4.5 Article

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

期刊

AD HOC NETWORKS
卷 115, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.adhoc.2021.102448

关键词

Wireless sensor networks; Lightweight encryption; Automated encryption; Dynamic clustering; WSN security; Key management

向作者/读者索取更多资源

This paper introduces the FlexCrypt scheme, which addresses the challenges of security and efficiency in WSNs by introducing features such as dynamic clustering and automated selection of encryption parameters, as well as providing flexible key management and authentication methods.
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still major challenges due to its open, large-scale, and resource-constrained nature. The 6LoWPAN protocol and many other lightweight cryptographic methods have been developed to improve the security and efficiency of WSNs with a reasonable amount of energy and resource utilization. However, they still suffer from limitations in terms of flexibility, key management, authentication, and the power resource management processes. This paper addresses these issues by designing FlexCrypt, an automated lightweight cryptographic scheme for WSNs. In the FlexCrypt scheme, a new dynamic clustering technique that supports mobility among the sensor nodes is developed. Moreover, the proposed scheme introduces a flexible lightweight cryptographic method to control the complexity of the encryption by automating the selection of encryption parameters based on the presently available resources of each sensor node to encrypt the data. In addition, a new lightweight key management and authentication method is designed to establish secure communication and the exchange of data and keys among the various WSN nodes. The proposed FlexCrypt scheme was evaluated using the Cooja simulator with Contiki OS. The results prove that the proposed scheme provides a significant improvement in terms of delay and encryption time in addition to power consumption and network lifetime compared to other ciphers that use fixed encryption parameters. It can effectively extend the network lifetime by 86%, 94% and 90% compared to the FlexenTech, AES and TEA ciphers, respectively. The security analysis demonstrates that the FlexCrypt scheme can resist various attacks such as brute-force, eavesdropping, man-in-the-middle and replay attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据