A security protocol for Wireless Sensor Networks

被引:0
|
作者
Zhang, Chang N. [1 ]
Yu, Qian [1 ]
Huang, Xun [1 ]
Yang, Cungang [2 ]
机构
[1] Univ Regina, Dept Comp Sci, Regina, SK S4S 0A2, Canada
[2] Ryerson Polytech Inst, Dept Elect Engn, Toronto, ON M5B 2K3, Canada
来源
关键词
RC4; security protocol; Hash function; backward property of RC4 states; Wireless Sensor Networks; resource-constrained communications;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an security protocol for Wireless Sensor Networks (WSNs). It is based on the forward and backward property of RC4 states and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operation. Furthermore, an RC4-based hash function for the generation of Message Authentication Code (MAC) is presented. The proposed protocol is an ideal solution for wireless sensor networks and other resource-constrained devices where the communication nodes have limited power resources and computational capabilities, and can be widely used in the applications of one-to-one communications as well as broadcasting and multicasting.
引用
收藏
页码:113 / +
页数:3
相关论文
共 50 条
  • [1] Lightweight Security Protocol for Wireless Sensor Networks
    Biswas, Kamanashis
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [2] Enhanced Security Protocol in Wireless Sensor Networks
    Aseri, T. C.
    Singla, N.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 214 - 221
  • [3] Analysis of Security Routing Protocol for Wireless Sensor Networks
    Wang, Yi
    Cao, Zhenjie
    Bai, Xue
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE (LEMCS 2015), 2015, 117 : 1074 - 1078
  • [4] Energy efficient security protocol for wireless sensor networks
    Çam, H
    Özdemir, S
    Muthuavinashiappan, D
    Nair-, P
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2981 - 2984
  • [5] On Security of Opportunistic Routing Protocol in Wireless Sensor Networks
    Sharma, Archana
    Singh, Yashwant
    [J]. PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 407 - 419
  • [6] Efficient Security Authentication Protocol in Wireless Sensor Networks
    Latha, S. Asha
    Sivabalan, A.
    [J]. ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 418 - +
  • [7] Security Analysis of a Distributed Reprogramming Protocol for Wireless Sensor Networks
    Yu, Yong
    Ni, Jianbing
    Sun, Ying
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (08): : 1875 - 1877
  • [8] A Novel Security Protocol for Wireless Sensor Networks with Cooperative Communication
    Al Hayajneh, Abdullah
    Bhuiyan, Md Zakirul Alam
    McAndrew, Ian
    [J]. COMPUTERS, 2020, 9 (01)
  • [9] Simulation Framework for a Security Protocol for Wireless Body Sensor Networks
    Al-Hamadi, Hussam
    Gawanmeh, Amjad
    Al-Qutayri, Mahmoud
    [J]. PROCEEDINGS OF THE 2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS - LCN WORKSHOPS 2016, 2016, : 248 - 253
  • [10] Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks
    Zeng, Peng
    Cao, Zhenfu
    Choo, Kim-Kwang Raymond
    Wang, Shengbao
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (06) : 426 - 428