Forward Secure Communication in Wireless Sensor Networks

Author(s):  
Sjouke Mauw ◽  
Ivo van Vessem ◽  
Bert Bos
2016 ◽  
Vol 89 (4) ◽  
pp. 1391-1412 ◽  
Author(s):  
Fagen Li ◽  
Yanan Han ◽  
Chunhua Jin

Author(s):  
Bahae ABIDI ◽  
Abdelillah JILBAB ◽  
Mohamed EL HAZITI

Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4309 ◽  
Author(s):  
Tariq Ali ◽  
Muhammad Irfan ◽  
Ahmad Shaf ◽  
Abdullah Saeed Alwadie ◽  
Ahthasham Sajid ◽  
...  

Nowadays, there is a growing trend in smart cities. Therefore, the Internet of Things (IoT) enabled Underwater and Wireless Sensor Networks (I-UWSN) are mostly used for monitoring and exploring the environment with the help of smart technology, such as smart cities. The acoustic medium is used in underwater communication and radio frequency is mostly used for wireless sensor networks to make communication more reliable. Therefore, some challenging tasks still exist in I-UWSN, i.e., selection of multiple nodes’ reliable paths towards the sink nodes; and efficient topology of the network. In this research, the novel routing protocol, namely Time Based Reliable Link (TBRL), for dynamic topology is proposed to support smart city. TBRL works in three phases. In the first phase, it discovers the topology of each node in network area using a topology discovery algorithm. In the second phase, the reliability of each established link has been determined while using two nodes reliable model for a smart environment. This reliability model reduces the chances of horizontal and higher depth level communication between nodes and selects next reliable forwarders. In the third phase, all paths are examined and the most reliable path is selected to send data packets. TBRL is simulated with the help of a network simulator tool (NS-2 AquaSim). The TBRL is compared with other well known routing protocols, i.e., Depth Based Routing (DBR) and Reliable Energy-efficient Routing Protocol (R-ERP2R), to check the performance in terms of end to end delay, packet delivery ratio, and energy consumption of a network. Furthermore, the reliability of TBRL is compared with 2H-ACK and 3H-RM. The simulation results proved that TBRL performs approximately 15% better as compared to DBR and 10% better as compared to R-ERP2R in terms of aforementioned performance metrics.


2015 ◽  
Vol 3 (1) ◽  
Author(s):  
B. Vidhya ◽  
Mary Joseph ◽  
D. Rajini Girinath ◽  
A. Malathi

Storage nodes play a vital role in wireless sensor networks for carrying out the storage activity of data sent by the sensor node once after capturing the details of the environment and in turn to answer the sensor data related query to the network owner. Because of the less storage capacity on the sensor node, storage node takes the whole responsibility for pre-processing the data as well as to respond to queries returned by the owner. Duplicate sensor/storage node imposes a major threat to the wireless sensor networks. The proposed approach focuses on carrying out the effective techniques for data transfer by using Elliptic Curve Encryption for encrypting the image captured from the environment and also to transmit the encrypted critical text data from source to destination, aggregate Signature to validate the sender of the message for data verification, stenography to hide the encrypted content within an image. The proposed ideas are well suited for transferring the details secure in WSN.


2020 ◽  
Vol 17 (5) ◽  
pp. 2163-2171
Author(s):  
G. Manikandan ◽  
U. Sakthi

In secure communication key management plays an important role. Ensuring of security and trust worthiness in any transmission taking place via Wireless Sensor Networks (WSN) can be done using thoughtfully designed key management models. Here, the method of clustering is used to increase the system performance. Also, an effective key generation method is proposed for secured data transmission for the clustered wireless sensor networks. This method uses Chinese Remainder Theorem (CRT) for generating secret key for each cluster and merges with cluster head ID to generate a unique 144-bit encryption keys. Since, CRT uses random numbers for generating keys, separate active keys that are dynamic to ensure secured data transmission. The proposed model provides a positive impact by improving the lifetime, reducing the delay time, memory requirements and energy consumption, when compared with other existing state of art methods. Moreover, it protects data from brute-force attack, forward as well as backward secrecy and node compromised attack.


Sign in / Sign up

Export Citation Format

Share Document