Encapsulate Sec: A Link-Layer Security Architecture for Wireless Sensor Networks
Keywords:WSNs, Encapsulate Sec, MAC, link-layer security protocol
Communication energy is the primary cause of power consumption for WSNs. All of the encryption protocols suggested for WSNs in the literature are designed to reduce security-related communication overheads in several ways to save communication resources. Therefore; all emerging energy-efficient protocols affect security resistance factors. However, maintaining communications security in WSNs is also critical. another challenge is the fact that WSNs suffer from limited bandwidth, memory, and computing capacities. They work in an unattended way in hostile conditions. An energy-efficient link-layer security framework is therefore necessitated. This paper proposes an energy-efficient link-layer security protocol called Encapsulate Sec. In addition to saving power consumption, Encapsulate Sec offers all security utilities. Encapsulate Sec provides node authentication, message integrity check, replay protection, and message semantic security at the reduced expense by minimizing overhead communication in the data packet and implementing only symmetric security algorithms. It also masks both the header fields and the MAC, making it more difficult to eavesdrop the wireless communication traffic. It also reduces the impact of message spoofing and replays attacks and MAC cryptoanalysis.
M. C. Vuran, I. F. Akylidiz, Wireless Sensor Networks. Wiley,2010.
E. Niewiadomska-Szynkiewicz, P. Kwaśniewski, and I. Windyga, “Comparative study of wireless sensor networks energy-efficient topologies and power save protocols”, J. Telecom. Inform. Technol., no. 3, pp. 68–75, 2009.
Tiwari, P. Ballal, and F. L. Lewis, Energy-efficient wireless sensor network design and implementation for condition-based maintenance, ACM Trans. Sensor Netww (TOSN), vol. 3, no. 1, pp. 1–23, 2007.
K. Sharma, M. K. Ghose, D. Kumar, “A comparative study of various security approaches used in wireless sensor networks”, Int. J. Adv.Sci. Technol., vol. 17, pp. 31–44, 2010.
M. Ahmad, M. Habib, and J. Muhammad, “Analysis of security protocols for Wireless Sensor Networks”, in Proc. 3rd Int. Conf. Comp. Res. Develop. ICCRD 2011, Shanghai, China, 2011, vol. 2, pp. 383–387.
Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler, “SPINS: security protocols for sensor networks”, Wirel. Netw., vol. 8, no. 5, pp. 521–534, 2002.
L. E. Lighfoot, J. Ren, and T. Li, “An energy-efficient link-layer security protocol for wireless sensor networks”, in Proc. IEEE Int. Con. Elec.-Infor. Technol. EIT 2007, Chicago, IL, USA, 2007, pp. 233–238.
S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks”, in Proc. 10th ACM Conf. Comp. Commun. Secur. CCS 2003, Washington, DC, USA, 2003, pp. 62–72.
M. I. Shukur, L. S. Chyan, and V. V. Yap, “Wireless sensor networks: delay guarantee and energy efficient MAC protocols”, World Academy of Sci., Engin. Technol., vol. 50, pp. 1061–1065, 2009.
P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. Fun Hu, “Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards”, Comp. Commun., vol. 30, no. 7, pp. 1655–1695, 2007.
C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks”, in Proc. 2nd Int. Conf. Embedded Networked Sensor Sys., Baltimore, MD, USA, 2004, pp. 162–175.
H. Kumar and A. Kar, “Wireless sensor network security analysis”, Int. J. Next-Generation Netw. (IJNGN), vol. 1, no. 1, 2009.
S. K. Singh, M. P. Singh, and D. K. Singh, “A survay of energy-efficient hierarchical cluster-based routing in wireless sensor networks”, Int. J. Adv. Netw. Appl., vol. 2, no, 2, pp. 570–580, 2010.
S. K. Singh, M. P. Singh, and D. K. Singh, “Energy-efficient homogenous clustering algorithm for wireless sensor networks”, Int. J. Wirel. Mob. Netw., vol. 2, no. 3, pp. 49–61, 2010.
ZigBee Alliance, “ZigBee Specification v1.0”, New York, USA, 2005.
N. Sastry, D. Wagner, “Security consideration for IEEE 802.15.4 networks”, in Proc. 5th Int. Conf. Web Inform. Sys. Engin. WISE 2004, Brisbane, Australia, 2004, pp. 32–4.
R. Struik and G. Rason, “Security and security architectural recommendations for the IEEE 802.15.4 Low-Rate WPAN”, Certicom Corp., 2002.
Aboshosha, B.W.; Dessouky, M.M.; Ramadan, R.; EI-Sayed, A. FH Galal, “Enhanced Version of GOST Cryptosystem for Lightweight Applications”, Volume Editors 1 (1), 28-36. WAS Sci. Nat. 2019.
How to Cite
Copyright (c) 2021 WAS Science Nature (WASSN) ISSN: 2766-7715
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.