A New Secure approach in WSN and Evaluating by various Encryption methods on different platforms

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 450

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

EHCONF04_140

تاریخ نمایه سازی: 6 اردیبهشت 1396

چکیده مقاله:

Wireless Sensor Network (WSN) consists of many nodes. WSNs are used for many applications such as military and battlefield monitoring. So, deploying wireless sensor networks in public environments may become necessary to provide security against possible attacks such as node-compromise andeavesdropping. Beside these problems, the sensor nodes are battery powered thus energy is the most precious resource. So that, to provide security and energy consumption should be in balance state. Therefore, in this paper, we purpose a new method to provide confidentiality of data between nodes tosend base station. In the proposed method, we use some special nodes as cluster head (CH) which have long radio range. A node encrypts the data and sends it to the nearest neighbor until the data receives to CH, and then it encrypts and sends to the base station. Finally, proposed method will be evaluated by different encryption algorithm on different platforms.

نویسندگان

Mostafa Ramezani

Department of Computer & Information Technology, Ghiasodin Jamshid Kashani Higher Education Institute,Abyek,Iran

Soma Shekarchi

Department of Electrical,IT & Computer Sciences, Islamic Azad University Of Qazvin, Qazvin,Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • "Intel Unveil. StrongARM-2 at Embedded Processor Forum"; Embedded Processor Watch ...
  • Akyildiz IF, Su W, S ankara subraman iam Y, Cayirci ...
  • Ammari, H.M. and S.k. Das, (201 1)."Scheduling protocols for homogeneous ...
  • WWW. sci encedirect , com/sci enc e/article/pi/S 15741 19210000830 ...
  • Babaie Sh, S.Nobahary, N.Zekrizadeh "A New Stream Cipher based Security ...
  • Bruck, J.. J. Gao and A.Jiang, (2009) ."Localization and routing ...
  • Ganesan Prasanth, Ramnath Venugopalan, Pushkin Peddabach agari, Alexander Dean, Frank ...
  • Heinzelman W.B, Chandrakasar A.P, Balakrishnan H. Application specific protocol architecture ...
  • Lee, S., H.Choe, B.Park, Y.Song and C.kim, (2011)"LUCA: An en ...
  • Manti and A. Shamir" A practical attack on broadcast rc4: ...
  • Mantin Itsik "A practical attack on the fixed rc4 in ...
  • WWW. iacr _ org/arch ive/as iacrypt2005/3 90/390.pdf ...
  • Mantin Itsik. Predicting and distinguishing attacks on rc4 key stream ...
  • Mao, G., F. Baris and D.O. Anderson, (2007).، Wireless sensor ...
  • Memariani Javad, Zuriati Ahmad Zukarnain, Azizol Abdullah and Zurina Mohd ...
  • National Institute on Standards and Technology Computer Security Resource Center, ...
  • Prasith sangaree P and P. Krishnamurthy (2003). "Analysis of Energy ...
  • RSA laboratories. RSA security response to weaknesses in key scheduling ...
  • Sasaki Yu, Kazumaro Aoki "Finding Preimages in Full MD5 Faster ...
  • Scott R. Fluhrer, Itsik Mantin and Adi Shamir, Weaknesses in ...
  • Soro, s. and W.B. Heinzelman, (2005) ."Prolonging the lifetime of ...
  • Stevens Marc, Arjen Lenstra, Benne de Weger " Chosen-prefix Collisions ...
  • Yick J, Mukherjee B, Ghosal D. Wireless Sensor Network Survey. ...
  • نمایش کامل مراجع