SCUR: Secure communications in Wireless Sensor Networks using Rabbit

被引:0
|
作者
Tahir, Ruhma [1 ]
Javed, Muhammad Younas [2 ]
Ahmad, Attiq [1 ]
Iqbal, Raja [3 ]
机构
[1] NUST, Dept Informat Secur, Coll Signals, Lalkurti, Rawalpindi Cant, Pakistan
[2] NUST, Comp Engn Dept, Coll Elect & Mech Engn, Rawalpindi, Pakistan
[3] NUST, Engn Div, Coll Signals, Lalkurti, Rawalpindi Cant, Pakistan
关键词
confidentiality; SCUR; Wireless Sensor Networks; Rabbit;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure communication where the communication nodes have limited processing and storage capabilities while requiring sufficient levels of security. The features of SCUR lead to the conclusion that this particular scheme might be more efficient in terms of security and resource consumption than the existing schemes for providing data confidentiality for the domain of WSNs.
引用
收藏
页码:523 / +
页数:2
相关论文
共 50 条
  • [41] A Middleware Architecture for Wireless Sensor Networks Using Secure Web Services
    Scherer, Richardson W.
    Kleinschmidt, Joao H.
    IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (05) : 815 - 820
  • [42] Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks
    Vijayalakshmi, V.
    Palanivelu, T. G.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 255 - 261
  • [43] Multiregional secure localization using compressive sensing in wireless sensor networks
    Liu, Chang
    Yao, Xiangju
    Luo, Juan
    ETRI JOURNAL, 2019, 41 (06) : 739 - 749
  • [44] Secure localisation of wireless devices with application to sensor networks using steganography
    Tondwalkar, Ankita
    Vinayakray-Jani, Preetida
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 610 - 616
  • [45] Optical wireless communications for cyber-secure ubiquitous wireless networks
    Abumarshoud, Hanaa
    Chen, Cheng
    Islim, Mohamed Sufyan
    Haas, Harald
    PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2020, 476 (2242):
  • [46] Secure Fault Tolerance in Wireless Sensor Networks
    Yuan, Ting
    Zhang, Shiyong
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 477 - 482
  • [47] A Secure Multicast Scheme for Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 158 - 163
  • [48] A design for secure and survivable wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Tipper, David
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 30 - 37
  • [49] Secure Cooperative Routing in Wireless Sensor Networks
    Batool, Rida
    Bibi, Nargis
    Alhazmi, Samah
    Muhammad, Nazeer
    APPLIED SCIENCES-BASEL, 2024, 14 (12):
  • [50] Simple Secure Protocol for Wireless Sensor Networks
    Manjuprasad, B.
    Dharani, Andhe
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 260 - 263