Location-based data encryption for wireless sensor network using dynamic keys

2015 ◽  
Vol 21 (8) ◽  
pp. 2649-2656 ◽  
Author(s):  
Han-Yu Lin
2019 ◽  
Vol 15 (6) ◽  
pp. 155014771985651
Author(s):  
Zhen Liu ◽  
Yi-Liang Han ◽  
Xiao-Yuan Yang

Toward the goal of high security and efficiency for data collection in wireless sensor network, this article proposed an adaptable secure compressive sensing–based data collection scheme for distributed wireless sensor network. It adopted public key cryptography technology to solve the key distribution problem, and compressive sensing over finite fields to reduce the communication cost of data collection. Under hardness of decisional learning with errors problem on lattice, it can ensure indistinguishability against chosen ciphertext attack (IND-CCA1) security scheme for collected data on the extranet and indistinguishability against chosen plaintext attack security for data during the process of distributed collection on the intranet. Owing to the similar linear structure for lattices and compressive sensing, data encryption collection can be all in the form of efficient linear operations, and internode data aggregation can be in the form of addition operation.


The wireless sensor network is a large number of tiny nodes installed in insecure environment for monitoring, gathering and transferring data and are prone to security threats for its limited resources. In order to transmit the data and to protect from different attacks in the network, security is maintained. To achieve confidentiality, authenticity and authorization of data which secure the data from different attacks cryptographic algorithm were used. The number of keys used in the cryptographic algorithm determines the security of the data. Cryptographic algorithms are broadly classified into two types symmetric cryptography and asymmetric cryptography. In the symmetric key cryptographic algorithm, a secret key is shared in the network and in asymmetric key cryptographic algorithm two keys are used for data security. In wireless sensor network, symmetric key cryptography required more storage to store the key among all the nodes of the network and in asymmetric key cryptography more computation time is require for the data encryption and decryption. To avoid memory and computation overhead we proposed a hybrid cryptosystem to handle the security in the wireless sensor network. Initially shared key is exchanged among nodes using ECC which is a public key algorithm. Data is encrypted and decrypted using RC4 symmetric key algorithm. Various performance measures such as time taken for encryption and decryption process and memory needed for storing cipher text data. The proposed model shows faster encryption of data and takes less memory for key storage as compared to the traditional approach.


2021 ◽  
Vol 17 (5) ◽  
pp. 155014772110186
Author(s):  
M Saud Khan ◽  
Noor M Khan ◽  
Ahmad Khan ◽  
Farhan Aadil ◽  
M Tahir ◽  
...  

A wireless sensor network is the formation of a temporary network of sensor nodes equipped with limited resources working in an ad hoc environment. Routing protocol is one of the key challenges while designing a wireless sensor network, which requires optimum use of limited resources of a sensor node, such as power and so on. Similarly, data security and integrity is another open issue that has emerged as a flash point in research community in the last decade. This article proposes a secure model for routing data from source to destination named as secure and energy-efficient routing. The proposed secure and energy-efficient routing is inherited from authentication and voice encryption scheme developed for Global System for Mobile Communications. Necessary modifications have been carried out in order to fit the Global System for Mobile Communications technology in a wireless sensor network ad hoc environment. Due to its low complexity, the secure and energy-efficient routing consumes lesser battery power both during encryption/decryption and for routing purposes. It is due to the XoR operation used in the proposed scheme which is considered as the most inexpensive process with respect to time and space complexity. It is observed through simulations that secure and energy-efficient routing can work effectively even in critical power level in a sensor network. The article also presents a simulation-based comparative analysis of the proposed secure and energy-efficient routing with two notable existing secure routing protocols. We proved that the proposed secure and energy-efficient routing helps to achieve the desired performance under dynamically changing network conditions with various numbers of malicious nodes. Moreover, in Global System for Mobile Communications, generally three linear feedback shift registers are used to fragment the key in data encryption mechanism. In this article, a mathematical model is proposed to increase the number of possible combinations of shift register in order to make the data encryption mechanism more secure which has never been done before. Due to its liner complexity, lesser power consumption, and more dynamic route updating, the secure and energy-efficient routing can easily find its use in the emerging Internet-of-Things systems.


2012 ◽  
Vol 2 (8) ◽  
pp. 188-190
Author(s):  
Targol Abrishami ◽  
◽  
Dr. N. M. Kulkarni Dr. N. M. Kulkarni ◽  
Dr. A. D. Shaligram Dr. A. D. Shaligram

Sign in / Sign up

Export Citation Format

Share Document