Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks

Basic security of data transmission in battery-powered wireless sensor networks (WSNs) is typically achieved by symmetric-key encryption, which uses little energy; but solar-powered WSNs sometimes have sufficient energy to achieve a higher level of security through public-key encryption. However, if energy input and usage are not balanced, nodes may black out. By switching between symmetric-key and public-key encryption, based on an energy threshold, the level of security can be traded off against the urgency of energy-saving. This policy can also reduce the amount of energy used by some nodes in a WSN, since data encrypted using a public-key is simply relayed by intermediate nodes, whereas data encrypted using a symmetric-key must be decrypted and reencrypted in every node on its path. Through a simulation, we compared the use of either symmetric-key or public-key encryption alone with our scheme, which was shown to be more secure, to use energy more effectively, and to reduce the occurrence of node blackouts.

[1]  Cesare Alippi,et al.  An Adaptive System for Optimal Solar Energy Harvesting in Wireless Sensor Network Nodes , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Mani B. Srivastava,et al.  Harvesting aware power management for sensor networks , 2006, 2006 43rd ACM/IEEE Design Automation Conference.

[4]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[5]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[6]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[7]  Renyong Wu,et al.  A Novel Location-Based Routing Algorithm for Energy Balance in Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[8]  Wei Hong,et al.  A macroscope in the redwoods , 2005, SenSys '05.

[9]  Dong Kun Noh,et al.  SolarStore: enhancing data reliability in solar-powered storage-centric sensor networks , 2009, MobiSys '09.

[10]  Margaret Martonosi,et al.  Implementing software on resource-constrained mobile sensors: experiences with Impala and ZebraNet , 2004, MobiSys '04.

[11]  Heonshik Shin,et al.  Low-Latency Geographic Routing for Asynchronous Energy-Harvesting WSNs , 2008, J. Networks.

[12]  Dong Kun Noh,et al.  Using a dynamic backbone for efficient data delivery in solar-powered WSNs , 2012, J. Netw. Comput. Appl..

[13]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[14]  Heonshik Shin,et al.  QoS-Aware Geographic Routing for Solar-Powered Wireless Sensor Networks , 2007, IEICE Trans. Commun..

[15]  Hartmut Ritter,et al.  Utilizing solar power in wireless sensor networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..

[16]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[17]  David E. Culler,et al.  Design, Modeling, and Capacity Planning for Micro-solar Power Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[18]  Jan M. Rabaey,et al.  A 1.9GHz RF Transmit Beacon using Environmentally Scavenged Energy , 2003 .

[19]  Andrew G. Barto,et al.  Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[20]  J. M. Gilbert,et al.  Comparison of energy harvesting systems for wireless sensor networks , 2008, Int. J. Autom. Comput..

[21]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[22]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[23]  Guevara Noubir,et al.  Secure multicast groups on ad hoc networks , 2003, SASN '03.

[24]  Lars R. Knudsen,et al.  Advanced Encryption Standard (AES) - An Update , 1999, IMACC.

[25]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[26]  David E. Culler,et al.  Perpetual environmentally powered sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[27]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[28]  Robert H. Walden,et al.  Analog-to-digital converter survey and analysis , 1999, IEEE J. Sel. Areas Commun..

[29]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[30]  Dong Kun Noh,et al.  SolarCastalia: Solar Energy Harvesting Wireless Sensor Network Simulator , 2015, Int. J. Distributed Sens. Networks.

[31]  Qun Li,et al.  Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.