Energy Conserving Security Mechanism for Wireless Sensor Network

This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. Sensor networks are emerging fast and will be the next wave towards new network appliances. Security must be justified and ensured before the large scale deployment of sensors as individual sensors are prone to...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hamid, Md. Abdul, Rahman, Md. Mustafizur, Hong, Choong Seon
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 875
container_issue
container_start_page 866
container_title
container_volume
creator Hamid, Md. Abdul
Rahman, Md. Mustafizur
Hong, Choong Seon
description This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. Sensor networks are emerging fast and will be the next wave towards new network appliances. Security must be justified and ensured before the large scale deployment of sensors as individual sensors are prone to security compromise. In the sensor field, an adversary can compromise sensor nodes that can be used to generate random false sensing data. As these generated packets propagate through the network towards final data acquisition point, it will result in the energy consumption in a constrained low powered network. As WSN is multi-hop communication in nature, node-to-node authentication using shared secret is important for legitimate data packets to be forwarded. In this paper, we develop a security mechanism to detect energy-consuming useless data flows that propagate through network. Assuming that a sensor node can sense an event and generates multiple Message Authentication Code (MAC) using secret keys and these MACs are appended to the sensed data. The forwarding nodes along the path towards the data acquisition point verify the validity of the sensed data by checking the authenticity of the MACs attached to the original sensed data. Intuitively, early detection of the false data will make the entire network energy conserving which is one of the primary goals in the design of sensor networks. We have quantified the security strength through analysis and simulation.
doi_str_mv 10.1007/11751588_90
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19968425</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19968425</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-91edb19ac0a3c3675b97a15b87680461986b41cefbbcf8bb4fa6d9afe52dda793</originalsourceid><addsrcrecordid>eNpNkDtPwzAcxM1LopRMfIEsDAwB_-P3BqrKQyowAGK0bMcOoa1T2QXUb09QQeKW0-l3uuEQOgF8DhiLCwDBgEmpFd5BhRKSMIoJxYLSXTQCDlARQtUeOvoDNd9HI0xwXSlBySEqcn7HgwhwScQIXU6jT-2mnPQx-_TZxbZ88u4jdetNee_dm4ldXpahT-Vrl_zC5zzwmIf84NdffZofo4NgFtkXvz5GL9fT58ltNXu8uZtczapVDWpdKfCNBWUcNsQRLphVwgCzUnCJKQcluaXgfLDWBWktDYY3ygTP6qYxQpExOt3urkx2ZhGSia7LepW6pUkbDUpxSWs29M62vTyg2Pqkbd_Pswasfy7U_y4k3ySDXoE</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Energy Conserving Security Mechanism for Wireless Sensor Network</title><source>Springer Books</source><creator>Hamid, Md. Abdul ; Rahman, Md. Mustafizur ; Hong, Choong Seon</creator><contributor>Choo, Hyunseung ; Gavrilova, Marina L. ; Gervasi, Osvaldo ; Taniar, David ; Laganá, Antonio ; Kumar, Vipin ; Tan, C. J. Kenneth ; Mun, Youngsong</contributor><creatorcontrib>Hamid, Md. Abdul ; Rahman, Md. Mustafizur ; Hong, Choong Seon ; Choo, Hyunseung ; Gavrilova, Marina L. ; Gervasi, Osvaldo ; Taniar, David ; Laganá, Antonio ; Kumar, Vipin ; Tan, C. J. Kenneth ; Mun, Youngsong</creatorcontrib><description>This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. Sensor networks are emerging fast and will be the next wave towards new network appliances. Security must be justified and ensured before the large scale deployment of sensors as individual sensors are prone to security compromise. In the sensor field, an adversary can compromise sensor nodes that can be used to generate random false sensing data. As these generated packets propagate through the network towards final data acquisition point, it will result in the energy consumption in a constrained low powered network. As WSN is multi-hop communication in nature, node-to-node authentication using shared secret is important for legitimate data packets to be forwarded. In this paper, we develop a security mechanism to detect energy-consuming useless data flows that propagate through network. Assuming that a sensor node can sense an event and generates multiple Message Authentication Code (MAC) using secret keys and these MACs are appended to the sensed data. The forwarding nodes along the path towards the data acquisition point verify the validity of the sensed data by checking the authenticity of the MACs attached to the original sensed data. Intuitively, early detection of the false data will make the entire network energy conserving which is one of the primary goals in the design of sensor networks. We have quantified the security strength through analysis and simulation.