Powerful mobile nodes for enhancing wireless sensor networks' security and lifetime

To maintain the proper functioning of critical applications based on Wireless Sensor Networks, we must provide an acceptable level of security while taking into account limited capabilities of the sensors. In this paper we proposed a mobile approach to secure data exchanged by structured nodes in cl...

Full description

Permalink: http://skupnikatalog.nsk.hr/Record/nsk.NSK01001059506/Details
Matična publikacija: Engineering review (Online)
39 (2019), 1 ; str. 60-70
Glavni autori: Salah, Med Saïd (Author), Maizate, Abderrahim, Ouzzif, Mohamed, Toumi, Mohamed
Vrsta građe: e-članak
Jezik: eng
Predmet:
Online pristup: https://doi.org/10.30765/er.39.1.7
Hrčak
LEADER 02366naa a22003854i 4500
001 NSK01001059506
003 HR-ZaNSK
005 20200403191651.0
006 m d
007 cr||||||||||||
008 200325s2019 ci a |o |0|| ||eng
024 7 |2 doi  |a 10.30765/er.39.1.7 
035 |a (HR-ZaNSK)001059506 
040 |a HR-ZaNSK  |b hrv  |c HR-ZaNSK  |e ppiak 
041 0 |a eng  |b eng 
042 |a croatica 
044 |a ci  |c hr 
080 1 |a 654  |2 2011 
080 1 |a 621.3  |2 2011 
100 1 |a Salah, Med Saïd  |4 aut  |9 HR-ZaNSK 
245 1 0 |a Powerful mobile nodes for enhancing wireless sensor networks' security and lifetime  |h [Elektronička građa] /  |c Med Saïd Salah, Abderrahim Maizate, Mohamed Ouzzif, Mohamed Toumi. 
300 |b Ilustr. 
504 |a Bibliografija: 28 jed. 
504 |a Abstract. 
520 |a To maintain the proper functioning of critical applications based on Wireless Sensor Networks, we must provide an acceptable level of security while taking into account limited capabilities of the sensors. In this paper we proposed a mobile approach to secure data exchanged by structured nodes in cluster. The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree. To compare the performance of the proposed approach with other mobile algorithms, we focused on the following metrics: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys, and the memory used by the different sensors to store keys. 
653 0 |a Bežične mreže  |a Senzorske mreže  |a Mobilni čvorovi 
700 1 |a Maizate, Abderrahim  |4 aut  |9 HR-ZaNSK 
700 1 |a Ouzzif, Mohamed  |4 aut  |9 HR-ZaNSK 
700 1 |a Toumi, Mohamed  |4 aut  |9 HR-ZaNSK 
773 0 |t Engineering review (Online)  |x 1849-0433  |g 39 (2019), 1 ; str. 60-70  |w nsk.(HR-ZaNSK)000848891 
981 |b Be2019  |b B02/19 
998 |b tino2004 
856 4 0 |u https://doi.org/10.30765/er.39.1.7 
856 4 0 |u https://hrcak.srce.hr/215364  |y Hrčak 
856 4 1 |y Digitalna.nsk.hr