Securing Message in Wireless Sensor Network by using New Method of Code Conversions
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33090
Securing Message in Wireless Sensor Network by using New Method of Code Conversions

Authors: Ahmed Chalak Shakir, GuXuemai, Jia Min

Abstract:

Recently, wireless sensor networks have been paid more interest, are widely used in a lot of commercial and military applications, and may be deployed in critical scenarios (e.g. when a malfunctioning network results in danger to human life or great financial loss). Such networks must be protected against human intrusion by using the secret keys to encrypt the exchange messages between communicating nodes. Both the symmetric and asymmetric methods have their own drawbacks for use in key management. Thus, we avoid the weakness of these two cryptosystems and make use of their advantages to establish a secure environment by developing the new method for encryption depending on the idea of code conversion. The code conversion-s equations are used as the key for designing the proposed system based on the basics of logic gate-s principals. Using our security architecture, we show how to reduce significant attacks on wireless sensor networks.

Keywords: logic gates, code conversions, Gray-code, and clustering.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1333542

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1652

References:


[1] Shuai Yang, Jie Liu, Chunxiao Fan, Xiaoying Zhang, and JunweiZou. "A new design of security wireless sensor network using efficient key management scheme". IEEE, DOI: 10.1109/ICNIDC.2010. 5657820, Issue Date: 24-26 Sept. 2010.
[2] Akbar Abbasi, "Better Security for Wireless Sensor Networks," icfn, IEEE, pp.100-103, International Conference on Future Networks, 2009. http://doi.ieeecomputersociety.org/10.1109/ICFN.2009.55
[3] XiuliRen, and Haibin Yu, "Security Mechanisms for Wireless Sensor Networks". IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3, March 2006
[4] Beat Gebistorf and Roger Wattenhofer. "Secure Messaging for Wireless Sensor Networks". Swiss Federal Institute of Technology Zurich, Distributed Computing Group DCG. Semester thesis, SA-2009-03.
[5] ManelBoujelben, Omar Cheikhrouhou, Mohamed Abid and Habib Youssef. "Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks". Third International Conference on Sensor Technologies and Applications. 978-0-7695-3669-9/0 IEEE DOI 10.1109/ SENSORCOMM.2009.73
[6] Kejie Lu, Yi Qian and Jiankun Hu. "A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks". IEEE 1-4244-0198-4/06┬®2006
[7] Jen-YanHuang, I-En Liao, and Hao-Wen Tang. "A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks". Hindawi Publishing Corporation.EURASIP Journal on Wireless Communications and Networking Volume 2011, Article ID 296704, 10 pages. doi:10.1155/2011/296704.
[8] Reza Azarderakhsh, ArashReyhani-Masoleh, and Zine-EddineAbid. "A Key Management Scheme for Cluster Based Wireless Sensor Networks". IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. 978-0-7695-3492-3/08 IEEE. DOI 10.1109/EUC.2008.176
[9] Zhong Zhou, Student Member, IEEE, Shengli Zhou, Member, IEEE, Shuguang Cui, Member, IEEE, and Jun-Hong Cui, Member, IEEE. "Energy-Efficient Cooperative Communication in a Clustered Wireless Sensor Network". IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 6, NOVEMBER 2008
[10] Chung-Horng Lung and Chenjuan Zhou. "Using Hierarchical Agglomerative Clustering in Wireless Sensor Networks: An Energy- Efficient and Flexible Approach". 978-1-4244-2324-8/08/, IEEE 2008.
[11] Ashok Kumar Das and IndranilSengupta. "An Effective Group-Based Key Establishment Scheme for Large-Scale Wireless Sensor Networks using Bivariate Polynomials". Conference: COM-munication System softWAre and Middle-waRE - COMSWARE , pp. 9-16.DOI: 10.1109/ COM-SWA.2008.4554370.
[12] Wensheng Zhang , Sencun Zhu ,and Guohong Cao. "Predistribution and local collaboration-based group rekeying for wireless sensor networks". Ad Hoc Networks 7 (2009) 1229-1242. 2008 Elsevier B.V. All rights reserved. doi:10.1016/j.adhoc.2008.11.004
[13] Ali Chamam and Samuel Pierre. "A distributed energy-efficient clustering protocol for wireless sensor networks". Computers and Electrical Engineering 36 (2010) 303-312. doi:10.1016/j. comp eleceng.2009.03.008. 2009 Elsevier Ltd.
[14] Ameer Ahmed Abbasi and Mohamed Younis. "A survey on clustering algorithms for wireless sensor networks". Computer Communications 30 (2007) 2826-2841. doi:10.1016/j.comcom.2007.05.024. _ 2007 Published by Elsevier B.V.
[15] Renaud Fallier and Bart Scheers. "Positioning and Topology Control in Mobile Ad Hoc Networks and Wireless Sensor Networks". NC3A (Den Haag) and the VUB / ETRO-COMO 2011. http://www.sic.rma.ac.be/Projects/WSN/index.html
[16] Arboleda LMC, Nasser N. "Comparison of clustering algorithms and protocols for wireless sensor networks". In: Proceedings of the Canadian conference on electrical and computer engineering; 2006. p. 1787-92.
[17] Heizelman WR, Chandrakasan A, Balakrishnan H. "Energy-efficient communication protocol for wireless micro sensor networks". In Proceedings of the IEEE Hawaii international conference on system sciences; 2000.
[18] Younis O, Fahmy S. HEED. "A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks". IEEE Trans MobileComput 2004;3(4):366-79
[19] SomanathTripathy. "Tin-Key: Effective Key-Establishment for Wireless Sensor Networks". 2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010). DOI 10.1109/CIT.2010.170