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3540340726</identifier><identifier>ISBN: 9783540340720</identifier><identifier>ISBN: 354034070X</identifier><identifier>ISBN: 9783540340706</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540340744</identifier><identifier>EISBN: 3540340742</identifier><identifier>DOI: 10.1007/11751588_90</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithmics. Computability. Computer arithmetics ; Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Data Packet ; Exact sciences and technology ; Security Mechanism ; Sensor Network ; Sensor Node ; Software ; Theoretical computing ; Wireless Sensor Network</subject><ispartof>Computational Science and Its Applications - ICCSA 2006, 2006, p.866-875</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11751588_90$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11751588_90$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>310,311,780,781,785,790,791,794,4051,4052,27930,38260,41447,42516</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19968425$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Choo, Hyunseung</contributor><contributor>Gavrilova, Marina L.</contributor><contributor>Gervasi, Osvaldo</contributor><contributor>Taniar, David</contributor><contributor>Laganá, Antonio</contributor><contributor>Kumar, Vipin</contributor><contributor>Tan, C. J. Kenneth</contributor><contributor>Mun, Youngsong</contributor><creatorcontrib>Hamid, Md. Abdul</creatorcontrib><creatorcontrib>Rahman, Md. Mustafizur</creatorcontrib><creatorcontrib>Hong, Choong Seon</creatorcontrib><title>Energy Conserving Security Mechanism for Wireless Sensor Network</title><title>Computational Science and Its Applications - ICCSA 2006</title><description>This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. Sensor networks are emerging fast and will be the next wave towards new network appliances. Security must be justified and ensured before the large scale deployment of sensors as individual sensors are prone to security compromise. In the sensor field, an adversary can compromise sensor nodes that can be used to generate random false sensing data. As these generated packets propagate through the network towards final data acquisition point, it will result in the energy consumption in a constrained low powered network. As WSN is multi-hop communication in nature, node-to-node authentication using shared secret is important for legitimate data packets to be forwarded. In this paper, we develop a security mechanism to detect energy-consuming useless data flows that propagate through network. Assuming that a sensor node can sense an event and generates multiple Message Authentication Code (MAC) using secret keys and these MACs are appended to the sensed data. The forwarding nodes along the path towards the data acquisition point verify the validity of the sensed data by checking the authenticity of the MACs attached to the original sensed data. Intuitively, early detection of the false data will make the entire network energy conserving which is one of the primary goals in the design of sensor networks. We have quantified the security strength through analysis and simulation.</description><subject>Algorithmics. Computability. Computer arithmetics</subject><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Data Packet</subject><subject>Exact sciences and technology</subject><subject>Security Mechanism</subject><subject>Sensor Network</subject><subject>Sensor Node</subject><subject>Software</subject><subject>Theoretical computing</subject><subject>Wireless Sensor Network</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>3540340726</isbn><isbn>9783540340720</isbn><isbn>354034070X</isbn><isbn>9783540340706</isbn><isbn>9783540340744</isbn><isbn>3540340742</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpNkDtPwzAcxM1LopRMfIEsDAwB_-P3BqrKQyowAGK0bMcOoa1T2QXUb09QQeKW0-l3uuEQOgF8DhiLCwDBgEmpFd5BhRKSMIoJxYLSXTQCDlARQtUeOvoDNd9HI0xwXSlBySEqcn7HgwhwScQIXU6jT-2mnPQx-_TZxbZ88u4jdetNee_dm4ldXpahT-Vrl_zC5zzwmIf84NdffZofo4NgFtkXvz5GL9fT58ltNXu8uZtczapVDWpdKfCNBWUcNsQRLphVwgCzUnCJKQcluaXgfLDWBWktDYY3ygTP6qYxQpExOt3urkx2ZhGSia7LepW6pUkbDUpxSWs29M62vTyg2Pqkbd_Pswasfy7U_y4k3ySDXoE</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Hamid, Md. Abdul</creator><creator>Rahman, Md. Mustafizur</creator><creator>Hong, Choong