Enhanced Security Protocol in Wireless Sensor Networks
Keywords:data freshness, protocol, security, wireless sensor network
AbstractThe need for security in communications is in fact not new. This need has existed in military communications for thousands of years. In this paper, we focus on network protocols that provide security services. Wireless sensor network is an emerging technology that shows applications both for public as well as military purposes. Monitoring is one of the main applications. A large amount of redundant data is generated by sensor nodes. This paper compares all the protocols which are designed for security of wireless sensor network on the basis of security services and propose an improved protocol that reduces communication overhead by removing data redundancy from the network. By using the message sequence number we can check whether it is old message or new message. If the message is old then no need to send that message thereby reducing overhead. It also integrates security by data freshness in the protocol.
J.P. Walters, Zh. Liang, W. Shi, V. Chaudhary, Security in Distributed, Grid, and Pervasive Computing, Chapter 17, CRC Press, 2006.
A. Perrig, R. Szewczk, J.D. Tygar, V.Wen, D.E. Culler, SPINS: Security Protocols for Sensor Networks, Wireless Networking, Vol. 8, No. 5, pp. 521-534, Sept 2002. http://dx.doi.org/10.1023/A:1016598314198
A. Perrig, R. Canneti, J. D. Tygar, D. Song, The TESLA Broadcast Authentication Protocol, CryptoBytes, Vol. 5, No. 2, pp. 2-13, 2002.
D. Boyle, T. Newe, Security Protocols for use with Wireless Sensor Networks: A Survey of Security Architectures, Proceedings of the 3rd International Conference on Wireless and Mobile Communications, Guadeloupe, French Caribbean, pp. 54, 04-09 March 2007. http://dx.doi.org/10.1109/icwmc.2007.80
S. Madden, M.J. Franklin, J.M. Hellerstein, W. Hong, TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks, Proceedings of the 5th Symposium on Operating System Design and Implementation (OSDI), Boston, Massachusetts, USA, pp. 131-146, 09-11 December 2002. http://dx.doi.org/10.1145/1060289.1060303
S. Madden, R. Szewczyk, M.J. Franklin, D. Culler, Supporting Aggregate Queries Over Ad- Hoc Wireless Sensor Networks, Proceedings of the 4th IEEE Workshop on Mobile Computing and Systems Applications (WMCSA), Callicoon, NY, USA, pp. 49-58, 20-21 June 2002. http://dx.doi.org/10.1109/MCSA.2002.1017485
C. Karlof, N. Sastry, D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks, Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, pp. 162-175, 03-05 November 2004. http://dx.doi.org/10.1145/1031495.1031515
ZigBee Alliance, ZigBee Security Specification Overview, [Online] Available: http://www.zigbee.org/en/events/documents/december2005_open_house_presentations/ zigbee_security_layer_technical_overview.pdf.
J. Heo, C.S. Hong, Efficient and Authenticated Key Agreement Mechanism in Low-Rate WPAN Environment, Proceedings of the 1st IEEE International Symposium on Wireless Pervasive Computing, Phuket, Thailand, pp. 1-5, 16-18 January 2006.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.