{"title":"Adaptive Confidentiality Mechanism for Hierarchical Wireless Sensor Networks","authors":"M. Al, K. Yoshigoe","doi":"10.1109/GLOCOMW.2008.ECP.41","DOIUrl":null,"url":null,"abstract":"Protocol designs in wireless sensor networks (WSNs) have to consider many constraints such as limited power and computing capacity. We propose an end-to-end adaptive confidentiality mechanism (ACM), which significantly reduces the risk of adversary capturing aggregated messages leaving a cluster head while meeting these rigid resource constraints. ACM divides an encrypted message into several segments and sends them to a pre-defined super node set. The super nodes encrypt and forward the segments to a super node set leader which, then decrypts and reconstructs the original message. Analysis shows that ACM improves data confidentiality by several magnitudes without adding significant communication and processing overhead.","PeriodicalId":410930,"journal":{"name":"2008 IEEE Globecom Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Globecom Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2008.ECP.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Protocol designs in wireless sensor networks (WSNs) have to consider many constraints such as limited power and computing capacity. We propose an end-to-end adaptive confidentiality mechanism (ACM), which significantly reduces the risk of adversary capturing aggregated messages leaving a cluster head while meeting these rigid resource constraints. ACM divides an encrypted message into several segments and sends them to a pre-defined super node set. The super nodes encrypt and forward the segments to a super node set leader which, then decrypts and reconstructs the original message. Analysis shows that ACM improves data confidentiality by several magnitudes without adding significant communication and processing overhead.