Seon</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Energy Conserving Security Mechanism for Wireless Sensor Network</title><author>Hamid, Md. Abdul ; Rahman, Md. Mustafizur ; Hong, Choong Seon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-91edb19ac0a3c3675b97a15b87680461986b41cefbbcf8bb4fa6d9afe52dda793</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Algorithmics. Computability. Computer arithmetics</topic><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Data Packet</topic><topic>Exact sciences and technology</topic><topic>Security Mechanism</topic><topic>Sensor Network</topic><topic>Sensor Node</topic><topic>Software</topic><topic>Theoretical computing</topic><topic>Wireless Sensor Network</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hamid, Md. Abdul</creatorcontrib><creatorcontrib>Rahman, Md. Mustafizur</creatorcontrib><creatorcontrib>Hong, Choong Seon</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hamid, Md. Abdul</au><au>Rahman, Md. Mustafizur</au><au>Hong, Choong Seon</au><au>Choo, Hyunseung</au><au>Gavrilova, Marina L.</au><au>Gervasi, Osvaldo</au><au>Taniar, David</au><au>Laganá, Antonio</au><au>Kumar, Vipin</au><au>Tan, C. J. Kenneth</au><au>Mun, Youngsong</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Energy Conserving Security Mechanism for Wireless Sensor Network</atitle><btitle>Computational Science and Its Applications - ICCSA 2006</btitle><date>2006</date><risdate>2006</risdate><spage>866</spage><epage>875</epage><pages>866-875</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>3540340726</isbn><isbn>9783540340720</isbn><isbn>354034070X</isbn><isbn>9783540340706</isbn><eisbn>9783540340744</eisbn><eisbn>3540340742</eisbn><abstract>This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. Sensor networks are emerging fast and will be the next wave towards new network appliances. Security must be justified and ensured before the large scale deployment of sensors as individual sensors are prone to security compromise. In the sensor field, an adversary can compromise sensor nodes that can be used to generate random false sensing data. As these generated packets propagate through the network towards final data acquisition point, it will result in the energy consumption in a constrained low powered network. As WSN is multi-hop communication in nature, node-to-node authentication using shared secret is important for legitimate data packets to be forwarded. In this paper, we develop a security mechanism to detect energy-consuming useless data flows that propagate through network. Assuming that a sensor node can sense an event and generates multiple Message Authentication Code (MAC) using secret keys and these MACs are appended to the sensed data. The forwarding nodes along the path towards the data acquisition point verify the validity of the sensed data by checking the authenticity of the MACs attached to the original sensed data. Intuitively, early detection of the false data will make the entire network energy conserving which is one of the primary goals in the design of sensor networks. We have quantified the security strength through analysis and simulation.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11751588_90</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Computational Science and Its Applications - ICCSA 2006, 2006, p.866-875
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19968425
source Springer Books
subjects Algorithmics. Computability. Computer arithmetics
Applied sciences
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Data Packet
Exact sciences and technology
Security Mechanism
Sensor Network
Sensor Node
Software
Theoretical computing
Wireless Sensor Network
title Energy Conserving Security Mechanism for Wireless Sensor Network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T07%3A14%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Energy%20Conserving%20Security%20Mechanism%20for%20Wireless%20Sensor%20Network&rft.btitle=Computational%20Science%20and%20Its%20Applications%20-%20ICCSA%202006&rft.au=Hamid,%20Md.%20Abdul&rft.date=2006&rft.spage=866&rft.epage=875&rft.pages=866-875&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=3540340726&rft.isbn_list=9783540340720&rft.isbn_list=354034070X&rft.isbn_list=9783540340706&rft_id=info:doi/10.1007/11751588_90&rft_dat=%3Cpascalfrancis_sprin%3E19968425%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540340744&rft.eisbn_list=3540340742&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true