当前位置: X-MOL 学术Comput. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Lightweight method of shuffling overlapped data-blocks for data integrity and security in WSNs
Computer Networks ( IF 4.4 ) Pub Date : 2021-09-13 , DOI: 10.1016/j.comnet.2021.108470
Francisco Alcaraz Velasco 1 , Jose Manuel Palomares 1 , Joaquin Olivares 1
Affiliation  

Wireless Sensor Networks (WSN) consist of devices with limited resources to explore and sense the environment in a cooperative way. Security, mainly in terms of guaranteeing the data integrity, is a primary issue for many applications, but with an extra energy cost. Thus, trade-off is required between security level and energy consumption in real applications. First of all, a brief survey about security methods, focusing in data integrity, in WSN is implemented. The objective of this paper is to propose a new data integrity method with medium security levels and low energy cost. Therefore, we propose a new and lightweight mechanism for data integrity with overlapping blocks in WSNs. Hence, an attacker will spend much time and effort to interpret and alter the packets. The experiments were performed using TinyOS 2.1 operating system and TelosB nodes for measuring the overhead in terms of energy consumption, memory, and packet size. Moreover, the receiver is able to detect tampering packets and request those retransmission data. An attacker would require huge amounts of memory and processing time to extract the original information, even for small-sized data blocks. Thus, this fact makes this approach a simple, yet effective, mechanism to protect data whilst enhancing the data integrity.



中文翻译:

为 WSN 中的数据完整性和安全性改组重叠数据块的轻量级方法

无线传感器网络(WSN)由资源有限的设备组成,以协作方式探索和感知环境。安全性,主要是在保证数据完整性方面,是许多应用程序的主要问题,但需要额外的能源成本。因此,在实际应用中需要在安全级别和能耗之间进行权衡。首先,对WSN 中的安全方法进行了简要调查,重点是数据完整性。本文的目的是提出一种具有中等安全级别和低能源成本的新数据完整性方法。因此,我们提出了一种新的轻量级机制来实现WSN 中重叠块的数据完整性. 因此,攻击者将花费大量时间和精力来解释和更改数据包。实验是使用TinyOS 2.1操作系统和TelosB节点进行的,用于测量能源消耗、内存和数据包大小方面的开销。此外,接收器能够检测篡改数据包并请求那些重传数据。攻击者需要大量内存和处理时间来提取原始信息,即使是小数据块也是如此。因此,这一事实使这种方法成为一种简单而有效的机制,可以在增强数据完整性的同时保护数据。

更新日期:2021-09-13
down
wechat
bug