期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2012
卷号:3
期号:5
页码:5285-5290
出版社:TechScience Publications
摘要:The project deals with Designing secure network protocols and cost-efficient, for Wireless Sensor Networks (WSNs). It is a problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor’s energy consumption, Here we introduce a cost efficient based on keying and secure data transmission (CEBKST) scheme for Wireless sensor network that significantly reduces the number of transmissions needed for rekeying to avoid out of dated keys. In addition to the goal of saving energy, minimal transmission is imperative for some military applications of Wireless sensor networks where an adversary could be monitoring the wireless spectrum. CEBKST is a secure communication framework where sensed data is encoded using a scheme based on a permutation code generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific rekeying messages. CEBKST is able to efficiently detect and filter false data injected into the network by malicious outsiders. The CEBKST framework consists of two operational modes, each of which is optimal for different scenarios. In CEBKST-I, each node monitors its one-hop neighbors where CEBKST-II statistically monitors downstream nodes. We have evaluated CEBKST’s feasibility and performance analytically and through simulations. Our results show that CEBKST, without incurring transmission overhead (increasing packet size or sending control messages for rekeying), is able to eliminate malicious data from the network in an energy efficient manner.