Energy efficient security protocol for wireless sensor networks

@article{am2003EnergyES,
  title={Energy efficient security protocol for wireless sensor networks},
  author={Hasan Çam and Suat Ozdemir and Devasenapathy Muthuavinashiappan and Prashant Nair},
  journal={2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)},
  year={2003},
  volume={5},
  pages={2981-2984 Vol.5}
}
  • H. Çam, S. Ozdemir, P. Nair
  • Published 2003
  • Computer Science
  • 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)
Wireless sensor networks consist of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. Asymmetric cryptographic algorithms are not suitable for providing security on wireless sensor networks due to limited computation, power, and storage resources available on sensor nodes. Therefore, the energy-efficient security protocol proposed in this paper uses symmetric cryptographic algorithms to support security. To mitigate the drawbacks of… 

Figures and Tables from this paper

A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks

TLDR
Issues associated with the development of secure IEEE 802.15.4 based wireless sensor networks (WSNs) are investigated and the relationships between network security and network lifetime limited by often insufficient resources of network nodes are explained.

Low Energy Consumption Security Method for Protecting Information of Wireless Sensor Network

TLDR
This paper proposes the energy efficient security method which uses relative coordinate instead of physical coordinate to reduce the energy consumption.

Security in wireless sensor networks

TLDR
The state of the art in research on sensor network security is surveyed, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply.

Light Weight Security Protocol for Wireless Sensor Network’s (WSN)

TLDR
To minimize attacks, Light Weight Security Protocol is developed, which deals with protecting communication among network devices, as well as contrasting logical and physical attacks at different layers.

A security framework for wireless sensor networks

  • T. ZiaAlbert Y. Zomaya
  • Computer Science
    Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006.
  • 2006
TLDR
In this paper, a security framework is introduced to address the special security needs of tiny sensor nodes and sensor networks as a whole and focuses on three areas: cluster formation, secure key management scheme, and a secure routing algorithm.

Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks

TLDR
This paper presents the design of secure-SPIN, a secure extension for the SPIN protocol, and shows that this secure protocol may increase the data communication security in wireless sensor networks.

Security Optimization and Data Classification in Wireless Sensor Networks

TLDR
An optimization algorithm using genetic algorithms for secure transmission is proposed for WSNs and different classification algorithms are experimented to find an efficient, fast and accurate sensor data classification algorithm.

esGate: Secure embedded gateway system for a wireless sensor network

TLDR
The esGate is capable of achieving original purposes of wireless sensor network gateway with enhanced security properties which are securely gathering and transmitting information such as sensor events, control commands and security data from wireless sensor nodes to applications, and vice versa.

Efficient Mechanisms for Secure Wireless Sensor Network- A Survey

TLDR
This paper discussed and compared the different mechanisms providing security in WSN and suggested ways to improve the security of wireless sensor network during data transmission.

A lightweight secure architecture for wireless sensor networks

TLDR
A secure lightweight architecture that takes account of the constraints of sensor networks is proposed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary and supports the detection and isolation of aberrant nodes.
...

References

SHOWING 1-10 OF 14 REFERENCES

SPINS: Security Protocols for Sensor Networks

TLDR
A suite of security protocols optimized for sensor networks: SPINS, which includes SNEP and μTESLA and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network.

Security for Sensor Networks

TLDR
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.

ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks

TLDR
Simulations results show that as data redundancy increases, the amount of data transmitted from sensor nodes to cluster-head decreases up to 45% when compared to conventional algorithms.

CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY

TLDR
This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints.

Dynamic Power Management in Wireless Sensor Networks

TLDR
It is argued that power-aware methodology uses an embedded microoperating system to reduce node energy consumption by exploiting both sleep state and active power management.

Fast Software Encryption

TLDR
Simplified variants that omit a quadratic function and a fixed rotation in RC6 are examined to clarify their essential contribution to the overall security of RC6.

TEA, a Tiny Encryption Algorithm

We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.

Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems

  • H. Çam
  • Computer Science
    Comput. Commun.
  • 2003

Wireless networks of millimeter-scale sensor nodes

  • Wireless networks of millimeter-scale sensor nodes
  • 1999