Secure Communication for Cluster Based Wireless Sensor Network

Secure communication is a critical issue in wireless sensor network (WSN). Sensor networks are comprised of a huge number of battery operated general purpose sensor nodes with a small number gateway nodes or base stations. Gateways are more authoritative than ordinary sensor nodes. In this paper, an intensive hashing and symmetric key cryptography based approach is proposed to secure data communication in WSN to achieve preservation of data integrity and confidentiality. Results indicate that using this approach there is very small energy consumption in cluster based WSN.

[1]  Mikael J. Simovits The DES : An Extensive Documentation and Evaluation of the Data Encryption Standard , 1996 .

[2]  Chin-Fu Kuo,et al.  A half-key key management scheme for wireless sensor networks , 2011, RACS.

[3]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[4]  Brijesh Kumar Chaurasia,et al.  Secure Congestion Adaptive Routing Using Group Signature Scheme , 2013, Trans. Comput. Sci..

[5]  Shekhar Verma,et al.  Viability of multivariate cryptosystems for WSN , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[6]  Avijit Kar,et al.  Key management in secure self organized wireless sensor network: a new approach , 2011, ICWET.

[7]  Sungyoung Lee,et al.  Public key cryptography-based security scheme for wireless sensor networks in healthcare , 2010, ICUIMC '10.

[8]  Rakesh Maharana,et al.  An Improved Authentication Protocol for Hierarchical Wireless Sensor Networks using ECC , 2013 .

[9]  Fuxiang Gao,et al.  Dynamic window based multihop authentication for WSN , 2010, CCS '10.

[10]  Shekhar Verma,et al.  Dynamic Multi-level Hierarchal Clustering Approach for Wireless Sensor Networks , 2009, 2009 11th International Conference on Computer Modelling and Simulation.

[11]  Hao Chen,et al.  Efficient compromising resilient authentication schemes for large scale wireless sensor networks , 2010, WiSec '10.

[12]  J. Lokesh,et al.  Design of robust and secure encryption scheme for WSN using PKI (LWT-PKI) , 2009, 2009 First International Communication Systems and Networks and Workshops.

[13]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[14]  Mohsen Guizani,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Gaurav Sharma,et al.  A survey and taxonomy of symmetric key management schemes for wireless sensor networks , 2012, CUBE.

[16]  Ayan Kumar Das,et al.  Intelligent Energy Efficient Routing for Ad-Hoc Sensor Network by Designing QCS Protocol , 2011 .

[17]  Satyajit Banerjee,et al.  Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.

[18]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[19]  Zhang Yu The scheme of public key infrastructure for improving wireless sensor networks security , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering.

[20]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[21]  Shekhar Verma,et al.  Two-phase clustering based aggregation of sensor data , 2010, Int. J. Data Min. Model. Manag..