An enhanced security architecture for wireless sensor network

作者: Sherin M Youssef , A Baith Mohamed , Mark A Mikhail , None

DOI:

关键词:

摘要: This paper introduces an enhanced secure sensor network architecture that provides the basic properties of data secrecy, authentication, and replay protection, with Low energy consumption overhead relatively high security level. A novel Pairwise Key based architecture. block cipher mode operation will be employed both secrecy authenticity in only one pass over message data. The Offset Codebook Block (OCB) on Advanced Encryption Standard (AES) encryption employed. An establishment scheme is proposed assures that, even when some number nodes has been compromised, remainder remains fully secure. Only a few bits Initialization Vector (IV) sent, while retaining full-length IV per packet. In contrast, previous approaches require two passes plaintext (one for authentication) transmission IV. support single - source communication multi broad cast communication. Different modes used different key lengths initial vectors settings. More over, text filtered by filter level such as Bloom windowing. Proposed mechanism robust subject to resource constraints energy, memory, computational speed. improvement comes at cost modest increase memory size, which desirable tradeoff nodes. Thus, design tradeoffs model make it well-suited current state-of the- art devices.

参考文章(19)
Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung, Perfectly-Secure Key Distribution for Dynamic Conferences international cryptology conference. ,vol. 740, pp. 471- 486 ,(1992) , 10.1007/3-540-48071-4_33
Hugo Krawczyk, The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) international cryptology conference. ,vol. 2001, pp. 310- 331 ,(2001) , 10.1007/3-540-44647-8_19
Virgil D. Gligor, Pompiliu Donescu, Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes fast software encryption. pp. 92- 108 ,(2001) , 10.1007/3-540-45473-X_8
Mihir Bellare, Chanathip Namprempre, Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm international conference on the theory and application of cryptology and information security. pp. 531- 545 ,(2000) , 10.1007/3-540-44448-3_41
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil Gligor, MiniSec: a secure sensor network communication architecture information processing in sensor networks. pp. 479- 488 ,(2007) , 10.1145/1236360.1236421
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, SPINS Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 189- 199 ,(2001) , 10.1145/381677.381696
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, LEAP: efficient security mechanisms for large-scale distributed sensor networks computer and communications security. pp. 62- 72 ,(2003) , 10.1145/948109.948120
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao, A random perturbation-based scheme for pairwise key establishment in sensor networks Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '07. pp. 90- 99 ,(2007) , 10.1145/1288107.1288120
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava, Secure time synchronization service for sensor networks Proceedings of the 4th ACM workshop on Wireless security - WiSe '05. pp. 97- 106 ,(2005) , 10.1145/1080793.1080809
Julia Albath, Sanjay Madria, Practical algorithm for data security (PADS) in wireless sensor networks data engineering for wireless and mobile access. pp. 9- 16 ,(2007) , 10.1145/1254850.1254853