Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs

Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.

[1]  L. Benes,et al.  Immune surveillance of the human central nervous system (CNS): Different migration pathways of immune cells through theblood–brain barrier and blood–cerebrospinal fluid barrier in healthy persons , 2006, Cytometry. Part A : the journal of the International Society for Analytical Cytology.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[4]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[5]  Norsheila Fisal,et al.  Secure real-time routing protocol with load distribution in wireless sensor networks , 2011, Secur. Commun. Networks.

[6]  J. McKENDRICK,et al.  The Central Nervous System of Vertebrates , 1909, Nature.

[7]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[8]  Norsheila Fisal,et al.  Ant colony inspired self-optimized routing protocol based on cross layer architecture for wireless sensor networks , 2010, ICC 2010.

[9]  Deborah Estrin,et al.  Statistical model of lossy links in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[10]  Chae Hoon Lim LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[11]  Bo Sheng,et al.  Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[12]  Kashif Saleem,et al.  Biological inspired secure autonomous routing mechanism for wireless sensor networks , 2011, Int. J. Intell. Inf. Database Syst..

[13]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.