An energy efficient encryption method for secure dynamic WSN

Clustering methods have been developed to improve network life of wireless sensor network WSN, yet the dynamic nature of sensor clusters and limited memory and processing power make security a much more challenging problem, and most conventional cryptography methods are ill suited to WSNs. In this paper, we propose a novel encryption method to secure data transmission in WSN with dynamic sensor clusters. Our method leverages elliptic curve cryptography algorithm to generate binary strings for each sensor and combines with node ID, distance to the cluster head, and the index of transmission round to form unique 176-bit encryption keys. Using exclusive OR, substitution, and permutation operations, encryption and decryption are achieved efficiently. Compared with the state-of-the-art methods, our simulation results demonstrated that the proposed method exhibited much improved network lifetime and reduced the energy consumption most evenly among all sensor nodes. More importantly, it overcame many security attacks including brute-force attack, HELLO flood attack, selective forwarding attack, and compromised cluster head attack. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Mohsen Guizani,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Vallipuram Muthukkumarasamy,et al.  An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[3]  Mohamed Elhoseny,et al.  Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm , 2015, IEEE Communications Letters.

[4]  Qinye Yin,et al.  Performance Analysis and Optimization for Energy-Efficient Cooperative Transmission in Random Wireless Sensor Network , 2013, IEEE Transactions on Wireless Communications.

[5]  Yang Li-zhen,et al.  SLEACH: Secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks , 2008, Wuhan University Journal of Natural Sciences.

[6]  Yanbing Liu,et al.  Design and statistical analysis of a new chaos block cipher for WSN , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[7]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[8]  Kyoji Shibutani,et al.  Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo , 2012, ACISP.

[9]  Kazuhiko Minematsu,et al.  $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.

[10]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[11]  Dirk Westhoff,et al.  Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .

[12]  Wenping Hu,et al.  Design and statistical analysis of a new chaotic block cipher for Wireless Sensor Networks , 2012 .

[13]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[14]  Qiang Zhou,et al.  A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks , 2014, Sensors.

[15]  A. Emre Harmanci,et al.  Biclique cryptanalysis of LBlock and TWINE , 2013, Inf. Process. Lett..