Location-based data encryption for wireless sensor network using dynamic keys

被引:0
|
作者
Han-Yu Lin
机构
[1] National Taiwan Ocean University,Department of Computer Science and Engineering
来源
Wireless Networks | 2015年 / 21卷
关键词
WSN; Location; Key-insulation; Authenticated encryption; Message linkages;
D O I
暂无
中图分类号
学科分类号
摘要
Secure data transmission for the wireless sensor network (WSN) is always an important issue. The technique of traditional authenticated encryption allows a sensor node to generate a ciphertext which can only be decrypted and authenticated by a designated data aggregator. The convertible property further enables the aggregator to announce an ordinary signature for public verification. To alleviate the harm of key exposure, dynamic key systems are especially suitable for implementing in the large-scale deployment environments such as WSNs. Combining the concept of location and the merits of dynamic keys, we propose a location-based data encryption scheme for WSNs. To the best of our knowledge, this is the first concrete construction considering the properties of location and dynamic keys in WSNs. The proposed scheme not only is conversion-free, but also provides unlimited time periods and random-access key-updates. Moreover, we utilize some reduction models to prove the security of our protocol.
引用
收藏
页码:2649 / 2656
页数:7
相关论文
共 50 条
  • [21] Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks
    Taqieddin, Eyad S.
    Awad, Fahed H.
    Abdullah, Sally M.
    AD HOC & SENSOR WIRELESS NETWORKS, 2014, 21 (3-4) : 237 - 257
  • [22] Location-based routing protocols in wireless sensor networks: a survey
    Soni, Vaibhav
    Mallick, Dheeresh K.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (04) : 200 - 213
  • [23] Location-based design for secure and efficient wireless sensor networks
    Yang, Cungang
    Li, Celia
    Xiao, Jie
    COMPUTER NETWORKS, 2008, 52 (16) : 3119 - 3129
  • [24] Location-Based Pairwise Key Predistribution for Wireless Sensor Networks
    Kwon, Taekyoung
    Lee, JongHyup
    Song, JooSeok
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (11) : 5436 - 5442
  • [25] Location-Based Lattice Mobility Model for Wireless Sensor Networks
    Al-Rahayfeh, Amer
    Razaque, Abdul
    Jararweh, Yaser
    Almiani, Muder
    SENSORS, 2018, 18 (12)
  • [26] Encryption Management of Accounting Data Based on DES Algorithm of Wireless Sensor Network
    Lu, Zixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [27] Enhancing Security and Confidentiality on Mobile Devices by Location-based Data Encryption
    Karimi, Rohollah
    Kalantari, Mohammad
    2011 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON), 2011, : 241 - 245
  • [28] Using encryption for authentication: wireless sensor network case
    Jurnecka, Filip
    Matyas, Vashek
    2013 IEEE INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY OF MOBILE, WIRELESS, AND SENSOR NETWORKS (MWSN), 2013,
  • [29] Charging wireless sensor network security technology based on encryption algorithms and dynamic model
    Li, Yuanming
    Guo, Wei
    Meng, Xuejun
    Xia, Wen
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (03)
  • [30] Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks
    Mutalemwa, Lilian C.
    Shin, Seokjoo
    SENSORS, 2018, 18 (07)