CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Efficient Key Distribution Scheme in Wireless Sensor Architecture with Arduino and XBee

by A. F. M. Sultanul Kabir
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 12
Year of Publication: 2018
Authors: A. F. M. Sultanul Kabir
10.5120/ijca2018917702

A. F. M. Sultanul Kabir . An Efficient Key Distribution Scheme in Wireless Sensor Architecture with Arduino and XBee. International Journal of Computer Applications. 181, 12 ( Aug 2018), 15-18. DOI=10.5120/ijca2018917702

@article{ 10.5120/ijca2018917702,
author = { A. F. M. Sultanul Kabir },
title = { An Efficient Key Distribution Scheme in Wireless Sensor Architecture with Arduino and XBee },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2018 },
volume = { 181 },
number = { 12 },
month = { Aug },
year = { 2018 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number12/29824-2018917702/ },
doi = { 10.5120/ijca2018917702 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:05:48.192312+05:30
%A A. F. M. Sultanul Kabir
%T An Efficient Key Distribution Scheme in Wireless Sensor Architecture with Arduino and XBee
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 12
%P 15-18
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Since the time of their introduction, Wireless Sensor Networks (WSN) have been catching the interest of researchers. WSN have a wide range of applications, some even involving sensitive and secret information, thereby raising security concerns. Nevertheless, WSN have some constraints like limited memory, energy and computational capability, which pose an obstacle for the addition of proper security in sensor nodes. This paper introduces a new rekeying design for WSN security framework whose implementation would dispense effective security in the sensor nodes. This proposed security framework is endowed with the capacity to address security issues, such as message integrity, confidentiality, authenticity and freshness based on symmetric key cryptography. In addition, this design does not allow the storage of any key except the initial master key in the sensor nodes prior to network deployment. This paper also investigates reconfigurable sensor nodes in terms of execution time, memory, power consumption, and cost while running the security framework.

References
  1. B. Dutertre, S. Cheung, and J. Levy, “Lightweight key management in wireless sensor networks by leveraging initial trust,” tech. rep., Technical Report SRI-SDL-04-02, SRI International, 2004..
  2. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47, ACM, 2002.
  3. A.-N. Shen, S. Guo, and H.-Y. Chien, “An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks,” in Sarnoff Symposium, 2009. SARNOFF’09. IEEE, pp. 1–5, IEEE, 2009
  4. A. Herrera and W. Hu, “A key distribution protocol for wireless sensor networks,” in Proceedings of the 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012), pp. 140–143, IEEE Computer Society, 2012.
  5. D. K. Nilsson, T. Roosta, U. Lindqvist, and A. Valdes, “Key management and secure software updates in wireless process control environments,” in Proceedings of the first ACM conference on Wireless network security, pp. 100–108, ACM, 2008..
  6. W. Hu, H. Tan, P. Corke, W. C. Shih, and S. Jha, “Toward trusted wireless sensor networks,” ACM Transactions on Sensor Networks (TOSN), vol. 7, no. 1, p. 5, 2010.
  7. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and rsa on 8-bit cpus,” in Cryptographic Hardware and Embedded Systems-CHES 2004, pp. 119–132, Springer, 2004.
  8. R. Watro, D. Kong, S.-f. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “Tinypk: securing sensor networks with public key technology,” in Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59–64, ACM, 2004.
  9. M. Luk, G. Mezzour, A. Perrig, and V. Gligor, “Minisec: a secure sensor network communication architecture,” in Proceedings of the 6th international conference on Information processing in sensor networks, pp. 479–488, ACM, 2007.
  10. C. Karlof, N. Sastry, and D. Wagner, “Tinysec: a link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd international conference on Embedded networked sensor systems, pp. 162–175, ACM, 2004
  11. A. Liu and P. Ning, “Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks,” in Information Processing in Sensor Networks, 2008. IPSN’08. International Conference on, pp. 245–256, IEEE, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

WSN rekeying security symmetric cryptography