scholarly journals A Smart Cryptographic measure for Data Survivability in Unattended Wireless Sensor Networks

An Unattended Wireless Sensor Network (UWSN) wherein a sporadically visiting sink tries to collect data absorbed by the motes. This setup is most suitable in hostile environments where the collected valuable data becomes the target for a mobile adversary. Unattended sensors cannot instantly transmit collected data to some safe external entity. Though there is an intermittent visit by the sink, a powerful mobile adversary can easily compromise the valuable data collected by sensor nodes between the intervals. Therefore, the data needs to be preserved to be handed over to the sink in its next visit. This property of unattended WSN is called as Data Survivability. We propose a symmetric key cryptosystem that tackles sensor collected data erasure, modification, or disclosure as a support for data survivability in UWSNs. The proposed model has been designed using Linear Feedback Shift Registers (LFSRs) embodied with less power dissipation mechanism that operates on mask method. This is critical to any application running in unattended environments. We have compared our design with other standard works and have substantially proved the trustworthiness. Our work has been assessed using NIST test suite and found reliable.

Author(s):  
Jyothi R. ◽  
Nagaraj G. Cholli

Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a days, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.


2021 ◽  
Author(s):  
Sharmila ◽  
Pramod Kumar ◽  
Shashi Bhushan ◽  
Manoj Kumar ◽  
Mamoun Alazab

Abstract Wireless Sensor Networks (WSNs) play a crucial role in developing the Internet of Things (IoT) by collecting data from hostile environments like military and civil domains with limited resources. The above applications are prone to eavesdropper due to cryptographic algorithms' weaknesses for providing security in WSNs. The security protocols for WSNs are different from the traditional networks because of the limited resource of sensor nodes. Existing key management schemes require large key sizes to provide high-security levels, increasing the computational and communication cost for key establishment. This paper proposes a Hybrid Key Management Scheme for WSNs based on Elliptic Curve Cryptography (ECC) and a hash function to generate key pre-distribution keys. The Key establishment is carried out by merely broadcasting the node identity. The main reason for incorporating a hybrid approach in the key pre-distribution method is to achieve mutual authentication between the sensor nodes during the establishment phase. The proposed method reduces computational complexity with greater security and the proposed scheme can be competently applied into resource constraint sensor nodes


2012 ◽  
Vol 531-532 ◽  
pp. 707-711
Author(s):  
Zhi Ming Zhang ◽  
Xiao Yong Xiong ◽  
Chang Gen Jiang

In many scenarios, wireless sensor networks are deployed in hostile environments. Adversaries could easily compromise sensor node, and bogus data could be injected into the network through the compromised sensor nodes, which decreases the accuracy of the sensing data and wastes scarce energy resources of the networks. In this paper, a novel bogus data detection and filtering scheme for wireless sensor networks was proposed based on one-way hash function. In the proposed scheme, if the sensing node was compromised, the based station could verify the endorsement report, and if the compromised forwarding node modified the report packet, the bogus data could be verified by the next forwarding node, and the modified report packet would be discarded. The analysis shows that the proposed scheme not only provides a high security level but also can detect most bogus data and achieve energy savings.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Hongsheng Yin ◽  
Honggang Qi ◽  
Jingwen Xu ◽  
Xin Huang ◽  
Anping He

The sensor nodes of multitask wireless network are constrained in performance-driven computation. Theoretical studies on the data processing model of wireless sensor nodes suggest satisfying the requirements of high qualities of service (QoS) of multiple application networks, thus improving the efficiency of network. In this paper, we present the priority based data processing model for multitask sensor nodes in the architecture of multitask wireless sensor network. The proposed model is deduced with the M/M/1 queuing model based on the queuing theory where the average delay of data packets passing by sensor nodes is estimated. The model is validated with the real data from the Huoerxinhe Coal Mine. By applying the proposed priority based data processing model in the multitask wireless sensor network, the average delay of data packets in a sensor nodes is reduced nearly to 50%. The simulation results show that the proposed model can improve the throughput of network efficiently.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 98
Author(s):  
Rajkumar Singh Rathore ◽  
Suman Sangwan ◽  
Kabita Adhikari ◽  
Rupak Kharel

Minimizing energy consumption is one of the major challenges in wireless sensor networks (WSNs) due to the limited size of batteries and the resource constrained tiny sensor nodes. Energy harvesting in wireless sensor networks (EH-WSNs) is one of the promising solutions to minimize the energy consumption in wireless sensor networks for prolonging the overall network lifetime. However, static energy harvesting in individual sensor nodes is normally limited and unbalanced among the network nodes. In this context, this paper proposes a modified echo state network (MESN) based dynamic duty cycle with optimal opportunistic routing (OOR) for EH-WSNs. The proposed model is used to act as a predictor for finding the expected energy consumption of the next slot in dynamic duty cycle. The model has adapted a whale optimization algorithm (WOA) for optimally selecting the weights of the neurons in the reservoir layer of the echo state network towards minimizing energy consumption at each node as well as at the network level. The adapted WOA enabled energy harvesting model provides stable output from the MESN relying on optimal weight selection in the reservoir layer. The dynamic duty cycle is updated based on energy consumption and optimal threshold energy for transmission and reception at bit level. The proposed OOR scheme uses multiple energy centric parameters for selecting the relay set oriented forwarding paths for each neighbor nodes. The performance analysis of the proposed model in realistic environments attests the benefits in terms of energy centric metrics such as energy consumption, network lifetime, delay, packet delivery ratio and throughput as compared to the state-of-the-art-techniques.


2019 ◽  
Vol 2019 ◽  
pp. 1-22
Author(s):  
Emmanuel García-González ◽  
Juan C. Chimal-Eguía ◽  
Mario E. Rivero-Angeles ◽  
Vicent Pla

Wireless sensor networks (WSNs) have been extensively studied in the literature. However, in hostile environments where node connectivity is severely compromised, the system performance can be greatly affected. In this work, we consider such a hostile environment where sensor nodes cannot directly communicate to some neighboring nodes. Building on this, we propose a distributed data gathering scheme where data packets are stored in different nodes throughout the network instead to considering a single sink node. As such, if nodes are destroyed or damaged, some information can still be retrieved. To evaluate the performance of the system, we consider the properties of different graphs that describe the connections among nodes. It is shown that the degree distribution of the graph has an important impact on the performance of the system. A teletraffic analysis is developed to study the average buffer size and average packet delay. To this end, we propose a reference node approach, which entails an approximation for the mathematical modeling of these networks that effectively simplifies the analysis and approximates the overall performance of the system.


2009 ◽  
Vol 7 (8) ◽  
pp. 1463-1475 ◽  
Author(s):  
Roberto Di Pietro ◽  
Luigi V. Mancini ◽  
Claudio Soriente ◽  
Angelo Spognardi ◽  
Gene Tsudik

Sign in / Sign up

Export Citation Format

Share Document