A hybrid security protocol for sensor networks

被引:1
|
作者
Watfa, Mohamed K. [1 ]
El-Ghali, Marwa [2 ]
Halabi, Hiba [2 ]
机构
[1] Univ Wollongong, Dept Comp Sci, Dubai, U Arab Emirates
[2] Amer Univ Beirut, Dept Comp Sci, Beirut 11072020, Lebanon
关键词
sensor networks; security protocol; authentication; public key; PK; distributed systems;
D O I
10.1504/IJCNDS.2009.026822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sensor nodes used to transmit sensitive data, especially in military applications, require securing the data transmitted through the WSNs to maintain the confidentiality of the data and authenticate the participating sensor nodes. Since sensor nodes suffer from limited resources, in memory storage, computing power, energy capabilities and transmission rates, available network security protocols are inadequate. Symmetric algorithms cannot provide the same degree of security as public key algorithms, leading us to devise a new algorithm SHESP that uses public keys within the limitations of sensor nodes. This paper presents a way to utilise existing public key algorithms such as RSA, Diffie-Hellmann and elliptic curve in the field of WSN security by dividing the network into clusters. Our algorithm supplies data confidentiality, node authentication and data integrity while remaining within acceptable memory, time and energy constraints. We provide theoretical and experimental evidence to validate our algorithms. Results reveal significant improvement in data availability, data confidentiality and authenticity while reducing the communication and computation overhead.
引用
收藏
页码:116 / 145
页数:30
相关论文
共 50 条
  • [41] Probabilistic routing protocol for a hybrid wireless underground sensor networks
    Adel, Ahmed
    Norsheila, Fisal
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2013, 13 (02): : 142 - 156
  • [42] Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks
    Zeng, Peng
    Cao, Zhenfu
    Choo, Kim-Kwang Raymond
    Wang, Shengbao
    [J]. IEEE COMMUNICATIONS LETTERS, 2009, 13 (06) : 426 - 428
  • [43] On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    Sun, Da-Zhi
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (02) : 566 - 569
  • [44] Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks
    Wang, Weijia
    Hu, Lei
    Li, Yong
    [J]. IEEE COMMUNICATIONS LETTERS, 2010, 14 (08) : 782 - 784
  • [45] An Energy Efficient Flooding Protocol for Enhanced Security in Wireless Sensor Networks
    Celestine, Johnu
    Vallepalli, Keerthi
    Vinayaraj, Tushar
    Almotir, Jasim
    Abuzneid, Abdelshakour
    [J]. 2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [46] A New Data Link Layer Security Protocol for Wireless Sensor Networks
    Bandirmali, Necla
    Erturk, Ismail
    [J]. JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2009, 12 (04): : 235 - 242
  • [47] A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
    Le Fessant, Fabrice
    Papadimitriou, Antonis
    Viana, Aline Carneiro
    Sengul, Cigdem
    Palomar, Esther
    [J]. COMPUTER COMMUNICATIONS, 2012, 35 (02) : 234 - 248
  • [48] Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks
    Avula, Mallikarjun
    Lee, Sang-Gon
    Yoo, Seong-Moo
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (06): : 1982 - 2004
  • [49] Security in Sensor Networks
    Fischer, Stefan
    Zitterbart, Martina
    [J]. IT-INFORMATION TECHNOLOGY, 2010, 52 (06): : 311 - 312
  • [50] Multi-Factor Security Enhanced Authentication Protocol for Wireless Sensor Networks
    Zhang, Linghao
    Liang, Huihui
    Deng, Dong
    Liu, Yangyang
    Tang, Chao
    Chang, Zhengwei
    Gui, Shenglin
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 699 - 708