Skip to main content

A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

A lot of research on wireless sensor network is focused on field of performance, security and energy. Public key cryptography suffers from high computational complexity and overhead, when Symmetric key schemes can be utilized more efficiently in order to provide more security. This paper proposes a more appropriate cryptography scheme for wireless sensor networks in respect of low energy consumption. The proposed security scheme overcomes the limitations of both public-key and symmetric-key protocols. The scheme is utilizes pre-distributed keys to implement data confidentiality service. Special attention has been given to data authenticity. The proposed scheme is suitable for data centric routing using direct diffusion protocols in wireless sensor networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rivest, R.L., Shamir, A., Adleman, L.A.: A method for obtaining digital signatures and public-key crypto systems. Communications of the ACM 21(2), 120–126 (1998)

    Article  MathSciNet  Google Scholar 

  2. Heinzelman, W., Kulik, J., Balakrishnan, H.: Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. In: Proceedings of the 5th ACM/IEEE Mobicom, pp. 174–185 (August 1999)

    Google Scholar 

  3. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Micro sensor Networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS 33), pp. 1–10 (2000)

    Google Scholar 

  4. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–402 (2001)

    Article  Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Random key pre distribution schemes for sensor networks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  6. Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and modeling encryption overhead for sensor network nodes. In: Proceedings of WSNA 2003, pp. 151–159 (September 2003)

    Google Scholar 

  7. Di Pietro, R., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.: LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In: Proceedings of the First International Workshop on Wireless Security and Privacy (WiSPr 2003), pp. 397–406 (2003)

    Google Scholar 

  8. Gaubatz, G., Kaps, J.-P., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Lee, J.-Y., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Cheng, Y., Agrawal, D.P.: Efficient pair wise key establishment and management in static wireless sensor networks. In: Proceedings of the Second IEEE International Conference on Mobile ad hoc and Sensor Systems, Washington, DC (2005)

    Google Scholar 

  12. Law, Y., Doumen, J., Hartel, P.: Survey and benchmark of Block Cipher for Wireless Sensor Neworks. ACM Transactions on Sensor Networks 2(1), 65–93 (2006)

    Article  Google Scholar 

  13. AL-Rousan, M., Rjoub, A., Baset, A.: A Low-Energy Security Algorithm for Exchanging Information in Wireless Sensor Networks. Journal of Information Assurance and Security 4, 48–59 (2009)

    Google Scholar 

  14. Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA a Scalable Encryption Algorithm for Small Embedded Applications

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanta Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mandal, S., Chaki, R. (2012). A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics