ENERGY-EFFICIENT SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS USING FREQUENCY HOPPING AND PERMUTATION CIPHERING

Ismail Mansour, Gérard Chalhoub, Michel Misson

2011

Abstract

The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt critical information. In addition, we propose a time segmentation approach that enables the use of frequency hopping time slotted communications. Nodes secretly exchange frequency hopping sequences that enable them to fight against jamming and eavesdropping. We use permutation ciphering technique to protect the information exchanged between nodes.

References

  1. Akkaya, K. and Younis, M. (2005). A survey on routing protocols for wireless sensor networks. Ad hoc networks, 3:325-349.
  2. Chalhoub, G., Guitton, A., Jacquet, F., Freitas, A., and Misson, M. (2008a). Medium access control for a treebased wireless sensor network: Synchronization management. In IFIP Wireless Days.
  3. Chalhoub, G., Guitton, A., and Misson, M. (2008b). MAC specifications for a WPAN allowing both energy saving and guaranted delay - Part A: MaCARI: a synchronized tree-based mac protocol. In IFIP WSAN.
  4. HART (2008). HART field communication protocol specifications. Technical report, HART Communication Foundation Std.
  5. Hong, P. (2008). Feasibility of pkc in resource-constrained wireless sensor networks. In ICCIT.
  6. IEEE 802.15 (2006). Part 15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs). Standard 802.15.4 R2006, ANSI/IEEE.
  7. ISA (2009). ISA100.11a:2009 wireless systems for industrial automation: Process control and related applications. Draft standard, in preparation, International Society of Automation Std.
  8. Jones, K., Wadaa, A., Oladu, S., Wilson, L., and Eltoweissy, M. (2003). Towards a new paradigm for securing wireless sensor networks. In New Security Paradigms Workshop.
  9. Kavitha1, T. and Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: A survey. Journal of Information Assurance and Security, 5:31-44.
  10. Kerkez, B., Watteyne, T., Magliocco, M., Glaser, S., and Pister, K. (2009). Feasibility analysis of optimal controller design for adaptive channel hopping. In WSNPERF.
  11. Lopez, J. and Dahab, R. (2000). An overview of elliptic curve crytography. Technical report, University of Campinas.
  12. Perrig, A., Szewczyk, R., Tygar, J., Wen, V., and Culler, D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks.
  13. Pister, K. and Lance, D. (2006). TSMP: time synchronized mesh protocol. In Distributed sensor networks.
  14. Watteyne, T., Mehta, A., and Pister, K. (2009). Reliability through frequency diversity: Why channel hopping makes sense. In PE-WASUN.
  15. Zigbee (2008). Zigbee Specification. Zigbee Standard 053474r17, ZigBee Standards Organization.
Download


Paper Citation


in Harvard Style

Mansour I., Chalhoub G. and Misson M. (2011). ENERGY-EFFICIENT SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS USING FREQUENCY HOPPING AND PERMUTATION CIPHERING . In Proceedings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8425-48-5, pages 277-282. DOI: 10.5220/0003371302770282


in Bibtex Style

@conference{peccs11,
author={Ismail Mansour and Gérard Chalhoub and Michel Misson},
title={ENERGY-EFFICIENT SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS USING FREQUENCY HOPPING AND PERMUTATION CIPHERING },
booktitle={Proceedings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2011},
pages={277-282},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003371302770282},
isbn={978-989-8425-48-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - ENERGY-EFFICIENT SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS USING FREQUENCY HOPPING AND PERMUTATION CIPHERING
SN - 978-989-8425-48-5
AU - Mansour I.
AU - Chalhoub G.
AU - Misson M.
PY - 2011
SP - 277
EP - 282
DO - 10.5220/0003371302770282