Figure 3 compares the energy consumption
required to secure communications using our
method or dynamic secret. Showing that it need to
consume 0.09 joule of energy for our method and
0.122 joule energy for dynamic secret at 40s. Our
method consumes 78 percent of energy by dynamic
secret. Figure 3 shows that our method consumes
less energy than dynamic secret in the case of
security.
Our method demonstrated the effectiveness of
its protocol, showing itself to be far more scalable
than dynamic secret. A clear trend is shown, in
which our method more slowly increases in the
numbers of updates and energy consumption
compared to dynamic secret.
6 CONCLUSIONS
A novel key update approach to enhance the
security of a multi-hop wireless sensor networks,
when eavesdropped by attacker. The primary
focus is to update the key dynamically based on
data packet loss rate that allows expedient,
reliable communication with confidentiality,
integrity and authenticity services. This model
accounts for the end-to-end retransmission and the
local retransmission of the link layer, which
improves the security of data packets transmission
in the multi-hop networks. Our solution is to
generate a series of hash values from the
communication process, and apply these hash
values to constantly update the key. The adversary
is uncertain about dynamic secret. Moreover, it
does not know whether the dynamic key in the
transmission has updated. As the transmission of
data packets goes on, communication security
keeping replenishing itself as if the wireless
communication system has powerful function to
resist attacks.
ACKNOWLEDGEMENTS
The authors thank the anonymous referees for
suggestions that helped improve the paper
substantially. The project is partly sponsored by the
National Natural Science Foundation of China
(No.61873221, No.61672447), the Natural Science
Foundation of Hunan Province (No.2018JJ4058,
No.2017JJ5036), Hunan province science and
technology project funds (No.2018TP1036), and the
CERNET Next Generation Internet Technology
Innovation Project (No.NGII20160305,
No.NGII20170109).
REFERENCES
Akyildiz I F., Su W., Sankarasubramaniam Y., et al., 2002
A survey on sensor networks[J]. IEEE
Communications magazine.
Yick J., Mukherjee B., Ghosal D., 2008. Wireless sensor
network survey[J]. Computer networks.
Kavitha T., Sridharan D., 2010. Security vulnerabilities in
wireless sensor networks: A survey[J]. Journal of
information Assurance and Security.
Singh S., Verma H K., 2011. Security for wireless sensor
network[J]. International Journal on Computer
Science and Engineering.
Gaubatz G., Kaps J P., Sunar B., 2004. Public Key
Cryptography in Sensor Networks--Revisited[C] ESAS.
Watro R., Kong D., Cuti S., et al., 2004. TinyPK: securing
sensor networks with public key technology[C]
Proceedings of the 2nd ACM workshop on Security of
ad hoc and sensor networks. ACM.
Wang Y., Attebury G., Ramamurthy B., 2006 A survey of
security issues in wireless sensor networks[J].
Wander A S., Gura N., Eberle H., et al., 2005. Energy
analysis of public-key cryptography for wireless
sensor networks[C]Pervasive Computing and
Communications, 2005. PerCom 2005. Third IEEE
International Conference on. IEEE.
Gaubatz G., Kaps J P., Ozturk E, et al., 2005. State of the
art in ultra-low power public key cryptography for
wireless sensor networks[C]//Pervasive Computing
and Communications Workshops, 2005. PerCom 2005
Workshops. Third IEEE International Conference on.
IEEE.
Liu D., Ning P., Li R., 2005. Establishing pairwise keys in
distributed sensor networks[J]. ACM Transactions on
Information and System Security (TISSEC).
Wang H., Sheng B., Tan C C., et al., 2008. Comparing
symmetric-key and public-key based security schemes
in sensor networks: A case study of user access
control[C]//Distributed Computing Systems, 2008.
ICDCS'08. The 28th International Conference on.
IEEE.
Xiao Y., Rayi V K., 2007. Sun B, et al. A survey of key
management schemes in wireless sensor networks[J].
Computer communications.
Xiao S., Gong W., 2010. Mobility can help: protect user
identity with dynamic credential[C]//Mobile Data
Management (MDM), 2010 Eleventh International
Conference on.
Xiao S., Gong W., 2010. Towsley D. Secure wireless
communication with dynamic secrets[C] INFOCOM,
2010 Proceedings IEEE.
Olsén J., 2003. On Packet Loss Rates used for TCP
Network Modeling[J]. Mathematical Statistics.