Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 2678269, 9 pages
http://dx.doi.org/10.1155/2016/2678269
Research Article

Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks

School of Electronic Engineering, Soongsil University, 369 Sangdo-ro, Dongjak-gu, Seoul 06987, Republic of Korea

Received 16 November 2015; Revised 5 February 2016; Accepted 11 February 2016

Academic Editor: Hana Vaisocherova

Copyright © 2016 Jong Min Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Kim, H. Lee, J. Yi, M. Park, and D. Noh, “Energy-aware data encryption for solar-powered wireless sensor networks,” in Proceedings of the IEEE Asia Pacific Wireless Communications Symposium (IEEE VTS APWCS '15), Singapore, 2015.
  3. J. M. Gilbert and F. Balouchi, “Comparison of energy harvesting systems for wireless sensor networks,” International Journal of Automation and Computing, vol. 5, no. 4, pp. 334–347, 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. A. H. Sellers and P. J. Robinson, Contemporary Climatology, Longman Scientific & Technical, New York, NY, USA, 1986.
  5. J. L. Monteith and M. H. Unsworth, Principles of Environmental Physics, Edward Arnold, London, UK, 1990.
  6. T. Liu, C. M. Sadler, P. Zhang, and M. Martonosi, “Implementing software on resource-constrained mobile sensors: experiences with impala and ZebraNet,” in Proceedings of the 2nd Annual Mobile Systems, Applications, and Services (MobiSys '04), pp. 256–269, ACM, Boston, Mass, USA, June 2004. View at Publisher · View at Google Scholar
  7. G. Tolle, J. Polastre, R. Szewczyk et al., “A macroscope in the redwoods,” in Proceedings of the 3rd Annual ACM International Conference on Embedded Networked Sensor Systems (SenSys '05), pp. 51–63, San Diego, Calif, USA, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. C. M. Vigorito, D. Ganesan, and A. G. Barto, “Adaptive control of duty cycling in energy-harvesting wireless sensor networks,” in Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '07), pp. 21–30, IEEE, San Diego, Calif, USA, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Alippi and C. Galperti, “An adaptive system for optimal solar energy harvesting in wireless sensor network nodes,” IEEE Transactions on Circuits and Systems. I. Regular Papers, vol. 55, no. 6, pp. 1742–1750, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. J. Taneja, J. Jeong, and D. Culler, “Design, modeling and capacity planning for micro-solar power sensor networks,” in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN '08), pp. 407–418, St. Louis, Mo, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. X. Jiang, J. Polastre, and D. Culler, “Perpetual environmentally powered sensor networks,” in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), pp. 463–468, IEEE, New York, NY, USA, April 2005. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Round, B. P. Otis, Y. Chee, J. M. Rabaey, and P. Wright, “A 1.9 GHz RF transmit beacon using environmentally scavenged energy luminance scaling,” in Proceedings of the International Symposium on Low Power Electronics and Design, Seoul, Republic of Korea, August 2003.
  13. T. Voigt, H. Ritter, and J. Schiller, “Utilizing solar power in wireless sensor networks,” in Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN '03), pp. 416–422, Bonn, Germany, 2003. View at Publisher · View at Google Scholar
  14. A. Kansal, J. Hsu, M. Srivastava, and V. Raghunathan, “Harvesting aware power management for sensor networks,” in Proceedings of the 43rd Annual Design Automation Conference, pp. 651–656, San Francisco, Calif, USA, 2006.
  15. D. Noh, D. Lee, and H. Shin, “QoS-aware geographic routing for solar-powered wireless sensor networks,” IEICE Transactions on Communications, vol. 90, no. 12, pp. 3373–3382, 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. D. Noh, I. Yoon, and H. Shin, “Low-latency geographic routing for asynchronous energy-harvesting WSNs,” Journal of Networks, vol. 3, no. 1, pp. 78–85, 2008. View at Google Scholar · View at Scopus
  17. D. K. Noh and J. Hur, “Using a dynamic backbone for efficient data delivery in solar-powered WSNs,” Journal of Network and Computer Applications, vol. 35, no. 4, pp. 1277–1284, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Yang, L. Wang, D. K. Noh, H. K. Le, and T. F. Abdelzaher, “SolarStore: enhancing data reliability in solar-powered storage-centric sensor networks,” in Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys '09), pp. 333–346, ACM, Kraków, Poland, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002. View at Publisher · View at Google Scholar · View at Scopus
  20. P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” in Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference, San Antonio, Tex, USA, January 2002.
  21. L. Hu and D. Evans, “Secure aggregation for wireless networks,” in Proceedings of the Symposium on Applications and the Internet Workshops (SAINT '03 Workshops), pp. 384–391, Orlando, Fla, USA, 2003.
  22. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-route filtering of injected false data in sensor networks,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '04), pp. 2446–2457, Hong Kong, March 2004. View at Publisher · View at Google Scholar · View at Scopus
  23. T. Kaya, G. Lin, G. Noubir, and A. Yilmaz, “Secure multicast groups on adhoc networks,” in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pp. 94–102, 2003.
  24. NIST Standards, “Advanced encryption standard (AES),” FIPS PUB 197, 2001. View at Google Scholar
  25. A. Liu and P. Ning, “TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks,” in Proceedings of the 7th IEEE International Conference on Information Processing in Sensor Networks (IPSN '08), pp. 245–256, St. Louis, Mo, USA, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 197–215, IEEE, Washington, DC, USA, May 2003. View at Scopus
  27. R. H. Walden, “Analog-to-digital converter survey and analysis,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 4, pp. 539–550, 1999. View at Publisher · View at Google Scholar · View at Scopus
  28. N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Cryptographic Hardware and Embedded Systems—CHES 2004, pp. 119–132, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  29. D. J. Malan, M. Welsh, and M. D. Smith, “A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography,” in Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON '04), IEEE, 2004.
  30. H. Wang and Q. Li, “Efficient implementation of public key cryptosystems on mote sensors (short paper),” in Information and Communications Security, vol. 4307 of Lecture Notes in Computer Science, pp. 519–528, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  31. J. Polastre, R. Szewczyk, and D. Culler, “Telos: enabling ultra-low power wireless research,” in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), pp. 364–369, Seattle, Wash, USA, April 2005. View at Publisher · View at Google Scholar · View at Scopus
  32. R. Wu, M. Chen, Y. Su, and H. J. Siddiqui, “A novel location-based routing algorithm for energy balance in wireless sensor networks,” in Proceedings of the WRI International Conference on Communications and Mobile Computing (CMC '09), pp. 568–572, Yunnan, China, January 2009. View at Publisher · View at Google Scholar · View at Scopus
  33. Crossbow Products, http://www.openautomation.net/uploadsproductos/micaz_datasheet.pdf.
  34. Crossbow Products, http://wsn.cse.wustl.edu/images/e/e3/Imote2_Datasheet.pdf.
  35. Jennic Ltd, “JN5139 Wireless Microcontroller (IEEE 802.15.4 and ZigBee),” 2008, http://www.glynstore.com/content/docs/jennic/JN-DS-JN5139-001-1v9.pdf.
  36. J. M. Yi, M. J. Kang, and D. K. Noh, “SolarCastalia: solar energy harvesting wireless sensor network simulator,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 415174, 10 pages, 2015. View at Publisher · View at Google Scholar