Abstract

A wireless sensor network is the formation of a temporary network of sensor nodes equipped with limited resources working in an ad hoc environment. Routing protocol is one of the key challenges while designing a wireless sensor network, which requires optimum use of limited resources of a sensor node, such as power and so on. Similarly, data security and integrity is another open issue that has emerged as a flash point in research community in the last decade. This article proposes a secure model for routing data from source to destination named as secure and energy-efficient routing. The proposed secure and energy-efficient routing is inherited from authentication and voice encryption scheme developed for Global System for Mobile Communications. Necessary modifications have been carried out in order to fit the Global System for Mobile Communications technology in a wireless sensor network ad hoc environment. Due to its low complexity, the secure and energy-efficient routing consumes lesser battery power both during encryption/decryption and for routing purposes. It is due to the XoR operation used in the proposed scheme which is considered as the most inexpensive process with respect to time and space complexity. It is observed through simulations that secure and energy-efficient routing can work effectively even in critical power level in a sensor network. The article also presents a simulation-based comparative analysis of the proposed secure and energy-efficient routing with two notable existing secure routing protocols. We proved that the proposed secure and energy-efficient routing helps to achieve the desired performance under dynamically changing network conditions with various numbers of malicious nodes. Moreover, in Global System for Mobile Communications, generally three linear feedback shift registers are used to fragment the key in data encryption mechanism. In this article, a mathematical model is proposed to increase the number of possible combinations of shift register in order to make the data encryption mechanism more secure which has never been done before. Due to its liner complexity, lesser power consumption, and more dynamic route updating, the secure and energy-efficient routing can easily find its use in the emerging Internet-of-Things systems.

Highlights

  • We propose a secure and energy-efficient scheme for routing data known as secure and energy-efficient routing (SEER), which provides end-to-end security of data and strives to minimize energy consumption

  • The proposed architecture introduces a lowcomplexity SEER mechanism by integrating A5 encryption scheme used for voice encryption in Global System for Mobile Communications (GSM).[31]

  • We proved that the proposed SEER helps to achieve the desired performance under dynamically changing network conditions with various number of malicious nodes

Read more

Summary

Introduction

In addition to securing data during routing, the nodes in such situation must be able to prevent the wastage of energy in order to prolong the network life. The following are the terminologies used in the given algorithm: g : is a 19 bits binary key O : is bits binary key c : is a bit binary key Kc: represents the output key used as a session key for data encryption b : is the length ðnumber of bitsÞ of the output key ] : used as an operator to add new bits to the current vector RAND is a 128 bit key received from base station Ki is a 128 bit key stored in the node S RAND1, 64 È RAND65, 128 È RAND65, 128) È(Ki1, 64 È Ki65, 128) g S1, 19;O S21, 41;c S42, 64 epoch 1, b 16 a mode(g8, O10, c10) For each epoch \ b do if g8 = a b g16 È g17 È g18 È g19 shift g one bit right and append b to the left end If O10 = a b O7 È O20 È O21 È O22 Shift O one bit right and append b to the left end if c10 = a b c8 È c21 È c22 È c23 Shift c one bit right and append b to the left end Kc Kc ] b end Dataenyp Kc È Datasensing for the routing of data in an energy-efficient way.

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call