{"title":"Enhanced encryption model for sensor data in wireless sensor network","authors":"Anusha Vangala, P. Parwekar","doi":"10.1109/WPMC.2017.8301800","DOIUrl":null,"url":null,"abstract":"In Wireless Sensor Network Environment, there is a lot of scope to incorporate security considerations in various aspects of the architecture. While the sink reads the data from the sensor and dumps the aggregated data to the base Station, there is a possibility of loss of confidentiality of data. Any third party may read the data and misuse it. Hence it is vulnerable to snooping by the attacker. The current paper presents an enhanced model in order to improve confidentiality. This paper analyses the weaknesses of the previous scenarios and proposes improvements on them by making use of mathematical operations to manipulate the keys used for the encryption of each sensor. The work culminates into a proposed Scenario 1.7 that can provide enhanced security over the previous models with comparable time taken for security operations in the sink.","PeriodicalId":239243,"journal":{"name":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WPMC.2017.8301800","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In Wireless Sensor Network Environment, there is a lot of scope to incorporate security considerations in various aspects of the architecture. While the sink reads the data from the sensor and dumps the aggregated data to the base Station, there is a possibility of loss of confidentiality of data. Any third party may read the data and misuse it. Hence it is vulnerable to snooping by the attacker. The current paper presents an enhanced model in order to improve confidentiality. This paper analyses the weaknesses of the previous scenarios and proposes improvements on them by making use of mathematical operations to manipulate the keys used for the encryption of each sensor. The work culminates into a proposed Scenario 1.7 that can provide enhanced security over the previous models with comparable time taken for security operations in the sink.