Mobile nodes for improving security and lifetime efficiency in wireless sensor networks. Issue 1 (1st April 2019)
- Record Type:
- Journal Article
- Title:
- Mobile nodes for improving security and lifetime efficiency in wireless sensor networks. Issue 1 (1st April 2019)
- Main Title:
- Mobile nodes for improving security and lifetime efficiency in wireless sensor networks
- Authors:
- Salah, Mohammed Saïd
Abderrahim, Maizate
Mohamed, Ouzzif
Mohamed, Toumi - Abstract:
- Abstract : Purpose: This paper aims to provide an acceptable level of security while taking into account limited capabilities of the sensors. This paper proposes a mobile approach to securing data exchanged by structured nodes in a cluster. Design/methodology/approach: The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. Findings: To maintain the effectiveness of critical applications based on wireless sensor networks, a good level of nodes security must be ensured, taking into account their limited energy and computing. Collaboration between powerful mobile nodes provides better coverage and a good key management. Owing to the significant capabilities of the mobile nodes, they can be used to secure critical applications at the same time if needed in applications requiring difficult operations. Originality/value: To compare the performance of the proposed approach with other mobile algorithms, the following metrics are focused on: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys and the memory used by the different sensorsAbstract : Purpose: This paper aims to provide an acceptable level of security while taking into account limited capabilities of the sensors. This paper proposes a mobile approach to securing data exchanged by structured nodes in a cluster. Design/methodology/approach: The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. Findings: To maintain the effectiveness of critical applications based on wireless sensor networks, a good level of nodes security must be ensured, taking into account their limited energy and computing. Collaboration between powerful mobile nodes provides better coverage and a good key management. Owing to the significant capabilities of the mobile nodes, they can be used to secure critical applications at the same time if needed in applications requiring difficult operations. Originality/value: To compare the performance of the proposed approach with other mobile algorithms, the following metrics are focused on: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys and the memory used by the different sensors to store keys. … (more)
- Is Part Of:
- International journal of pervasive computing and communications. Volume 15:Issue 1(2019)
- Journal:
- International journal of pervasive computing and communications
- Issue:
- Volume 15:Issue 1(2019)
- Issue Display:
- Volume 15, Issue 1 (2019)
- Year:
- 2019
- Volume:
- 15
- Issue:
- 1
- Issue Sort Value:
- 2019-0015-0001-0000
- Page Start:
- 2
- Page End:
- 15
- Publication Date:
- 2019-04-01
- Subjects:
- Wireless sensor networks -- Mobile nodes -- Key management -- Elliptic curve cryptography
Ubiquitous computing -- Periodicals
Mobile computing -- Periodicals
Computer network protocols -- Periodicals
Computer network architectures -- Periodicals
Application software -- Development -- Periodicals
004.6 - Journal URLs:
- http://info.emeraldinsight.com/products/journals/journals.htm?PHPSESSID=hprfp8ctb78gnbgodr3rkog6s0&id=ijpcc ↗
http://www.emeraldinsight.com/ ↗
http://www.troubador.co.uk/jpcc/ ↗ - DOI:
- 10.1108/IJPCC-06-2019-057 ↗
- Languages:
- English
- ISSNs:
- 1742-7371
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 4542.452750
British Library DSC - BLDSS-3PM
British Library STI - ELD Digital store - Ingest File:
- 11157.xml