Information theory and cryptography based secured communication scheme for cooperative MIMO communication in wireless sensor networks
نویسندگان
چکیده
Emerging cooperative MIMO communication is a promising technology in improving communication performance for wireless sensor networks. However, the security problems inherent to cooperative communications also arise. In this paper, we propose a cross-layer secured communication scheme for cooperative MIMO communication in wireless sensor networks to overcome the external and active compromised nodes attacks. The scheme combines cryptographic technique implemented in higher layers with data assurance analysis at the physical layer to provide better communication security. An efficient key management system is proposed for the cryptographic processes. It provides secured communication and routing using a small number of keys shared between the clusters which cooperate on data transmission and reception. Although cryptography can ensure the confidentiality in the communications between authorized participants, it usually cannot prevent the attacks from compromised nodes. The situation where the cooperative nodes are compromised and try to corrupt the communications by sending garbled signals is also investigated in this paper. A novel information theory based detector that can identify the active compromised nodes and recover the symbols in transmission process at physical layer is proposed. When the compromised nodes are detected, the key management system calls the key revocation to isolate these nodes and reconfigure the cooperative MIMO network. Simulation results show that the proposed algorithm for compromised nodes detection is effective and efficient, and the accuracy of received information is significantly improved. 2013 Elsevier B.V. All rights reserved.
منابع مشابه
A novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملStrong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks
Cooperative MIMO communication is a promising technology which enables realistic solution for improving communication performance with MIMO technique in wireless networks that are composed of size and cost constrained devices. However, the security problems inherent to cooperative communication also arise. Cryptography can ensure the confidentiality in the communication and routing between auth...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملTarget Tracking with Unknown Maneuvers Using Adaptive Parameter Estimation in Wireless Sensor Networks
Abstract- Tracking a target which is sensed by a collection of randomly deployed, limited-capacity, and short-ranged sensors is a tricky problem and, yet applicable to the empirical world. In this paper, this challenge has been addressed a by introducing a nested algorithm to track a maneuvering target entering the sensor field. In the proposed nested algorithm, different modules are to fulfill...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Ad Hoc Networks
دوره 14 شماره
صفحات -
تاریخ انتشار 2014