Open Access   Article Go Back

Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet

V.Gayathri 1 , Y.S. Kumarswamy2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 438-448, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.438448

Online published on Mar 31, 2019

Copyright © V.Gayathri, Y.S. Kumarswamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V.Gayathri, Y.S. Kumarswamy, “Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.438-448, 2019.

MLA Style Citation: V.Gayathri, Y.S. Kumarswamy "Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet." International Journal of Computer Sciences and Engineering 7.3 (2019): 438-448.

APA Style Citation: V.Gayathri, Y.S. Kumarswamy, (2019). Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet. International Journal of Computer Sciences and Engineering, 7(3), 438-448.

BibTex Style Citation:
@article{Kumarswamy_2019,
author = {V.Gayathri, Y.S. Kumarswamy},
title = {Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {438-448},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3859},
doi = {https://doi.org/10.26438/ijcse/v7i3.438448}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.438448}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3859
TI - Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet
T2 - International Journal of Computer Sciences and Engineering
AU - V.Gayathri, Y.S. Kumarswamy
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 438-448
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
228 167 downloads 104 downloads
  
  
           

Abstract

The Internet of Things (IoT) revolution has also impacted Wireless Sensor Networks (WSNs), and due to which, the WSNs are being increasingly coupled with IP network. The security issues which are prevalent in the IP network have to be addressed by these IoT based WSNs. Recently, in the literature, encryption of data packets through 3 Data Encryption Standard (3DES) technique was presented to cater data packet encryption requirements in IoT based WSNs. However, this encryption technique is impractical for WSNs because the sensor nodes operate with limited energy reserves, and 3DES technique is computationally expensive technique. The main open issue is to perform 3DES data packet encryption by incurring limited energy expenditure. To address this open issue, in this paper, a new 3DES data packet encryption scheme denoted as Neighbor Node Cooperation (NNC) scheme is presented. In the NNC scheme, the encryption load of the source node is distributed among its neighbor nodes. Selection of the most suitable neighbor nodes for the NNC scheme is modeled as an optimization problem, which is shown to have non-polynomial complexity. Hence, this optimization problem is approximately solved using randomized algorithm. The formal performance bounds of the randomized algorithm are outlined. The proposed encryption scheme is simulated and compared against the contemporary technique presented in the literature. In the outlined simulation study, the proposed encryption technique significantly outperforms the contemporary technique WRT incurred energy expenditure for data packet encryption.

