Abstract

The main issue for the security of wireless sensor networks (WSNs) is how to allow sensor nodes (SNs) to establish and share cryptographic keys in an energy-efficient, storage-efficient, and authentic manner for their secure data transmission. Furthermost recent studies carried out in this direction is concerned with homogeneous networks in which all sensor has identical characteristics and fundamental administration mechanisms. However, Cluster-based sensor networks have demonstrated better achievements and performance than homogeneous networks because of the several benefits of clustering. This inspired us to propose a secure key-establishment method for cluster-based sensor networks based on symmetric-key cryptography. Since symmetric key cryptography has small energy consumption, they are a great choice to prefer for securing the networks. Even though symmetric key cryptography has high storage needs, this deficiency can be reduced by using suitable methods—evaluating the proposed work that the storage needs are reduced along with reduced energy consumption. The work offers a favorable level of security against various intruders and possible security threats and is additionally scalable than the state-of-the-art techniques.

Highlights

  • Wireless Sensor Networks (WSNs) have integrated several application domains, including military as well as non-military areas, has become a significant part of our life

  • 6.2.1 Comparison of Communication cost Initially, it may be observed that the energy consumption due to communications in Secure Key Establishment Method (SKEM) technique is comparatively higher than EDAK and RAKE as the key generation step in EDAK is based on local prevailing data (DMK) and does not require any key or information which notice reduces the data transmission overhead and improves the security

  • As communications overheads are higher in SKEM, the following advantages should be wellknown: The advanced sensor nodes (ASN) has rich resources as compared to normal sensor nodes (NSN), and by increasing energy usage due to communications between ASN, SKEM reduces the storage consumption of NSN in a way that only two keys are needed to be stored in the NSN

Read more

Summary

Introduction

Wireless Sensor Networks (WSNs) have integrated several application domains, including military as well as non-military areas, has become a significant part of our life. Whereas the asymmetric key cryptosystem has low storage, but they consume high energy in comparison to symmetric algorithms [9] This problem roots private key algorithms to be more favorable for use in sensor networks because the SNs are not able to run asymmetric algorithms for an extended period of time because they have insufficient energy of SNs. We can secure the sensor’s data in this work by encrypting the sensed data before communicating with only a single key for Cluster Head (CH) and dual keys for every SN; this technique is used in sensor systems with network size. Even like other SNs, it is not positioned in unattended areas

Contribution of the work
Organization of the work
Related Work
Network Architecture and Set-up
Registering the requesting NSN parent
Security investigation of SKEM
Performance Evaluation
Experimental Environment
Results and Discussion
Comparison of algorithmic Complexity
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.