Secure Group Communication in WSN based on Integrated approach of Chaos and Neural Network

  • Authors

    • H S Annapurna
    • M Siddappa
    2018-06-25
    https://doi.org/10.14419/ijet.v7i3.4.16778
  • Chaos, Logistic map, Lozi map, Neural Network, Wireless Sensor Network.
  • With advancement in technology,   at present, there is possibility to develop low cost sensors in the area of wireless sensor network. Often in practice, there are huge numbers of sensors, which are deployed in hostile environment. Hence, there is a need to develop the security mechanism so that defined applications can serve the purpose. Two areas come under security consideration, protection for communication data and authentication of communicating parties. In this paper, chaos and neural network based centralized security mechanism has been developed. Two different types of chaotic maps, Lozi and Logistic maps have been integrated with feed-forward architecture of neural network to deliver the security provision. The sensitiveness with initial conditions of chaos has been exploited for key development. Proposed method not only provides high level of security but also carries high level of flexibility, scalability and computational efficiency.

     

     

  • References

    1. [1] Yu-Yi Chen, Chuan-Chiang Huang, Jinn-Ke Jan,"The Design of Secure Group Communication with Contributory Group Key Agreement Based on Mobile Ad Hoc Network “, International Symposium on Computer, Consumer and Control (IS3C) ,Year: 2016 Pages: 455 - 460, DOI: 10.1109/IS3C.2016.121

      [2] Milan Schmittner, Matthias Hollick,â€Xcastor: Secure and scalable group communication in ad hoc networks “, IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM),Year: 2016, Pages: 1 - 6, DOI: 10.1109/WoWMoM.2016.7523512

      [3] M. Tamer Refaei, Jeffrey Bush, â€Secure Reliable Group Communication for Tactical Networks “, IEEE Military Communications Conference, Year: 2014, Pages: 1195 - 1200, DOI: 10.1109/MILCOM.2014.200

      [4] Xixiang Lv, Hui Li, "Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networksâ€, IET Information Security, Year: 2013, Volume: 7, Issue: 2,Pages: 61 - 66, DOI: 10.1049/iet-ifs.2010.0314

      [5] Fan Wu; Hao-Ting Pai; Xinxin Zhu; Pei-Yun Hsueh; Ya-Han Hu,"Dynamic access control for secure group communication in wireless sensor networks “, The 8th Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology (ECTI) Association of Thailand – Conference, Year: 2011 , Pages: 288 - 291, DOI: 10.1109/ECTICON.2011.5947829

      [6] Omar Cheikhrouhou; Anis Koubâa; Olfa Gaddour; Gianluca Dini; Mohamed Abid,"RiSeG: A logical ring based secure group communication protocol for Wireless Sensor Networks “, International Conference on Wireless and Ubiquitous Systems ,Year: 2010 ,Pages: 1 - 5, DOI: 10.1109/ICWUS.2010.5670431

      [7] Bezawada Bruhadeshwar; Sandeep S. Kulkarni ,â€Balancing Revocation and Storage Trade-Offs in Secure Group Communication “, IEEE Transactions on Dependable and Secure Computing ,Year: 2011, Volume: 8, Issue: 1 ,Pages: 58 - 73, DOI: 10.1109/TDSC.2009.27

      [8] Lina Ge,"Geometric Approaches-Based Key Assignment for Secure Group Communication System “, Second International Conference on Future Networks ,Year: 2010 ,Pages: 415 - 419, DOI: 10.1109/ICFN.2010.51

      [9] Olfa Gaddour; Anis Koubâa; Mohamed Abid ,â€SeGCom: A secure group communication mechanism in cluster-tree wireless sensor networks “, First International Conference on Communications and Networking ,Year: 2009 ,Pages: 1 - 7, DOI: 10.1109/COMNET.2009.5373554

      [10] Firdous Kausar,, Sajid Hussain,, Jong Hyuk Park,, Ashraf Masood,â€Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks, Mobile Ad-Hoc and Sensor Networksâ€, Volume 4864 of the series Lecture Notes in Computer Science pp 737-748, 2007

      [11] Asma Khalid,, Mukhtar Hussain,â€A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks, Advances in Information Security and Assuranceâ€, Volume 5576 of the series Lecture Notes in Computer Science pp 712-721, 2009

      [12] Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao, â€Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks, Security and Privacy in Communication Networksâ€, Volume 19 of the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering pp 285-295, 2009

      [13] Pawel Szalachowski1, Tiffany Hyun-Jin Kim,â€Secure broadcast in distributed networks with strong adversariesâ€, Security and Communication Networks, Volume 8, Issue 18 ,Pages 3739-3750, Dec 2015.

      [14] Ataullah Ghafoor , Muhammad Sher , Muhammad Imran Kashif Saleem,â€A Lightweight Key Freshness Scheme for Wireless Sensor Networksâ€, 12th International Conference on Information Technology - New Generations (ITNG), 2015.

      [15] Wenbin Yao, Si Han, Xiaoyong Li, “LKH++ Based Group Key Management Scheme for Wireless Sensor Networkâ€, Wireless Pers Commun, DOI 10.1007/s11277-015-2582-0, 2015.

      [16] Danyang Qin, Shuang Jia, Songxiang Yang, ErfuWang, Qun Ding, “A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networksâ€, Hindawi Publishing Corporation, Journal of Sensors, Volume 2016, Article ID 1547963, 2016.

      [17] Omar Cheikhrouhou, “Secure Group Communication in Wireless Sensor Networksâ€, Journal of Network and Computer Applications, Volume 61, Issue C, 2016, Pages 115-132, DOI:10.1016/j.jnca.2015.10.011.

      [18] Dimitris Tsitsipis, Anthony Tzes, Stavros Koubias, “CHAT: Clustered hierarchical key management for wireless sensor networks using network topologyâ€, International Journal of Distributed Sensor Networks, Year: 2017, Vol. 13(11) DOI: 10.1177/1550147717741570.

  • Downloads

  • How to Cite

    S Annapurna, H., & Siddappa, M. (2018). Secure Group Communication in WSN based on Integrated approach of Chaos and Neural Network. International Journal of Engineering & Technology, 7(3.4), 223-230. https://doi.org/10.14419/ijet.v7i3.4.16778