Implementation Of Node Energy Based On Encryption Keying
نویسنده
چکیده
This paper deals with Designing cost-efficient, secure network protocols for any Networks is a challenging problem because node in a network itself is resource-limited. Since the communication cost is the most dominant factor in any network, we introduce an energy-efficient Node Energy-Based Encryption and Keying (NEBEK) scheme that significantly reduces the number of transmissions needed for rekeying to avoid stale keys. NEBEK is a secure communication framework where sensed data is encoded using a scheme based on a permutation code generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the residual energy of the node. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific reeking messages. NEBEK is able to efficiently detect and filter false data injected into the network by malicious outsiders. We have evaluated NEBEK’s feasibility and performance analytically and through software simulations. Our results show that NEBEK, without incurring transmission overhead (increasing packet size or sending control messages for rekeying), is able to eliminate malicious data from the network in an energy efficient manner. KeywordsNEBEK; Network; protocol; communication; RC4 encryption; dynamic key; virtual energy; Statistical mode; Operational mode; Forwarding Node Packets.
منابع مشابه
Energy Efficient Cluster based Key Management & Authentication Technique for Wireless Sensor Networks
In wireless sensor networks, the security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for...
متن کاملGroup Re - keying Protocol Based on Modular Polynomial Arithmetic Over Galois Field
Problem statement: In this study we propose a group re-keying protocol based on modular polynomial arithmetic over Galois Field GF(2). Common secure group communications requires encryption/decryption for group re-keying process, especially when a group member is leaving the group. Approach: This study proposes secret keys multiplication protocol based on modular polynomial arithmetic (SKMP), w...
متن کاملVirtual Energy Based Secure and Mean Path Length Based Energy Efficient Framework (VEMPL) for WSN
Designing a secure and energy efficient wireless sensor network is a confronting problem as the sensors are resource limited devices. Moreover it also becomes important to ensure that the false data injected into the network by malicious node is not perceived as accurate data to maintain the authenticity and integrity of network. In this paper we have proposed Virtual Energy based secure and Me...
متن کاملVirtual Energy Based Encryption & Keying on Wireless Sensor Network
Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this we introduce an energy-efficient Virtual Energy-Based Encryption and Keying(VEBEK) scheme for WSNs that reduces the number of transmission needed for rekeying the packets. VEBEK is a secure communi...
متن کاملCluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks
To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes.The security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink i...
متن کامل