2 research outputs found

    SEAD: source encrypted authentic data for wireless sensor networks

    Get PDF
    One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms

    Certificate-based pairwise key establishment protocol for wireless sensor networks

    Full text link
    In order to guarantee the privacy and safety of data transactions in Wireless Sensor Networks (WSNs), secure key transportation and unique node identification have become major concerns. WSNs are deployed in a wide range of applications with a high demand for secure communications. When designing a secure key management protocol for WSNs, special attention should be given to the resource constraints of the devices and the scalability of the network. In this paper, we exploit public-key nature protocols to define a hybrid key establishment algorithm for symmetric key cryptography. We propose an Elliptic Curve Cryptography based implicit certificate scheme and show how to utilize the certificates for deriving pair-wise link keys in a WSN. By a performance and security analysis, we justify that the proposed scheme is well fitting with the functional and architectural features of WSNs. Both experimental results and theoretical analysis show that the proposed key establishment protocol is viable to deploy in a real-time WSN application
    corecore