Freshness Preserving Secure Data Gathering Protocol over Wireless Sensor Networks

نویسندگان

  • Hyunsung Kim
  • Sung Woon Lee
چکیده

Wireless sensor networks (WSNs) are vulnerable to various forms of security attacks because they are deployed in potentially adverse or even hostile environment. Research into security and routing mechanism designs specifically focused on WSNs has been challenging issues to researchers. Recently, Choi et al. proposed a secure data gathering protocol over WSNs based on an extended Sakai et al.’s non-interactive identity-based key agreement scheme. However, their protocol could provide attacker information including traffic flow identification, traffic flow tracking, or disclosing application-level information due to lack of freshness. This paper proposes a freshness preserving secure data gathering protocol over WSNs to solve the problem in Choi et al.’s protocol. Thereby, the proposed protocol could efficiently cope from the information leakage problem from adversary and could provide secure multipath over WSNs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EPSDA: Energy Efficient Privacy preserving Secure Data Aggregation for Wireless Sensor Networks

The privacy preserving data aggregation protocols in wireless sensor networks have many applications in security critical areas, since it hides individual nodes’ data from adversaries. The existing hop by hop and shuffling based privacy preserving protocols does not provide an energy efficient, accurate and secure data aggregation result in base station, due to the energy consuming decryption a...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

Performing Data Aggregation on Encrypted data for Preserving Privacy in WSNs

Energy and Privacy are the two important aspects in the Battery limited wireless sensor networks. Currently adopting hop by hop encryption for privacy preserving protocols are not efficient in terms of the energy and privacy in WSNs because these protocols decrypts and encrypts the data at the aggregator node since the decrypts at every aggregator node consumes more power and it also increases ...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015