Abstract
Background: Nowadays, in military and border surveillance application, the WSNs become
an effective part of the command and control system. This requires an efficient type of cryptography.
Due to small size requirement, elliptic curve becomes the most suitable for such purpose.
Objective: The encryption operation, in turn, increases the power required to transmit data through
the network. The aim of this work is to reduce such power.
Methods: This work suggests three methods to reduce the needed power. The first method is
based on spread spectrum technology, which reduces the total number of levels in the network.
The second method deals with algorithm used to choose the sensing node, while the third method
suggests a cost function related directly to the available energy.
Results: Computer simulation tests show a reduction in the required energy by 40% when we apply
the first method, while the second and third methods together reduce the energy by 12% of the
total value of the whole network.
Conclusion: The energy required to transmit encrypted data can be reduced with the aid of routing
algorithms. These algorithm increase the coverage radius of the node transmission.
Keywords:
Wireless Sensor Networks (WSNs), structure-free, spread spectrum, Diffie-Hellman Elliptic Curves (DHEC), elliptic
curve cryptography, computer simulation tests.
Graphical Abstract
[3]
Fermman S. Building wireless sensor networks- Application to routing and data diffusion, 1st ISTE press. Elsevier 2018.
[4]
Kuo Y, Li Ch. Design of a wireless sensor network-Based IoT platform for wide area and heterogeneous applications. IEEE Sens J 2018; 18(12): 5187-97.
[6]
Amin F, Zubair M. Energy efficient clustering scheme for multipoint wireless sensor network. Proceedings IEEE International Multi-topic Conference (CINMT). Karachi, Pakistan.
[7]
Verma V, Singh S, Pathak N. Optimized battery models observation for static distance vector and on-demand based routing protocols over 802.11 enabled wireless sensor networks. Wireless Pers Commun 2015; 81(2): 503-17.
[8]
Tuba E, Simian D, Dolcanin E. Energy efficient sink placement in wireless sensor network by brain storm optimization algorithm. 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus
[9]
Jovanovic R, Bayram I, Vob S. Solving 2-connected m-dominating set problem using a GRASP approach for application in power systems. 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018), Doha, Qatar.
[13]
Fan K, Liiu SH, Shinha P. Structure-free data aggregation in sensor networks. IEEE T Mobile Comput 2007; 6(8): 929-42.
[14]
Chao CH, Hsiao T. Design of structure-free and energy-balanced data aggregation in wireless sensor networks. J Netw Comput Appl 2013; 37(1): 229-39.
[15]
Lu Y, Kuonen P, Hirsbrunner B. Benefits of data aggregation on energy consumption in wireless sensor network. IET Commun 2016; 11(8): 1216-23.
[16]
Sumen S, Sikdarm D, Roy S. A comparative study on routing schemes of IP based wireless sensor network. Proceedings of International Conference on Wireless and Optical Communication Networks (WOCN). Indore, India.
[17]
Mohnty P, Kabaat M. Energy efficient structure-free data aggregation and delivery in WSN. Egypt Inform J 2016; 17(3): 273-84.
[19]
Pieetro R, Maciini L, Soriento C. Data security in unattended wireless sensor networks. IEEE T Comput 2009; 58(11): 1500-11.
[21]
Singh S, Verma V, Pathak N. Sensor augmentation influence over trust and reputation models realization for dense wireless sensor networks. IEEE Sensors J 2015; 15(11): 6248-54.
[25]
Liu Z, Huang XI, Hu Z. On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE T Depend Secure 2016; 14(3): 237-48.
[27]
Hossaini MS, Saeedi E, Kong Y. Parallel point multiplication architecture using combined group operations for high speed cryptographic applications. Plos One 2017; 12(5): 1-18.
[28]
Liu Z, Liu D, Zou X. An efficient and flexible hardware implementation of the du-al-field elliptic curve cryptography processor. IEEE T Ind Electron 2017; 64(3): 2353-62.
[29]
Florees L, Sandovl M, Cumplido R. Compact FPGA hardware architecture for public key encryption in embedded devices. Plos One 2018; 13(51): 1-12.
[30]
Torrieri D. Principles of spread spectrum communication systems. 4th ed. Springer 2018.