A unified security framework with three key management schemes for wireless sensor networks
ABSTRACT Pervasive computing environments find their practical manifestations through wireless sensor networks, which sense a relationship amongst themselves and the environment. Currently the proposed keying schemes for ensuring security, in wireless sensor networks, may be classified into public and private keying schemes, or their hybrid. However, an investigation in peer work underpins the fact that neither of these works relates the key management schemes with the granularity of key generation, distribution, renewal, and revocation. In this paper, we propose a unified security framework with three key management schemes, SACK, SACK-P, and SACK-H that incorporate symmetric key cryptography, asymmetric key cryptography and the hybrid, respectively. We have evaluated the key management schemes against a broad range of metrics such as energy, resource utilization, scalability and resilience to node compromises. Our evaluation comprises both analytical investigation and experimental validation. The results show that though SACK-P is heavy on resources, it provides maximal security and offers the best resilience to node compromises. On the contrary, SACK is very efficient in terms of storage and communication. Our results substantiate a relationship between the level of security and resource utilization and form a design benchmark for security frameworks.
SourceAvailable from: Mary Opokua Ansong[Show abstract] [Hide abstract]
ABSTRACT: In our previous work, a novel model called compact radial basis function (CRBF) in a routing topology control has been modelled. The computational burden of Zhang and Gaussian transfer functions was modified by removing the power parameters on the models. The results showed outstanding performance over the Zhang and Gaussian models. This study researched on several hybrids forms of the model where cosine (cos) and sine (sin) nonlinear weights were imposed on the two transfer functions such that íµí±(out) = logsig(íµí± ) + [exp(−abs(íµí± ))] * (± cos or ± sin(íµí± )). The purpose was to identify the best hybrid that optimized all of its parameters with a minimum error. The results of the nonlinear weighted hybrids were compared with a hybrid of Gaussian model. Simulation revealed that the negative nonlinear weights hybrids optimized all the parameters and it is substantially superior to the previous approaches presented in the literature, with minimized errors of 0.0098, 0.0121, 0.0135, and 0.0129 for the negative cosine (HSCR-BF −cos), positive cosine (HSCR-BF +cos), negative sine (HSCR-BF −sin), and positive sine (HSCR-BF +sin) hybrids, respectively, while sigmoid and Gaussian radial basis functions (HSGR-BF +cos) were 0.0117. The proposed hybrid could serve as an alternative approach to underground rescue operation.
Conference Paper: Securing intra-communication in 6LoWPAN: A PKI integrated scheme[Show abstract] [Hide abstract]
ABSTRACT: 6LoWPAN standard enables efficient integration of low power wireless networks with IPv6. However the security requirements of 6LoWPANs are high due to undefined deployment scenarios and constrained capabilities of sensor nodes. A number of schemes have been devised for secure communication over the Internet, PKI being the most widely used of them. It provides authentication, non-repudiation, confidentiality and integrity. PKI does not qualify for use in 6LoWPAN as it is not streamlined for these networks and creates a communication and processing overhead which cannot be borne by a simple wireless sensor node. We provide a scheme to integrate PKI and 6LoWPAN by essentially delegating a major portion of key management activity to the edge routers (gateway) of the LoWPAN and limiting the involvement of the end nodes to minimum communication with the edge router. The edge router maintains a Local Key Database (LKDB) by remaining in constant contact with the certification authority (CA) server and oversees all related keying functions in the LoWPAN. A request packet format and algorithm to acquire keys of the destination from edge router is proposed. Performance evaluation of the proposed scheme using a protocol analyzer indicated a time and increased packet count tradeoff for the enhanced level of security. An increase in packet payload during evaluation led to a significant increase in transmitted message count. The proposed scheme did not alter the nature of the packets transmitted and performed well at scalable loads.IEEE ANTS, New Delhi; 12/2014
[Show abstract] [Hide abstract]
ABSTRACT: In this paper a Glial Ratio (g-ratio) mix hybrids of 67% Sigmoid and 33% Radial functions (HSCR-BF gr) based on Particle swarm optimisation with the highest survivability of all possible routing redundancies, reliability, efficiency, fault tolerant with minimum fitness error is proposed for underground rescue operation. Nonlinear weights of cosine and sine were imposed on the g-ratio hybrids. In addition we introduced a nonlinear weight with the g-ratio on the Gaussian RBF. The performance of the Hybrid with negative cosine weight (HSCR-BF -grcos) was the best among the various g-ratio hybrids as compared to Gaussian with the same nonlinear weight. The hybrid with negative nonlinear cosine weight yielded the best results with an optimised error of 0.011. The proposed Nonlinear Hybrid Algorithm has better capability of approximation to underlying functions with a fast learning speed, high scalability, robusticity and is competitive to the Gaussian with the same nonlinear weight.