Abstract
A wireless sensor network consists of sensors which sense data from their surroundings and communicates it to the base station. During this transfer, the data is subject to a number of attacks that may endanger its confidentiality, which can be overcome by using encryption. In order to protect data from every sensor independently, the key used for encryption may be changed before moving to the next sensor. This paper presents a scenario that can tackle the case where the key after being shifted circularly remains the same. As a result, the same key is applied to the subsequent sensor. This paper develops an algorithm that manipulates the bits to obtain a new value for the key. The results prove that the use of this algorithm does not reduce the performance of the security model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Vangala, A., Parwekar, P.: Enhanced encryption model for sensor data in wireless sensor network. In: 20th International Symposium on Wireless Personal Multimedia Communications (WPMC 2017), pp. 16–21. IEEE Press, Indonesia (2018)
Vangala, A., Parwekar, P.: Encryption model for sensor data in wireless sensor networks. In: 4th International Conference on Information Systems Design and Intelligent Applications (INDIA 2017), AISC, vol. 672, pp. 963–970. Springer, Vietnam (2018)
Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: The 8th International Conference on Advanced Communication Technology (ICACT 2006), vol. 2, pp. 6. IEEE (2006)
Kavitha, T., Sridharan, D.: Security vulnerabilities in wireless sensor networks: a survey. J. Inf. Assur. Secur. 5(1), 31–44 (2010)
Zhang, X., Heys, H.M., Li, C.: Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In: 25th Biennial Symposium on Communications (QBSC), pp. 168–172 (2010)
Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Elektronika ir Elektrotechnika 108(2), 11–14 (2011)
Ankit, S., Revaththi Venkataraman, N.: AES-128 performance in TinyOS with CBC algorithm (WSN). Int. J. Eng. Res. Dev. 7, 40–49 (2013)
Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. 15(4) (2008)
Panda, M.: Security in wireless sensor networks using cryptographic techniques. AJER 3, 50–56 (2014)
Khambre, P.D., Sambhare, S.S., Chavan, P.S.: Secure data in wireless sensor network via AES (advanced encryption standard). Int. J. Comput. Sci. Inf. Technol. 3(2), 3588–3592 (2012)
Giruka, V.C., Mukesh, S., James, R., Srilekha, V.: Security in wireless sensor networks. Wirel. Commun. Mob. Comput. 8(1), 1–24 (2008)
Sunil, K., Rama Krishna, C., Solanki, A.K.: Time efficient public key cryptography for enhancing confidentiality and integrity in a wireless sensor network. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 17(1), 81 (2017)
Abdullah, K., Syed Waqar, S., Abdar Ali, A., Rizwan, U.: Secret key encryption model for wireless sensor networks. In: 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST 2017), pp. 809–815. IEEE, (2017)
TinyOS: http://tinyos.stanford.edu/tinyos-wiki/index.php/Security
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Vangala, A., Parwekar, P. (2020). Improved Confidentiality for Data Transfer in Wireless Sensor Networks. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_50
Download citation
DOI: https://doi.org/10.1007/978-981-13-9282-5_50
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9281-8
Online ISBN: 978-981-13-9282-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)