A Secret Key-Based Security Architecture for Wireless Sensor Networks

被引:0
|
作者
Chowdhury, Anuva [1 ]
Tanzila, Farzana Alam [1 ]
Chowdhury, Shanta [1 ]
Haque, Md. Mokammel [1 ]
机构
[1] Chittagong Univ Engn & Technoloty, Fac Elect & Comp Engn, Chittagong 4349, Bangladesh
关键词
singular value decomposition; pseudo-inverse matrix; secret key; wireless sensor network; PRE-DISTRIBUTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information sharing and transmit has been increased exponentially in today's world of Information and Communication Technology. Cryptography is a lasting solution to save the sensitive data from unauthorized access. Finding proper cryptographic structure for wireless sensor networks (WSNs) is extremely challenging as there are some limitations on energy and memory resources of WSNs. Hence, this paper presents an efficient secret key based security architecture which aims to contribute robust security to the topic with ideas to manin-the-middle attacks and many other hacker situations. In this scheme, singular value decomposition (SVD) of a pseudo-inverse matrix has been used for the key generation. This scheme does not require key handshaking for data transmission and reception between the nodes. The analytical results demonstrate that the proposed scheme shows a significant gain in the rank of security, and is suitable for WSNs of the modern age.
引用
收藏
页码:79 / 82
页数:4
相关论文
共 50 条
  • [1] An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
    Haque, Md. Mokammel
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    Huh, Eui-Nam
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (05): : 265 - 279
  • [2] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
    Mohaisen, Abedelaziz
    Choi, Jeong Woon
    Hong, Dowon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (04): : 376 - 384
  • [3] A Security Architecture for Wireless Sensor Networks Based-on Public Key Cryptography
    Yao, Jianbo
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3648 - 3650
  • [4] A high security dynamic secret key management scheme for Wireless Sensor Networks
    Li, Lanying
    Wang, Xin
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 507 - 510
  • [5] Intrusion detection based security architecture for wireless sensor networks
    Xiao, DB
    Chen, C
    Chen, GL
    [J]. INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1365 - 1368
  • [6] Secret Key Encryption Model for Wireless Sensor Networks
    Khan, Abdullah
    Shah, Syed Waqar
    Ali, Abdar
    Ullah, Rizwan
    [J]. PROCEEDINGS OF 2017 14TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2017, : 809 - 815
  • [7] Scalable Secret Key Generation for Wireless Sensor Networks
    Altun, Ufuk
    Basaran, Semiha T.
    Kurt, Gunes Karabulut
    Ozdemir, Enver
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6031 - 6041
  • [8] Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks
    Yi, Chuanjun
    Yang, Geng
    Dai, Hua
    Liu, Liang
    Li, Ning
    [J]. SENSORS, 2018, 18 (11)
  • [9] SecSens - Security Architecture for Wireless Sensor Networks
    Bagci, Faruk
    Ungerer, Theo
    Bagherzadeh, Nader
    [J]. 2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 449 - +
  • [10] A security architecture for mobile wireless sensor networks
    Schmidt, S
    Krahn, H
    Fischer, S
    Wätjen, D
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 166 - 177