Key-Words / Index Term

WSN, 3DES, Encryption, IoT

References

[1] J. A. Stankovic, “Research directions for the Internet of Things,” IEEE Internet Things J., vol. 1, no. 1, pp. 3–9, Feb. 2014.
[2] P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, “Wireless sensor networks: A survey on recent developments and potential synergies,” J. Supercomput., vol. 68, no. 1, pp. 1–48, 2014.
[3] R. Rajkumar, I. Lee, L. Sha, and J. Stankovic, “Cyber-physical systems: The next computing revolution,” in Proc. 47th Design Autom. Conf., Anaheim, CA, USA, 2010, pp. 731–736.
[4] F. Mattern and C. Floerkemeier, “From the Internet of computers to the Internet of Things,” in From Active Data Management to Event-Based Systems and More. Berlin, Germany: Springer, 2010, pp. 242–259.
[5] Y. Mo et al., “Cyber-physical security of a smart grid infrastructure,” Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.
[6] S. Ali et al., “Network challenges for cyber physical systems with tiny wireless devices: A case study on reliable pipeline condition monitoring,” Sensors, vol. 15, no. 4, pp. 7172–7205, 2015.
[7] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of security issues, challenges, and open problems in the Internet of Things,” in Proc. IEEE World Congr. Services, New York, NY, USA, 2015, pp. 21–28.
[8] S. Sicari, A. Rizzardia, L. A. Griecob, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Comput. Netw.,vol. 76, pp. 146–164, Jan. 2015.
[9] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2–23, 2nd Quart., 2006.
[10] C. M. Medaglia and A. Serbanati, “An overview of privacy and security issues in the Internet of Things,” in The Internet of Things. New York, NY, USA: Springer, 2010.
[11] J. S. Kumar and D. R. Patel, “A survey on Internet of Things: Security and privacy issues,” Int. J. Comput. Appl., vol. 90, no. 11, pp. 20–26, 2014.
[12] J. Lin et al., “A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications,” IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2683200.
[13] J. Granjal, E. Monteiro, and J. S. Silva, “Security for the Internet of Things: A survey of existing protocols and open research issues,” IEEE Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294–1312, 3rd Quart., 2015.
[14] A. Bröring et al., “New generation sensor Web enablement,” Sensors, vol. 11, no. 3, pp. 2652–2699, 2011.
[15] K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for self organization of a wireless sensor network,” IEEE Pers. Commun., vol. 7, no. 5, pp. 16–27, Oct. 2000.
[16] “International electrotechnical commission, Internet of Things: Wireless sensor networks,” White Paper, 2014.
[17] G. S. Prathamesh, G. D. Sanket, K. D. Yogeshwar, and N. K. Aniket, “Secure Data Transmission in WSN using 3DES with Honey Encryption”, IJARIIE, vol. 1, pp. 455-461, 2015.
[18] C. P. O’Flynn, “Message denial and alteration on IEEE 802.15.4 low power radio networks,” in Proc. 4th IFIP Int. Conf. New Technol.Mobility Security, Paris, France, 2011, pp. 1–5.
[19] Y. Xiao, S. Sethi, H.-H. Chen, and B. Sun, “Security services and enhancements in the IEEE 802.15.4 wireless sensor networks,” in Proc. IEEE Glob. Telecommun. Conf., St. Louis, MO, USA, 2005, pp. 1976–1980.
[20] Y. W. Law et al., “Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols,” ACM Trans. Sensor Netw.,vol. 5, no. 1, 2009, Art. no. 6.
[21] D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, “Effects of denial-of-sleep attacks on wireless sensor network MAC protocols,” IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 367–380, Jan. 2009.
[22] H. Kim, “Protection against packet fragmentation attacks at 6LoWPAN adaptation layer,” in Proc. Int. Conf. Converg. Hybrid Inf. Technol., Daejeon, South Korea, 2008, pp. 796–801.
[23] R. Hummen et al., “6LoWPAN fragmentation attacks and mitigation mechanisms,” in Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw., Budapest, Hungary, 2013, pp. 55–66.
[24] L. M. L. Oliveira, J. J. P. C. Rodrigues, A. F. de Sousa, and J. Lloret, “A network access control framework for 6LoWPAN networks,” Sensors, vol. 13, no. 1, pp. 1210–1230, 2013.
[25] E. J. Cho, J. H. Kim, and C. S. Hong, “Attack model and detection scheme for botnet on 6LoWPAN,” in Proc. 12th Asia–Pac. Netw. Oper.Manag. Conf., Jeju-do, South Korea, 2009, pp. 515–518.
[26] L. Wallgren, S. Raza, and T. Voigt, “Routing attacks and countermeasures in the RPL-based Internet of Things,” Int. J. Distrib. Sensor Netw., vol. 9, no. 8, pp. 1–11, 2013.
[27] K. Heurtefeux, O. Erdene-Ochir, N. Mohsin, and H. Menouar, “Enhancing RPL resilience against routing layer insider attacks,” in Proc. IEEE 29th Int. Conf. Adv. Inf. Netw. Appl., Gwangju, South Korea, 2015, pp. 802–807.
[28] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Netw., vol. 11, no. 8, pp. 2661–2674, 2013.
[29] F. I. Khan, T. Shon, T. Lee, and K. Kim, “Wormhole attack prevention mechanism for RPL based LLN network,” in Proc. 5th Int. Conf.Ubiquitous Future Netw., 2013, pp. 149–154.
[30] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, “Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach,” in Proc. IEEE Wireless Commun. Netw. Conf., vol. 2. New Orleans, LA, USA, 2005, pp. 1193–1199.
[31] E. C. H. Ngai, J. Liu, and M. R. Lyu, “On the intruder detection for sinkhole attack in wireless sensor networks,” in Proc. IEEE Int. Conf.Commun., Istanbul, Turkey, 2006, pp. 3383–3389.
[32] K. Weekly and K. Pister, “Evaluating sinkhole defense techniques in RPL networks,” in Proc. 20th IEEE Int. Conf. Netw. Protocols, Austin, TX, USA, 2012, pp. 1–6.
[33] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: Analysis & defenses,” in Proc. 3rd Int. Symp. Inf. Process.Sensor Netw., Berkeley, CA, USA, 2004, pp. 259–268.
[34] J. Hui and J. P. Vasseur, “The routing protocol for low-power and lossy networks (RPL) option for carrying RPL information in data-plane datagrams,” Internet Eng. Task Force, Fremont, CA, USA, RFC 6553, 2012. [Online]. Available: https://tools.ietf.org/html/rfc6553
[35] A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, and J. Schönwälder, “Addressing DODAG inconsistency attacks in RPL networks,” in Proc.Glob. Inf. Infrastruct. Netw. Symp., Montreal, QC, Canada, 2014, pp. 1–8.
[36] A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder, “Mitigation of topological inconsistency attacks in RPL-based lowpower lossy networks,” Int. J. Netw. Manag., vol. 25, no. 5, pp. 320–339, 2015.
[37] A. Dvir, T. Holczer, and L. Buttyan, “VeRA—Version number and rank authentication in RPL,” in Proc. IEEE 8th Int. Conf. Mobile Ad Hoc Sensor Syst., Valencia, Spain, 2011, pp. 709–714.
[38] M. Landsmann, M. Wahlisch, and T. C. Schmidt, “Topology authentication in RPL,” in Proc. IEEE Conf. Comput. Commun. Workshops, Turin, Italy, 2013, pp. 73–74.
[39] R. Venkataraman, S. Moeller, B. Krishnamachari, and T. R. Rao, “Trustbased backpressure routing in wireless sensor networks,” Int. J. Sensor Netw., vol. 17, no. 1, pp. 27–39, 2015.
[40] Z. Lu, Y. E. Sagduyu, and J. H. Li, “Securing the backpressure algorithm for wireless networks,” IEEE Trans. Mobile Comput., vol. 16, no. 4, pp. 1136–1148, Apr. 2017.
[41] F.-J. Shang, C. Li, and J.-L. Qin, “Improvement of approach to detect sinkhole attacks in wireless sensor networks,” in Computer, Intelligent Computing and Education Technology. Boca Raton, FL, USA: CRC Press, 2014, pp. 695–698.
[42] P. Pecho, P. Hanacek, and J. Nagy, “Simulation and evaluation of CTP and secure-CTP protocols,” Radioengineering, vol. 19, no. 1, pp. 89–99, 2010.
[43] S. Sultana, D. Midi, and E. Bertino, “Kinesis: A security incident response and prevention system for wireless sensor networks,” in Proc. 12th ACM Conf. Embedded Netw. Sensor Syst., Memphis, TN, USA, 2014, pp. 148–162.