{"title":"基于跳频和排列加密的无线传感器网络节能安全协议","authors":"Ismail Mansour, G. Chalhoub, M. Misson","doi":"10.5220/0003371302770282","DOIUrl":null,"url":null,"abstract":"The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt critical information. In addition, we propose a time segmentation approach that enables the use of frequency hopping time slotted communications. Nodes secretly exchange frequency hopping sequences that enable them to fight against jamming and eavesdropping. We use permutation ciphering technique to protect the information exchanged between nodes.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Energy-efficient Security Protocol for Wireless Sensor Networks using Frequency Hopping and Permutation Ciphering\",\"authors\":\"Ismail Mansour, G. Chalhoub, M. Misson\",\"doi\":\"10.5220/0003371302770282\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt critical information. In addition, we propose a time segmentation approach that enables the use of frequency hopping time slotted communications. Nodes secretly exchange frequency hopping sequences that enable them to fight against jamming and eavesdropping. We use permutation ciphering technique to protect the information exchanged between nodes.\",\"PeriodicalId\":298357,\"journal\":{\"name\":\"International Conference on Pervasive and Embedded Computing and Communication Systems\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Pervasive and Embedded Computing and Communication Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5220/0003371302770282\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Pervasive and Embedded Computing and Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0003371302770282","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Energy-efficient Security Protocol for Wireless Sensor Networks using Frequency Hopping and Permutation Ciphering
The security aspect of wireless sensor networks has taken the attention of numerous researchers in the past several years. It has recently been proven that public keys are now feasible in wireless sensor networks but still consume a lot of processing time and memory. In this paper we propose the use of public keys based on ECC to exchange symmetric keys that will be used to encrypt critical information. In addition, we propose a time segmentation approach that enables the use of frequency hopping time slotted communications. Nodes secretly exchange frequency hopping sequences that enable them to fight against jamming and eavesdropping. We use permutation ciphering technique to protect the information exchanged between nodes.