scholarly journals Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network

2015 ◽  
Vol 9 (7) ◽  
pp. 667-679 ◽  
Author(s):  
Tzonelih Hwang ◽  
Prosanta Gope
Author(s):  
Ashim Pokharel ◽  
Ethiopia Nigussie

Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such solutions. In this work, secure communication protocol is added to clustered wireless sensor network. Security is a very important requirement that keeps the overall system usable and reliable by protecting the information in the network from attackers. The proposed and implemented AES block cipher provides confidentiality to the communication between nodes and base station. The energy efficiency of LEACH clustered network and with added security is analyzed in detail. In LEACH clustering along with the implemented data aggregation technique 48% energy has been saved compared to not clustered and no aggregation network. The energy consumption overhead of the AES-based security is 9.14%. The implementation is done in Contiki and the simulation is carried out in Cooja emulator using sky motes.


Author(s):  
Md. Habibur Rahman ◽  
Md. Ibrahim Abdullah

The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialize secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.


2018 ◽  
Vol 8 (3) ◽  
pp. 205
Author(s):  
R. Benny Gandara

Standar IEEE 802.15.4 merupakan standar acuan pengembangan protokol yang diterapkan untuk teknologi industrial wireless sensor network pada saat ini. Unsur keamanan data dalam industrial wireless sensor network perlu untuk diperhatikan karena dampak gangguan yang timbul akan dapat berpengaruh secara langsung pada proses industri yang sedang beroperasi dan berdampak pada keselamatan pekerja, peralatan dan lingkungan serta keekonomian. Metode enkripsi adalah metode umum yang dipergunakan dalam perlindungan data pada sistem wireless sensor network. Metode enkripsi pada layer physical dengan menggunakan algoritma stream cipher Rabbit dipergunakan sebagai metode alternatif perlindungan data pada sistem aplikasi industrial wireless sensor network yang mana pada umumnya menggunakan metode enkripsi block cipher pada lapisan upper layer. Algoritma Rabbit akan dibandingkan dengan algoritma RC4 yang telah diteliti sebelumnya. Dari hasil simulasi, algoritma Rabbit dengan jumlah kunci yang lebih pendek dan cipher text yang lebih sedikit dapat memberikan hasil yang lebih baik untuk nilai avalanche effect, entrophy dan penggunaan CPU dibandingkan dengan algoritma RC4. Meskipun mendapatkan hasil yang bervariasi pada penggunaan memori dan end to end delay, algoritma Rabbit pada jumlah node tertentu masih dapat memenuhi standar kebutuhan industri untuk aplikasi sektor migas.


Sign in / Sign up

Export Citation Format

Share Document