تجاوز إلى المحتوى الرئيسي
User Image

Kashif Saleem, Ph.D.

Associate Professor

Associate Professor

علوم الحاسب والمعلومات
Office No. 2, Center of Excellence in Information Assurance (CoEIA), Building No. 31, King Saud University, Riyadh
المنشورات
مقال فى مجلة
2016
تم النشر فى:

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

Saleem, Kashif . 2016

autonomous; communication; cost-effective; cryptography; efficient; key management; routing protocol

The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

رقم المجلد
4
رقم الانشاء
10.3390/s16040460
مجلة/صحيفة
Sensors
الصفحات
16
مزيد من المنشورات
publications

Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records are worth 10 times…

بواسطة Khan Zeb, Kashif Saleem, Jalal Al Muhtadi, Christoph Thuemmler
2016
publications

Information and Communication Technologies (ICT) based applications for Ambient Assisted Living (AAL) help elderly or individual people living home alone. AAL system reliability is mostly based on…

بواسطة Kashif Saleem, Khan Zeb, Abdelouhid Derhab, Haider Abbas, Jalal Al-Muhtadi, Mehmet A. Orgun, Amjad Gawanmeh
2016
publications

E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be…

بواسطة Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem, Haider Abbas, Mehmet Orgun, Waseem Iqbal, Baber Aslam
2017