Study of two security constructs on throughput for Wireless Sensor multi-hop Networks

With the interconnection of devices becoming more widespread in society (e.g. internet of things), networked devices are used in a range of environments from smart grids to smart buildings. Wireless Sensor Networks (WSN) have commonly been utilised as a method of monitoring a set processes. In control networks WSN have been deployed to perform a variety of tasks (i.e. collate and distribute data from an event to an end device). However, the nature of the wireless broadcast medium enables attackers to conduct active and passive attacks. Cryptography is selected as a countermeasure to overcome these security vulnerabilities; however, a drawback of using cryptography is reduced throughput. This paper investigates the impact of two software authenticated encryption with associated data (AEAD) security constructs on packet throughput of multiple hop WSN, being counter with cipher block chaining and message authentication code (CCM) and TinyAEAD. Experiments were conducted in a simulated environment. A case scenario is also presented in this paper to emphasise the impact in a real world context. Results observed indicate that the security constructs examined in this paper affect the average throughput measurements up to three hops.

[1]  Xianbin Wang,et al.  Wireless Sensor Network Reliability and Security in Factory Automation: A Survey , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[2]  Z. Xu,et al.  Security mechanism for a wireless-sensor-networkbased healthcare monitoring system , 2012, IET Commun..

[3]  Alin Achim,et al.  2016 Design, Automation & Test in Europe Conference & Exhibition (DATE 2016) , 2016, DATE 2016.

[4]  A. Bouayad,et al.  Wireless sensor network: Security challenges , 2012, 2012 National Days of Network Security and Systems.

[5]  Gregory R. Madey,et al.  Multi-hop communications in a swarm of UAVs , 2013, SpringSim.

[6]  A. A. Adekunle,et al.  An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication , 2012, 2012 Wireless Advanced (WiAd).

[7]  Ali Farrokhtala,et al.  Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[8]  Morris Dworkin,et al.  Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .

[9]  R. J. Farnish,et al.  Simulating and modelling the impact of security constructs on latency for open loop control , 2014, 2014 6th Computer Science and Electronic Engineering Conference (CEEC).

[10]  Hosein Marzi,et al.  A security model for wireless sensor networks , 2014, 2014 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA).

[11]  Reihaneh Safavi-Naini,et al.  Simulation modeling of secure wireless sensor networks , 2009, VALUETOOLS.