CFP last date
20 May 2024
Reseach Article

Pairing based Encoding Schemes (PBES) for Secure Wireless Sensor Networks

by Rohit Vaid, Vijay Katiyar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 17
Year of Publication: 2013
Authors: Rohit Vaid, Vijay Katiyar
10.5120/12163-8232

Rohit Vaid, Vijay Katiyar . Pairing based Encoding Schemes (PBES) for Secure Wireless Sensor Networks. International Journal of Computer Applications. 70, 17 ( May 2013), 43-49. DOI=10.5120/12163-8232

@article{ 10.5120/12163-8232,
author = { Rohit Vaid, Vijay Katiyar },
title = { Pairing based Encoding Schemes (PBES) for Secure Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 17 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number17/12163-8232/ },
doi = { 10.5120/12163-8232 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:08.742355+05:30
%A Rohit Vaid
%A Vijay Katiyar
%T Pairing based Encoding Schemes (PBES) for Secure Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 17
%P 43-49
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to significant advancement in network technology, wireless information gathering communication system has attracted a great attention in recent years. Wireless sensor network (WSN) is also such type of information collecting system which works autonomously with the help of tiny sensors. These tiny sensors form a network in such a way that they not only sense the information but also store this collected information at one place to the super node. This super node is also known as base station. WSNs are easily compromised due to wireless activity and unattended environment. Many secure symmetric key cryptography algorithms such as DES, AES and IDEA are used to achieve information security in the traditional network are not suitable in WSNs due to limited resource and computing constraints sensor nodes. There is currently enormous research potential in the field of wireless sensor network security. In this paper, we have presented a pairing based encoding scheme (PBES). This scheme is based on the pairing method. PBES scheme uses multiple encoding schemes which are very useful in WSNs to achieve security. The use of multiple encoding schemes along with light weight encryption scheme is economical in WSNs than using a heavy cryptography algorithm. The key size used in this method to secure the WSNs is very small. Simulation results show that this scheme is very efficient than any other types of heavy symmetric key cryptography algorithms.

References
  1. Azeem, Md Abdul, Khaleel-ur-Rahman Khan and A. V. Pramod. "Security architecture framework and secure routing protocols in wireless sensor networks-survey. " International Journal of Computer Science & Engineering Survey (IJCSES) Vol 2 (2011).
  2. Araujo, Alvaro, Javier Blesa, Elena Romero and Daniel Villanueva. "Security in cognitive wireless sensor networks. Challenges and open problems. " EURASIP Journal on Wireless Communications and Networking 2012, no. 1 (2012): 1-8.
  3. Prasanna, S. and Srinivasa Rao. "An Overview of Wireless Sensor Networks Applications and Security. " International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307.
  4. Xiong, Xiaokang, Duncan S. Wong and Xiaotie Deng. "TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. " InWireless Communications and Networking Conference (WCNC), 2010 IEEE, pp. 1-6. IEEE, 2010
  5. Wander, Arvinderpal S. , Nils Gura, Hans Eberle, Vipul Gupta and Sheueling Chang Shantz. "Energy analysis of public-key cryptography for wireless sensor networks. " In Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on, pp. 324-328. IEEE, 2005.
  6. Chan, Haowen, Adrian Perrig and Dawn Song. "Random key predistribution schemes for sensor networks. " In Security and Privacy, 2003. Proceedings. 2003 Symposium on, pp. 197-213. IEEE, 2003.
  7. Eschenauer, Laurent and Virgil D. Gligor. "A key-management scheme for distributed sensor networks. " In Proceedings of the 9th ACM conference on Computer and communications security, pp. 41-47. ACM, 2002
  8. Karlsson, Per, Lasse Oberg and Youzhi Xu. "An address coding scheme for wireless sensor networks. " In Proceedings of the 5th Scandinavian Workshop on Wireless Ad-Hoc Networks (ADHOC'05), pp. 3-4. 2005.
  9. Pfletschinger, Stephan, Monica Navarro and Christian Ibars. "Energy-efficient data collection in WSN with network coding. " In GLOBECOM Workshops (GC Wkshps), 2011 IEEE, pp. 394-398. IEEE, 2011.
  10. Kolo, Jonathan Gana, S. Anandan Shanmugam, David Wee Gin Lim, Li-Minn Ang and Kah Phooi Seng. "An Adaptive Lossless Data Compression Scheme for Wireless Sensor Networks. " Journal of Sensors 2012 (2012).
  11. Wang, Jin, Xiumin Wang, Shukui Zhang, Yanqin Zhu and Juncheng Jia. "An Efficient Reliable Communication Scheme in Wireless Sensor Networks Using Linear Network Coding. " International Journal of Distributed Sensor Networks2012 (2012)
  12. Hu, Xiao-Min, Jun Zhang, Yan Yu, HS-H. Chung, Yuan-Long Li, Yu-Hui Shi and Xiao-Nan Luo. "Hybrid genetic algorithm using a forward encoding scheme for lifetime maximization of wireless sensor networks. " Evolutionary Computation, IEEE Transactions on 14, no. 5 (2010): 766-781.
  13. Wang, Tsang-Yi, Yunghsiang S. Han, Biao Chen and Pramod K. Varshney. "A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networks. " Wireless Communications, IEEE Transactions on 5, no. 7 (2006): 1695-1705.
  14. Ali, Nora, Hany ElSayed, Magdi El-Soudani and Hassanein Amer. "Single and Multi Coding Schemes for Efficient Wireless Sensor Networks. " networks 2 (2012): 6.
  15. Standard, N. F. "Data Encryption Standard (DES). " Federal Information Processing Standards Publication (1999).
  16. Robertazzi, Thomas. "Advanced encryption standard (aes). " In Basics of Computer Networking, pp. 73-77. Springer New York, 2012.
  17. Verma, O. P. , Ritu Agarwal, Dhiraj Dafouti and Shobha Tyagi. "Peformance analysis of data encryption algorithms. " In Electronics Computer Technology (ICECT), 2011 3rd International Conference on, vol. 5, pp. 399-403. IEEE, 2011.
  18. W. Stallings, ''Cryptography and Network Security 4th Edition,'' Prentice Hall, 2005, PP. 58-309.
  19. Couture, Nathaniel and Kenneth B. Kent. "The effectiveness of brute force attacks on RC4. " In Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on, pp. 333-336. IEEE, 2004.
  20. El-Fishawy, Nawal and OM Abu Zaid. "Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. "International Journal of Network Security 5, no. 3 (2007): 241-251.
  21. Lenstra, Arjen K. and Eric R. Verheul. "Selecting cryptographic key sizes. "Journal of cryptology 14, no. 4 (2001): 255-293.
Index Terms

Computer Science
Information Sciences

Keywords

PS CPS SPS PBES WSNs