Abstract
A lot of research on wireless sensor network is focused on field of performance, security and energy. Public key cryptography suffers from high computational complexity and overhead, when Symmetric key schemes can be utilized more efficiently in order to provide more security. This paper proposes a more appropriate cryptography scheme for wireless sensor networks in respect of low energy consumption. The proposed security scheme overcomes the limitations of both public-key and symmetric-key protocols. The scheme is utilizes pre-distributed keys to implement data confidentiality service. Special attention has been given to data authenticity. The proposed scheme is suitable for data centric routing using direct diffusion protocols in wireless sensor networks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Rivest, R.L., Shamir, A., Adleman, L.A.: A method for obtaining digital signatures and public-key crypto systems. Communications of the ACM 21(2), 120–126 (1998)
Heinzelman, W., Kulik, J., Balakrishnan, H.: Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. In: Proceedings of the 5th ACM/IEEE Mobicom, pp. 174–185 (August 1999)
Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Micro sensor Networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS 33), pp. 1–10 (2000)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–402 (2001)
Chan, H., Perrig, A., Song, D.: Random key pre distribution schemes for sensor networks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)
Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of WSNA 2003, pp. 151–159 (September 2003)
Di Pietro, R., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.: LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In: Proceedings of the First International Workshop on Wireless Security and Privacy (WiSPr 2003), pp. 397–406 (2003)
Gaubatz, G., Kaps, J.-P., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Lee, J.-Y., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)
Cheng, Y., Agrawal, D.P.: Efficient pair wise key establishment and management in static wireless sensor networks. In: Proceedings of the Second IEEE International Conference on Mobile ad hoc and Sensor Systems, Washington, DC (2005)
Law, Y., Doumen, J., Hartel, P.: Survey and benchmark of Block Cipher for Wireless Sensor Neworks. ACM Transactions on Sensor Networks 2(1), 65–93 (2006)
AL-Rousan, M., Rjoub, A., Baset, A.: A Low-Energy Security Algorithm for Exchanging Information in Wireless Sensor Networks. Journal of Information Assurance and Security 4, 48–59 (2009)
Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA a Scalable Encryption Algorithm for Small Embedded Applications
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mandal, S., Chaki, R. (2012). A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)