Skip to main content

2018 | OriginalPaper | Buchkapitel

Encryption Model for Sensor Data in Wireless Sensor Networks

verfasst von : Anusha Vangala, Pritee Parwekar

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks have become very prevalent in many industries due to its ease of implementation, high performance, and applicability in numerous areas. The widespread use of this technology brings with it the challenge of providing confidentiality to the data that wireless sensor network carries. The challenge is due to the limitation of resources of energy, memory, and computational power. This paper describes a model for encrypting the sensor data after it is collected by the sink from the sensor. This paper discusses the evolution of the model for encrypting this data from a very simplified scheme with a single key to a more sophisticated scheme which performs dual encryption over the data. The models may implement any symmetric cryptographic scheme with the encryption implemented at the sink and the decryption implemented at the base station.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, Ian F., and Mehmet Can Vuran. Wireless sensor networks. Vol. 4. John Wiley & Sons, 2010. Akyildiz, Ian F., and Mehmet Can Vuran. Wireless sensor networks. Vol. 4. John Wiley & Sons, 2010.
2.
Zurück zum Zitat Pathan, Al-Sakib Khan, Hyung-Woo Lee, and ChoongSeon Hong. “Security in wireless sensor networks: issues and challenges.” In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, pp. 6-pp. IEEE, 2006. Pathan, Al-Sakib Khan, Hyung-Woo Lee, and ChoongSeon Hong. “Security in wireless sensor networks: issues and challenges.” In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, vol. 2, pp. 6-pp. IEEE, 2006.
3.
Zurück zum Zitat Kavitha, T., and D. Sridharan. “Security vulnerabilities in wireless sensor networks: A survey.” Journal of information Assurance and Security 5, no. 1 (2010): 31–44. Kavitha, T., and D. Sridharan. “Security vulnerabilities in wireless sensor networks: A survey.” Journal of information Assurance and Security 5, no. 1 (2010): 31–44.
4.
Zurück zum Zitat Zhang, X., Heys, H.M. and Li, C., 2010, May. Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In Communications (QBSC), 2010 25th Biennial Symposium on (pp. 168–172). IEEE. Zhang, X., Heys, H.M. and Li, C., 2010, May. Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks. In Communications (QBSC), 2010 25th Biennial Symposium on (pp. 168–172). IEEE.
5.
Zurück zum Zitat Toldinas, J., et al. “Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices.” Elektronik air Elektrotechnika 108.2 (2011): 11–14. Toldinas, J., et al. “Energy efficiency comparison with cipher strength of AES and Rijndael cryptographic algorithms in mobile devices.” Elektronik air Elektrotechnika 108.2 (2011): 11–14.
6.
Zurück zum Zitat Srivstava, Ankit, and N. RevaththiVenkataraman. “AES-128 performance in tinoys with CBC algorithm (WSN).” International Journal of Engineering Research and Development 7 (2013): 40–49. Srivstava, Ankit, and N. RevaththiVenkataraman. “AES-128 performance in tinoys with CBC algorithm (WSN).” International Journal of Engineering Research and Development 7 (2013): 40–49.
7.
Zurück zum Zitat Du,Xiaojiang, and Hsiao-Hwa Chen. “Security in wireless sensor networks.” IEEE Wireless Communications 15, no. 4 (2008). Du,Xiaojiang, and Hsiao-Hwa Chen. “Security in wireless sensor networks.” IEEE Wireless Communications 15, no. 4 (2008).
8.
Zurück zum Zitat Panda, Madhumita. “Security in wireless sensor networks using cryptographic techniques.” AJER 3 (2014): 50–6. Panda, Madhumita. “Security in wireless sensor networks using cryptographic techniques.” AJER 3 (2014): 50–6.
9.
Zurück zum Zitat Khambre, P. D., S. S. Sambhare, and P. S. Chavan. “Secure data in wireless sensor network via AES (Advanced encryption standard).” (2012). Khambre, P. D., S. S. Sambhare, and P. S. Chavan. “Secure data in wireless sensor network via AES (Advanced encryption standard).” (2012).
10.
Zurück zum Zitat Giruka, Venkata C., MukeshSinghal, James Royalty, and Srilekha Varanasi. “Security in wireless sensor networks.” Wireless communications and mobile computing 8, no. 1 (2008): 1–24.CrossRef Giruka, Venkata C., MukeshSinghal, James Royalty, and Srilekha Varanasi. “Security in wireless sensor networks.” Wireless communications and mobile computing 8, no. 1 (2008): 1–24.CrossRef
11.
Zurück zum Zitat Kumar, Sunil, C. Rama Krishna, and A. K. Solanki. “Time Efficient Public Key Cryptography for Enhancing Confidentiality and Integrity in a Wireless Sensor Network.” International Journal of Computer Science and Network Security (IJCSNS) 17, no. 1 (2017): 81. Kumar, Sunil, C. Rama Krishna, and A. K. Solanki. “Time Efficient Public Key Cryptography for Enhancing Confidentiality and Integrity in a Wireless Sensor Network.” International Journal of Computer Science and Network Security (IJCSNS) 17, no. 1 (2017): 81.
12.
Zurück zum Zitat Khan, Abdullah, Syed Waqar Shah, Abdar Ali, and RizwanUllah. “Secret key encryption model for Wireless Sensor Networks.” In Applied Sciences and Technology (IBCAST), 2017 14th International Bhurban Conference on, pp. 809–815. IEEE, 2017. Khan, Abdullah, Syed Waqar Shah, Abdar Ali, and RizwanUllah. “Secret key encryption model for Wireless Sensor Networks.” In Applied Sciences and Technology (IBCAST), 2017 14th International Bhurban Conference on, pp. 809–815. IEEE, 2017.
Metadaten
Titel
Encryption Model for Sensor Data in Wireless Sensor Networks
verfasst von
Anusha Vangala
Pritee Parwekar
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7512-4_96