Loading

Efficient Temporal-key Based Encryption Mechanism for WSN-ETEM
Premakumar MN1, Ramesh S2

1Premakumar MN*, Research Scholar, Department Electronics & Communication, Dr. AIT, Bengaluru, Karnataka, India.
2Dr. Ramesh S, Professor and Head, Department of Electronics & Communication Engineering, Dr. AIT, Bengaluru, Karnataka, India.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 22, 2020. | Manuscript published on March 10, 2020. | PP: 143-148 | Volume-9 Issue-5, March 2020. | Retrieval Number: E2147039520/2020©BEIESP | DOI: 10.35940/ijitee.E2147.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless sensor networks (WSNs) are a promising technology for several industrial real-time and quotidian applications. Due to inherent limitations in WSN, security is a crucial issue. Cryptographic primitives are the fundamental components for designing security protocols to achieve security and privacy in WSN. Based on the review, it has been analyzed that the majority of security protocols for WSN are based on encryption and key distribution. The main open issue for these approaches concerns the establishment of security with an involvement of complex procedure, which presents considerable memory overheads, in contrast with the limited resources of sensor nodes. Therefore, the proposed work presents the modeling of an analytical approach for efficient encryption using temporal key management for robust security services to resists potential attacks and enables secure communication. The utilization of temporal-key mechanism in encryption operation offers additional support to routing operation in the network for secure data transmission with negligible computational overhead, thus preserving a higher level of energy savings in packet transmission operation. The validation of the proposed system performance is carried out a simulation study, which shows the effectiveness of the proposed system in terms of node remaining energy and processing time. 
Keywords: WSN, Security, Authentication, Encryption, Key Distribution, Routing, Sensors
Scope of the Article: Authentication, Authorization, Accountinging