[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Adaptive security in ODMAC for multihop energy harvesting wireless sensor networks

Published: 01 January 2015 Publication History

Abstract

Energy Harvesting Wireless Sensor Networks (EH-WSNs) represent an interesting new paradigm where individual nodes forming a network are powered by energy sources scavenged from the surrounding environment. This technique provides numerous advantages, but also new design challenges. Securing the communications under energy constraints represents one of these key challenges. The amount of energy available is theoretically infinite in the long run but highly variable over short periods of time, and managing it is a crucial aspect. In this paper we present an adaptive approach for security in multihop EH-WSNs which allows different nodes to dynamically choose the most appropriate energy-affecting parameters such as encryption algorithm and key size, providing in this way energy savings. In order to provide evidence of the approach's feasibility in a real-world network, we have designed and implemented it as extension of on-demand medium access control (ODMAC), a receiver-initiated (RI) MAC protocol specifically designed and developed to address the foundational energy-related needs of Energy Harvesting Wireless Sensor Networks.

References

[1]
A. Di Mauro, D. Papini, and N. Dragoni, "Security challenges for energy-harvesting wireless sensor networks," in Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems (PECCS '12), pp. 422- 425, SciTePress, 2012.
[2]
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom '05), pp. 324-328, 2005.
[3]
X. Fafoutis and N. Dragoni, "ODMAC: an on-demand mac protocol for energy harvesting--wireless sensor networks," in Proceedings of the 8th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN '11), pp. 49-56, ACM, November 2011.
[4]
X. Fafoutis, A. Di Mauro, and N. Dragoni, "Sustainable medium access control: implementation and evaluation of ODMAC," in Proceedings of the 4th Workshop on Energy Efficiency in Wireless Networks and Wireless Networks for Energy Efficiency (E2Nets '13), pp. 407-412, 2013.
[5]
X. Fafoutis, A. Di Mauro, M. D. Vithanage, and N. Dragoni, "Receiver-initiated medium access control protocols for wireless sensor networks," Computer Networks, vol. 76, pp. 55-74, 2015.
[6]
E.-Y. A. Lin, J. M. Rabaey, and A. Wolisz, "Power-efficient Rendez-vous schemes for dense wireless sensor networks," in Proceedings of the IEEE International Conference on Communications (ICC '04), vol. 7, pp. 3769-3776, IEEE, June 2004.
[7]
A. Kansal, J. Hsu, S. Zahedi, and M. B. Srivastava, "Power management in energy harvesting sensor networks," ACM Transactions on Embedded Computing Systems, vol. 6, no. 4, article 32, 2007.
[8]
X. Fafoutis, A. di Mauro, and N. Dragoni, "Sustainable performance in energy harvesting: wireless sensor networks," in Proceedings of the 4th International Conference on Future Energy Systems (e-Energy '13), pp. 267-268, ACM, May 2013.
[9]
X. Fafoutis, C. Orfanidis, and N. Dragoni, "Altruistic backoff: collision avoidance for receiver-initiated mac protocols for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 576401, 11 pages, 2014.
[10]
C. Karlof, N. Sastry, and D. Wagner, "TinySec: a link layer security architecture for wireless sensor network," in Proceedings of the 2nd ACM International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162-175, ACM, 2004.
[11]
T. Kohno, A. Palacio, and J. Black, "Building secure cryptographic transforms, or how to encrypt and MAC," IACR Cryptology ePrint Archive, vol. 177, 2003.
[12]
National Institute of Standards and Technology (NIST), SKIPJACK and KEA Algorithm Specifications, 1998.
[13]
J. Kim and R. C.-W. Phan, "A cryptanalytic view of the NSA's Skipjack block cipher design," in Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, vol. 5576 of Lecture Notes in Computer Science, pp. 368-381, Springer, Berlin, Germany, 2009.
[14]
E. Biham, A. Biryukov, and A. Shamir, "Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials," Journal of Cryptology, vol. 18, no. 4, pp. 291-311, 2005.
[15]
Y.W. Law, J. Doumen, and P. Hartel, "Survey and benchmark of block ciphers for wireless sensor networks," ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65-93, 2006.
[16]
K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, and T. Shirai, "Piccolo: an ultra-lightweight blockcipher," in Cryptographic Hardware and Embedded Systems--CHES 2011: 13th International Workshop, Nara, Japan, September 28-October 1, 2011. Proceedings, vol. 6917 of Lecture Notes in Computer Science, pp. 342-357, Springer, Berlin, Germany, 2011.
[17]
T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, "TWINE: a lightweight block cipher for multiple platforms," in Proceedings of the 19th International Conference on Selected Areas in Cryptography (SAC '13), pp. 339-354, Springer, 2013.
[18]
A. Bogdanov, L. R. Knudsen, G. Leander et al., "PRESENT: an ultra-lightweight block cipher," in Cryptographic Hardware and Embedded Systems--CHES 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings, vol. 4727 of Lecture Notes in Computer Science, pp. 450-466, Springer, Berlin, Germany, 2007.
[19]
International Organization for Standardization (ISO), Information Technology--Security Techniques--Lightweight Cryptography-- Part 2: Block Ciphers, International Organization for Standardization, London, UK, 2012.
[20]
M. Luk, G. Mezzour, A. Perrig, and V. D. Gligor, "MiniSec: a secure sensor network communication architecture," in Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN '07), pp. 479-488, ACM, April 2007.
[21]
T. Krovetz and P. Rogaway, "The software performance of authenticated-encryption modes," in Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers, Lecture Notes in Computer Science, pp. 306-327, Springer, Berlin, Germany, 2011.
[22]
V. Jariwala and D. C. Jinwala, "Evaluating Galois Counter mode in link layer security architecture for wireless sensor networks," International Journal of Network Security &; Its Applications, vol. 2, no. 4, pp. 55-65, 2010.
[23]
A. V. Taddeo, M. Mura, and A. Ferrante, "QOS and security in energy-harvesting wireless sensor networks," in Proceedings of the 7th International Conference on Security and Cryptography (SECRYPT '10), pp. 1-10, IEEE, July 2010.
[24]
IEEE, IEEE Standard for Information Technology--Telecommunications and Information Exchange Between Systems--Local and Metropolitan Area Networks Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE, 2003.
[25]
D. Dolev and A. C.-C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
[26]
A. Di Mauro, X. Fafoutis, S. Mödersheim, and N. Dragoni, "Detecting and preventing beacon replay attacks in receiver-initiated MAC protocols for energy efficient WSNs," in Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings, vol. 8208 of Lecture Notes in Computer Science, pp. 1-16, Springer, Berlin, Germany, 2013.
[27]
C. Taramonli, R. J. Green, and M. S. Leeson, "Energy conscious adaptive security scheme for optical wireless," in Proceedings of the 14th International Conference on Transparent Optical Networks (ICTON '12), pp. 1-4, July 2012.
[28]
N. Fotiou, G. F. Marias, G.C. Polyzos et al., "Towards adaptable security for energy efficiency in wireless sensor networks," in Proceedings of the 28th Meeting of the Wireless World Research Forum (WWRF '12), pp. 1-6, Wireless World Research Forum, 2012.

