K. Sharma, V. Varun, U. Maulick, R. Kumar, V. Jain
{"title":"Use of LFSR for Sensor Network Security: A New Approach","authors":"K. Sharma, V. Varun, U. Maulick, R. Kumar, V. Jain","doi":"10.1109/ISA.2008.115","DOIUrl":null,"url":null,"abstract":"One of the widely used security mechanism for sensor network is the software-hardware implementation of cryptographic algorithms. If the confidential data is lost as a result of adversary effect, then the whole sensor network is prone to get exposed to the intruder. What we need is a strong mechanism, to protect such sensitive data. In this paper we present a technique where we mask all the intermediate input and output data with some values in order to de-correlate information leaked, if any, so that the original/actual information is not exposed to the attacker. An architecture is proposed which is embedded on the sensor node to incorporate built in security feature at the chip level itself. This is done by the addition of a new hardware component called an LFSR, at the chip level itself, which is capable of generating random numbers to mask the output. As far as the clustering technique used is concerned, we've considered the hierarchical clustering to ease data aggregation.","PeriodicalId":212375,"journal":{"name":"2008 International Conference on Information Security and Assurance (isa 2008)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Information Security and Assurance (isa 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISA.2008.115","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
One of the widely used security mechanism for sensor network is the software-hardware implementation of cryptographic algorithms. If the confidential data is lost as a result of adversary effect, then the whole sensor network is prone to get exposed to the intruder. What we need is a strong mechanism, to protect such sensitive data. In this paper we present a technique where we mask all the intermediate input and output data with some values in order to de-correlate information leaked, if any, so that the original/actual information is not exposed to the attacker. An architecture is proposed which is embedded on the sensor node to incorporate built in security feature at the chip level itself. This is done by the addition of a new hardware component called an LFSR, at the chip level itself, which is capable of generating random numbers to mask the output. As far as the clustering technique used is concerned, we've considered the hierarchical clustering to ease data aggregation.