Powerful mobile nodes for enhancing wireless sensor networks' security and lifetime
Keywords:
wireless sensor networks, mobile nodes, key management, elliptic curve cryptographyAbstract
To maintain the proper functioning of critical applications based on Wireless Sensor Networks, we must provide an acceptable level of security while taking into account limited capabilities of the sensors. In this paper we proposed a mobile approach to secure data exchanged by structured nodes in cluster. The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. To compare the performance of the proposed approach with other mobile algorithms, we focused on the following metrics: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys, and the memory used by the different sensors to store keys.Downloads
Published
Issue
Section
License
Engineering review uses the Creative Commons Attribution-NonCommercial-NoDerivatives (CC-BY-NC-ND) 4.0 International License, which governs the use, publishing and distribution of articles by authors, publishers and the wider general public.
The authors are allowed to post a digital file of the published article, or the link to the published article (Enginering Review web page) may be made publicly available on websites or repositories, such as the Author’s personal website, preprint servers, university networks or primary employer’s institutional websites, third party institutional or subject-based repositories, and conference websites that feature presentations by the Author(s) based on the published article, under the condition that the article is posted in its unaltered Engineering Review form, exclusively for non-commercial purposes.
The journal Engineering Review’s publishing procedure is performed in accordance with the publishing ethics statements, defined within the Publishing Ethics Resource Kit. The Ethics statement is available in the document Ethics Policies.