Cited By

View all
  • (2022)A Survey on Internet-of-Things Security: Threats and Emerging CountermeasuresWireless Personal Communications: An International Journal10.1007/s11277-021-09420-0124:2(1557-1592)Online publication date: 1-May-2022
  • (2021)Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2021/66671002021Online publication date: 1-Jan-2021
  • (2017)Energy-efficient mechanisms in security of the internet of thingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2017.08.006127:C(173-189)Online publication date: 9-Nov-2017
  1. Adaptive security in ODMAC for multihop energy harvesting wireless sensor networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image International Journal of Distributed Sensor Networks
    International Journal of Distributed Sensor Networks  Volume 2015, Issue
    January 2015
    2870 pages
    ISSN:1550-1329
    EISSN:1550-1477
    Issue’s Table of Contents

    Publisher

    Hindawi Limited

    London, United Kingdom

    Publication History

    Accepted: 26 March 2015
    Published: 01 January 2015
    Received: 11 December 2014

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Survey on Internet-of-Things Security: Threats and Emerging CountermeasuresWireless Personal Communications: An International Journal10.1007/s11277-021-09420-0124:2(1557-1592)Online publication date: 1-May-2022
    • (2021)Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor NetworksWireless Communications & Mobile Computing10.1155/2021/66671002021Online publication date: 1-Jan-2021
    • (2017)Energy-efficient mechanisms in security of the internet of thingsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2017.08.006127:C(173-189)Online publication date: 9-Nov-2017

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media