4.5 Article

An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks

Journal

AD HOC NETWORKS
Volume 115, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.adhoc.2021.102448

Keywords

Wireless sensor networks; Lightweight encryption; Automated encryption; Dynamic clustering; WSN security; Key management

Ask authors/readers for more resources

This paper introduces the FlexCrypt scheme, which addresses the challenges of security and efficiency in WSNs by introducing features such as dynamic clustering and automated selection of encryption parameters, as well as providing flexible key management and authentication methods.
In wireless sensor networks (WSNs), security, efficiency, and energy consumption are still major challenges due to its open, large-scale, and resource-constrained nature. The 6LoWPAN protocol and many other lightweight cryptographic methods have been developed to improve the security and efficiency of WSNs with a reasonable amount of energy and resource utilization. However, they still suffer from limitations in terms of flexibility, key management, authentication, and the power resource management processes. This paper addresses these issues by designing FlexCrypt, an automated lightweight cryptographic scheme for WSNs. In the FlexCrypt scheme, a new dynamic clustering technique that supports mobility among the sensor nodes is developed. Moreover, the proposed scheme introduces a flexible lightweight cryptographic method to control the complexity of the encryption by automating the selection of encryption parameters based on the presently available resources of each sensor node to encrypt the data. In addition, a new lightweight key management and authentication method is designed to establish secure communication and the exchange of data and keys among the various WSN nodes. The proposed FlexCrypt scheme was evaluated using the Cooja simulator with Contiki OS. The results prove that the proposed scheme provides a significant improvement in terms of delay and encryption time in addition to power consumption and network lifetime compared to other ciphers that use fixed encryption parameters. It can effectively extend the network lifetime by 86%, 94% and 90% compared to the FlexenTech, AES and TEA ciphers, respectively. The security analysis demonstrates that the FlexCrypt scheme can resist various attacks such as brute-force, eavesdropping, man-in-the-middle and replay attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available