Chan, H., Perrig, A., Song, D.: Random key pre distribution schemes for sensor networks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)Google Scholar
  6. 6.
    Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of WSNA 2003, pp. 151–159 (September 2003)Google Scholar
  7. 7.
    Di Pietro, R., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.: LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In: Proceedings of the First International Workshop on Wireless Security and Privacy (WiSPr 2003), pp. 397–406 (2003)Google Scholar
  8. 8.
    Gaubatz, G., Kaps, J.-P., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Lee, J.-Y., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Cheng, Y., Agrawal, D.P.: Efficient pair wise key establishment and management in static wireless sensor networks. In: Proceedings of the Second IEEE International Conference on Mobile ad hoc and Sensor Systems, Washington, DC (2005)Google Scholar
  12. 12.
    Law, Y., Doumen, J., Hartel, P.: Survey and benchmark of Block Cipher for Wireless Sensor Neworks. ACM Transactions on Sensor Networks 2(1), 65–93 (2006)CrossRefGoogle Scholar
  13. 13.
    AL-Rousan, M., Rjoub, A., Baset, A.: A Low-Energy Security Algorithm for Exchanging Information in Wireless Sensor Networks. Journal of Information Assurance and Security 4, 48–59 (2009)Google Scholar
  14. 14.
    Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA a Scalable Encryption Algorithm for Small Embedded ApplicationsGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of Computer Sc. and EngineeringWest Bengal University of TechnologyKolkataIndia

Personalised recommendations