Securing sensor networks: A novel approach that combines encoding, uncorrelation and node disjoint transmission

A low area and power secure message transmission module for wireless networks is presented. The proposed solution has three major components: encoding, uncorrelation and transmission along carefully selected node disjoint paths. All three modules are necessary to achieve secure message transmission. Two sets of experimental results were conducted. The first set of experimental results on a network simulator demonstrates the high level of security that the proposed module provides and the second set of experiments shows its low power and area characteristics.

[1]  Nirwan Ansari,et al.  2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[2]  Melvin A. Breuer,et al.  Digital systems testing and testable design , 1990 .

[3]  Eytan Modiano,et al.  Finding Minimum Energy Disjoint Paths in Wireless Ad-Hoc Networks , 2005, Wirel. Networks.

[4]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[5]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[6]  Laurie G. Cuthbert,et al.  QoS in Node-Disjoint Routing for Ad Hoc Networks , 2008, Int. J. Commun. Netw. Syst. Sci..

[7]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[8]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[9]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[10]  Laurie G. Cuthbert,et al.  A reliable node-disjoint multipath routing with low overhead in wireless ad hoc networks , 2004, MSWiM '04.

[11]  Eytan Modiano,et al.  Minimum energy disjoint path routing in wireless ad-hoc networks , 2003, MobiCom '03.

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[14]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[15]  Yair Frankel,et al.  A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.

[16]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[17]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[19]  Jiang Hua,et al.  Pair-Wise Key Pre-Distribution Scheme for Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[20]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[21]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[22]  Mansoor Alam,et al.  Alleviating path correlation using directional antenna in node-disjoint multipath routing for mobile ad hoc networks , 2007, IWCMC.

[23]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[24]  Evangelos Kranakis,et al.  Directional Versus Omnidirectional Antennas for Energy Consumption and k-Connectivity of Networks of Sensors , 2004, OPODIS.

[25]  Spyros Tragoudas,et al.  Security enhancement through multiple path transmission in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[26]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[27]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.