Skip to main content

Improved Confidentiality for Data Transfer in Wireless Sensor Networks

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 159))

  • 757 Accesses

Abstract

A wireless sensor network consists of sensors which sense data from their surroundings and communicates it to the base station. During this transfer, the data is subject to a number of attacks that may endanger its confidentiality, which can be overcome by using encryption. In order to protect data from every sensor independently, the key used for encryption may be changed before moving to the next sensor. This paper presents a scenario that can tackle the case where the key after being shifted circularly remains the same. As a result, the same key is applied to the subsequent sensor. This paper develops an algorithm that manipulates the bits to obtain a new value for the key. The results prove that the use of this algorithm does not reduce the performance of the security model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Vangala, A., Parwekar, P.: Enhanced encryption model for sensor data in wireless sensor network. In: 20th International Symposium on Wireless Personal Multimedia Communications (WPMC 2017), pp. 16–21. IEEE Press, Indonesia (2018)

    Google Scholar 

  2. Vangala, A., Parwekar, P.: Encryption model for sensor data in wireless sensor networks. In: 4th International Conference on Information Systems Design and Intelligent Applications (INDIA 2017), AISC, vol. 672, pp. 963–970. Springer, Vietnam (2018)

    Google Scholar 

  3. Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: The 8th International Conference on Advanced Communication Technology (ICACT 2006), vol. 2, pp. 6. IEEE (2006)

    Google Scholar 

  4. Kavitha, T., Sridharan, D.: Security vulnerabilities in wireless sensor networks: a survey. J. Inf. Assur. Secur. 5(1), 31–44 (2010)

    Google Scholar 

  5. Zhang, X., Heys, H.M., Li, C.: Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In: 25th Biennial Symposium on Communications (QBSC), pp. 168–172 (2010)

    Google Scholar 

  6. Toldinas, J.: Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices. Elektronika ir Elektrotechnika 108(2), 11–14 (2011)

    Article  Google Scholar 

  7. Ankit, S., Revaththi Venkataraman, N.: AES-128 performance in TinyOS with CBC algorithm (WSN). Int. J. Eng. Res. Dev. 7, 40–49 (2013)

    Google Scholar 

  8. Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. 15(4) (2008)

    Google Scholar 

  9. Panda, M.: Security in wireless sensor networks using cryptographic techniques. AJER 3, 50–56 (2014)

    Google Scholar 

  10. Khambre, P.D., Sambhare, S.S., Chavan, P.S.: Secure data in wireless sensor network via AES (advanced encryption standard). Int. J. Comput. Sci. Inf. Technol. 3(2), 3588–3592 (2012)

    Google Scholar 

  11. Giruka, V.C., Mukesh, S., James, R., Srilekha, V.: Security in wireless sensor networks. Wirel. Commun. Mob. Comput. 8(1), 1–24 (2008)

    Article  Google Scholar 

  12. Sunil, K., Rama Krishna, C., Solanki, A.K.: Time efficient public key cryptography for enhancing confidentiality and integrity in a wireless sensor network. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 17(1), 81 (2017)

    Google Scholar 

  13. Abdullah, K., Syed Waqar, S., Abdar Ali, A., Rizwan, U.: Secret key encryption model for wireless sensor networks. In: 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST 2017), pp. 809–815. IEEE, (2017)

    Google Scholar 

  14. TinyOS: http://tinyos.stanford.edu/tinyos-wiki/index.php/Security

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anusha Vangala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vangala, A., Parwekar, P. (2020). Improved Confidentiality for Data Transfer in Wireless Sensor Networks. In: Satapathy, S., Bhateja, V., Mohanty, J., Udgata, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 159. Springer, Singapore. https://doi.org/10.1007/978-981-13-9282-5_50

Download citation

Publish with us

Policies and ethics