Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32313
Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy


Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: Hybrid MAC protocol, data integrity, lightweight encryption, Neighbor based key sharing, Sensor node data processing, Z-MAC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 419


[1] Rhee, A. Warrier, M. Aia, J. Min and M. L. Sichitiu, "Z-MAC: A Hybrid MAC for Wireless Sensor Networks," in IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 511-524, June 2008, doi: 10.1109/TNET.2007.900704.
[2] Lopez, Julio, and Ricardo Dahab. "An overview of elliptic curve cryptography." (2000).
[3] Zhu, Sencun, et al. "An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks." IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004. IEEE, 2004.
[4] Rhee, Injong, et al. "DRAND: Distributed randomized TDMA scheduling for wireless ad hoc networks." IEEE Transactions on Mobile Computing 8.10 (2009): 1384-1396.
[5] Lu, Tao, Shunchao Jia, and Yinchang Li. "A modified RAND algorithm for multi-buyer Joint Replenishment Problem with resource constraints." The 2nd International Conference on Information Science and Engineering. IEEE, 2010.
[6] S. Ganeriwal and M. Srivastava, “Reputation-based framework for high integrity sensor networks”, In Proceedings of the 2nd ACM Workshop on Security on Ad Hoc and Sensor Networks, Washington DC, USA, 2004
[7] N. M. A. Latiff, C. C. Tsimenidis and B. S. Sharif, "Energy-Aware Clustering for Wireless Sensor Networks using Particle Swarm Optimization," 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Athens, 2007, pp. 1-5, doi: 10.1109/PIMRC.2007.4394521.’
[8] N. Gura, A. Wander, H. Eberle, and S. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs”, In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES ’04), August 2004.