Secured Communication through Wireless Sensor Network

Authors

  • Abdullatif Mohammed Albaseer Computer engineering departmentKing Fahd Univ. of Petroleum & Minerals
  • Talal Alkharoubi King Fahd University of Petroleum and minerals
  • Gamil Ahmed King Fahd University of Petroleum and minerals

DOI:

https://doi.org/10.14738/tnc.65.5101

Abstract

 Nowadays, life seems to be deficient without Internet. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. In face of this rapid improvements, security threats and privacy issues also have brought critical challenges in designing and implementing such applications. In this work, we aim to find a way to protect the data from the WSNs devices to the cloud server or control unit. Also, the task of data management in WSNs is a vital issue that can be performed with limited resources such as processing, memory and energy. So, we have proposed a light implementation for AES 128 key in order to be used to encrypt the data sent by these sensors. We have adopted three different platforms which are Sky and Z1 motes to test this algorithm. Applying such algorithm leads to consume more power but guarantees a secure communication against malicious nodes. 

Author Biography

Abdullatif Mohammed Albaseer, Computer engineering departmentKing Fahd Univ. of Petroleum & Minerals

Abdullatif  M. Albaseer was born in IBB,  Yemen.  He received the  B.Sc.  in computer science from  Thamar  University,  Thamar,  Yemen,  in  2009  and received the M.Sc. degree in Computer Networks from King Fahd University of PetroleumMinerals  (KFUPM),  Dhahran,  Saudi  Arabia,  in  2017.  Mr. Albaseer is now working towards his Ph.D. in  Computer Engineering at KFUPM.  His research of interest is sensor and Actuator  Networks,  Mobile  Robots,  IoT, Routing protocols,  Low  PowerOptimization for WSNs, Distributed Networks and Performance Evaluation.

References

(1) Abdur, Mirza, Sajid Habib, Muhammad Ali, and Saleem Ullah. 2017. “Security Issues in the Internet of Things (IoT): A Comprehensive Study.” International Journal of Advanced Computer Science and Applications 8(6). http://thesai.org/Publications/ViewPaper?Volume=8&Issue=6&Code=ijacsa&SerialNo=50.

(2) Al-Fuqaha, Ala et al. 2015. “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications.” IEEE Communications Surveys & Tutorials 17(4): 2347–76.

(3) Banković, Zorana, David Fraga, José M. Moya, and Juan Carlos Vallejo. 2012. “Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes.” Sensors (Switzerland) 12(8): 10834–50.

(4) Fremantle, Paul, and Philip Scott. 2017. “A Survey of Secure Middleware for the Internet of Things.” PeerJ Computer Science 3: e114. https://doi.org/10.7717/peerj-cs.114.

(5) Ghosh, Amitava et al. 2010. “LTE-Advanced: Next-Generation Wireless Broadband Technology [Invited Paper.” IEEE Wireless Communications 17(3): 10–22. http://ieeexplore.ieee.org/document/5490974/ (December 24, 2017).

(6) Gomez, Carles, Joaquim Oller, and Josep Paradells. 2012. “Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology.” Sensors 12(9): 11734–53. http://www.mdpi.com/1424-8220/12/9/11734.

(7) Kumar, J Sathish, and Dhiren R Patel. 2014. “A Survey on Internet of Things: Security and Privacy Issues.” International Journal of Computer Applications 90(11).

(8) Kumar, K E Naresh, Mohd Abdul Waheed, and K Kari Basappa. 2010. “TCPL: A Defense against Wormhole Attacks in Wireless Sensor Networks.” In AIP Conference Proceedings, , 633–38.

(9) Maw., Z. Tun and A.H. 2008. “Wormhole Attack Detection in Wireless Sensor Networks.” Proceedings of World Academy of Science Engineering and TechnologyEngineering and Technology 46(3): 545–50.

(10) Memsic. 2003. “MICAz Datasheet: 6020-0065-05 Rev.” San Jose, CA, California Revision 6: 1–2.

(11) Mendez, Diego M., Ioannis Papapanagiotou, and Baijian Yang. 2017. “Internet of Things: Survey on Security and Privacy.” : 1–16. http://arxiv.org/abs/1707.01879%0Ahttp://dx.doi.org/10.1080/19393555.2018.1458258.

(12) Ronghui, He, Ma Guoqing, Wang Chunlei, and Fang Lan. 2009. “Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes.” Engineering and Technology 3(7): 286–90.

(13) Sharma, Pooja, and Pawan Bhadana. 2010. “An Effective Approach for Providing Anonymity in Wireless Sensor Network: Detecting Attacks and Security Measures.” International Journal on Computer Science and Engineering 02(05): 1830–35.

(14) Shelby, Zach, Klaus Hartke, and Carsten Bormann. 2014. “The Constrained Application Protocol (CoAP).”

(15) Vikas, B O. 2015. “Internet of Things (IoT): A Survey on Privacy Issues and Security.”

(16) Yang, Yuchen et al. 2017. “A Survey on Security and Privacy Issues in Internet-of-Things.” IEEE Internet of Things Journal.

(17) Zhou, Wei, Yuqing Zhang, and Peng Liu. 2018. “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved.” : 1–11. http://arxiv.org/abs/1802.03110.

(18) Zolertia. 2010. “Z1 Datasheet.” s: 1–20.

Downloads

Published

2018-11-04

How to Cite

Albaseer, A. M., Alkharoubi, T., & Ahmed, G. (2018). Secured Communication through Wireless Sensor Network. Discoveries in Agriculture and Food Sciences, 6(5), 30. https://doi.org/10.14738/tnc.65.5101