Title :
Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs
Author :
Saleem, Kashif ; Khalil, Mohammed S. ; Fisal, Norsheila ; Ahmed, A. Abdelbaky ; Orgun, Mehmet A.
Author_Institution :
Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ. (KSU), Riyadh, Saudi Arabia
Abstract :
Wireless sensor networks (WSNs) consists of numerous tiny wireless sensor nodes to communicate with each other with limited resources. The resource limitations and vulnerabilities of wireless sensor node expose the network to suffer with numerous attacks. The WSN constraints and limitations should be taken under consideration while designing the security mechanism. The recent Biological inspired self-organized secure autonomous routing protocol (BIOSARP) requires certain amount of time at initialization phase of WSN deployment to develop overall network knowledge. Initialization phase is a critical stage in the overall life span of WSN that requires an efficient active security measures. Therefore, in this paper we propose E-BIOSARP that enhances the BIOSARP with random key encryption and decryption mechanism. We present the design, pseudo code and the simulation results to prove the efficiency of E-BIOSARP for WSN. Network simulator 2 (NS2) has been utilized to perform the analysis. Our result shows that proposed E-BIOSARP can efficiently protect WSN from spoofed, altered or replayed routing information attacks, selective forwarding, acknowledgement spoofing, sybil attack and hello flood attack.
Keywords :
cryptography; data communication; routing protocols; telecommunication security; wireless sensor networks; E-BIOSARP; NS2; WSN constraints; WSN deployment; acknowledgement spoofing; active security measures; biological inspired selforganized secure autonomous routing protocol; data packet confidentiality; decryption mechanism; efficient random key based encryption system; hello flood attack; initialization phase; network simulator 2; pseudo code; random key encryption; routing information attacks; security mechanism; selective forwarding; sybil attack; wireless sensor networks; wireless sensor nodes; Authentication; Encryption; Routing; Wireless communication; Wireless sensor networks; Authentication; Decryption; Encryption; Human Immune Blood Brain Barrier; Malicious; Multihop; Random Key; Routing; Secure; Wireless Sensor Network;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
DOI :
10.1109/TrustCom.2013.206