Lightweight Security Protocol for WiSense based Wireless Sensor Network

Wireless Sensor Networks have emerged as one of the leading technologies. These networks are designed to monitor crucial environmental parameters of humidity, temperature, wind speed, soil moisture content, UV index, sound, etc. and then transfer the required information to the base station. However, security remains the key challenge of such networks as critical data is being transferred. Most sensor nodes currently deployed have constraints on memory and processing power and hence operate without an efficient security protocol. Hereby a protocol which is lightweight and is secure for wireless sensor applications is proposed.

[1]  Gerard O'Regan Texas Instruments , 1964, Nature.

[2]  Pierangela Samarati,et al.  Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. International Workshop, WISTP 2010, Passau, Germany , 2010 .

[3]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.

[4]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[5]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[6]  Kiran A Jadhav,et al.  Wireless Sensor Networks Issues and Applications , 2012 .

[7]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[8]  Ingrid Verbauwhede,et al.  Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs , 2012, SPACE.

[9]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .

[10]  Archana Bharathidasan,et al.  Sensor Networks : An Overview , 2002 .

[11]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[12]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[13]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[14]  Elena Trichina,et al.  Combinational Logic Design for AES SubByte Transformation on Masked Data , 2003, IACR Cryptol. ePrint Arch..

[15]  Aleksi Toivonen Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks , 2007 .