Security Using Dynamic Secret Based on Packet Loss Rate for Wireless Sensor Networks

The transmission security of wireless sensor networks plays a vital role in the application of the wireless sensor network. In order to protect these networks, many security protocols are proposed at this stage to protect the security of routing and data transmission. While much of the previous transport mechanism depends on the link layer encryption whose algorithms are not applied to end-to-end transmission. Thus there is scope for further research on the security of source node to sink transmission, and a new method that sink updates the key of the current group by calculating the packet loss rate and considering the local retransmission of the link layer is proposed. Our method provides a supplemental mechanism for existing transport protocols that even if an attacker eavesdrops the current key, the security is automatically replenished, thereby enhancing the security of the transmission. Theoretical analysis and simulation experiments show that the proposed method can guarantee the end-to-end transmission security, and it also consumes less energy than the application of dynamic key update directly to end-to-end transmission.

[1]  Jörgen Olsén On packet loss rates used for TCP network modeling , 2003 .

[2]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[3]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[4]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[5]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[6]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[7]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[8]  Bo Sheng,et al.  Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[9]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[10]  Weibo Gong,et al.  Mobility Can Help: Protect User Identity with Dynamic Credential , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[11]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[12]  Saurabh Singh,et al.  Security For Wireless Sensor Network , 2011 .

[13]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.