Securing Message in Wireless Sensor Network by using New Method of Code Conversions

Recently, wireless sensor networks have been paid more interest, are widely used in a lot of commercial and military applications, and may be deployed in critical scenarios (e.g. when a malfunctioning network results in danger to human life or great financial loss). Such networks must be protected against human intrusion by using the secret keys to encrypt the exchange messages between communicating nodes. Both the symmetric and asymmetric methods have their own drawbacks for use in key management. Thus, we avoid the weakness of these two cryptosystems and make use of their advantages to establish a secure environment by developing the new method for encryption depending on the idea of code conversion. The code conversion-s equations are used as the key for designing the proposed system based on the basics of logic gate-s principals. Using our security architecture, we show how to reduce significant attacks on wireless sensor networks.




References:
[1] Shuai Yang, Jie Liu, Chunxiao Fan, Xiaoying Zhang, and JunweiZou.
"A new design of security wireless sensor network using efficient key
management scheme". IEEE, DOI: 10.1109/ICNIDC.2010. 5657820,
Issue Date: 24-26 Sept. 2010.
[2] Akbar Abbasi, "Better Security for Wireless Sensor Networks," icfn,
IEEE, pp.100-103, International Conference on Future Networks, 2009.
http://doi.ieeecomputersociety.org/10.1109/ICFN.2009.55
[3] XiuliRen, and Haibin Yu, "Security Mechanisms for Wireless Sensor
Networks". IJCSNS International Journal of Computer Science and
Network Security, VOL.6 No.3, March 2006
[4] Beat Gebistorf and Roger Wattenhofer. "Secure Messaging for Wireless
Sensor Networks". Swiss Federal Institute of Technology Zurich,
Distributed Computing Group DCG. Semester thesis, SA-2009-03.
[5] ManelBoujelben, Omar Cheikhrouhou, Mohamed Abid and Habib
Youssef. "Establishing pairwise keys in heterogeneous two-tiered
wireless sensor networks". Third International Conference on Sensor
Technologies and Applications. 978-0-7695-3669-9/0 IEEE DOI
10.1109/ SENSORCOMM.2009.73
[6] Kejie Lu, Yi Qian and Jiankun Hu. "A Framework for Distributed Key
Management Schemes in Heterogeneous Wireless Sensor Networks".
IEEE 1-4244-0198-4/06┬®2006
[7] Jen-YanHuang, I-En Liao, and Hao-Wen Tang. "A Forward
Authentication Key Management Scheme for Heterogeneous Sensor
Networks". Hindawi Publishing Corporation.EURASIP Journal on
Wireless Communications and Networking Volume 2011, Article ID
296704, 10 pages. doi:10.1155/2011/296704.
[8] Reza Azarderakhsh, ArashReyhani-Masoleh, and Zine-EddineAbid. "A
Key Management Scheme for Cluster Based Wireless Sensor
Networks". IEEE/IFIP International Conference on Embedded and
Ubiquitous Computing. 978-0-7695-3492-3/08 IEEE. DOI
10.1109/EUC.2008.176
[9] Zhong Zhou, Student Member, IEEE, Shengli Zhou, Member, IEEE,
Shuguang Cui, Member, IEEE, and Jun-Hong Cui, Member, IEEE.
"Energy-Efficient Cooperative Communication in a Clustered Wireless
Sensor Network". IEEE TRANSACTIONS ON VEHICULAR
TECHNOLOGY, VOL. 57, NO. 6, NOVEMBER 2008
[10] Chung-Horng Lung and Chenjuan Zhou. "Using Hierarchical
Agglomerative Clustering in Wireless Sensor Networks: An Energy-
Efficient and Flexible Approach". 978-1-4244-2324-8/08/, IEEE 2008.
[11] Ashok Kumar Das and IndranilSengupta. "An Effective Group-Based
Key Establishment Scheme for Large-Scale Wireless Sensor Networks
using Bivariate Polynomials". Conference: COM-munication System
softWAre and Middle-waRE - COMSWARE , pp. 9-16.DOI: 10.1109/
COM-SWA.2008.4554370.
[12] Wensheng Zhang , Sencun Zhu ,and Guohong Cao. "Predistribution and
local collaboration-based group rekeying for wireless sensor networks".
Ad Hoc Networks 7 (2009) 1229-1242. 2008 Elsevier B.V. All rights
reserved. doi:10.1016/j.adhoc.2008.11.004
[13] Ali Chamam and Samuel Pierre. "A distributed energy-efficient
clustering protocol for wireless sensor networks". Computers and
Electrical Engineering 36 (2010) 303-312. doi:10.1016/j. comp
eleceng.2009.03.008. 2009 Elsevier Ltd.
[14] Ameer Ahmed Abbasi and Mohamed Younis. "A survey on clustering
algorithms for wireless sensor networks". Computer Communications 30
(2007) 2826-2841. doi:10.1016/j.comcom.2007.05.024. _ 2007
Published by Elsevier B.V.
[15] Renaud Fallier and Bart Scheers. "Positioning and Topology Control in
Mobile Ad Hoc Networks and Wireless Sensor Networks". NC3A (Den
Haag) and the VUB / ETRO-COMO 2011.
http://www.sic.rma.ac.be/Projects/WSN/index.html
[16] Arboleda LMC, Nasser N. "Comparison of clustering algorithms and
protocols for wireless sensor networks". In: Proceedings of the Canadian
conference on electrical and computer engineering; 2006. p. 1787-92.
[17] Heizelman WR, Chandrakasan A, Balakrishnan H. "Energy-efficient
communication protocol for wireless micro sensor networks". In
Proceedings of the IEEE Hawaii international conference on system
sciences; 2000.
[18] Younis O, Fahmy S. HEED. "A hybrid, energy-efficient, distributed
clustering approach for ad hoc sensor networks". IEEE Trans
MobileComput 2004;3(4):366-79
[19] SomanathTripathy. "Tin-Key: Effective Key-Establishment for Wireless
Sensor Networks". 2010 10th IEEE International Conference on
Computer and Information Technology (CIT 2010). DOI
10.1109/CIT.2010.170