Secure Data Transfer using Cryptography with Virtual Energy for Wireless Sensor Network

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-8                      
Year of Publication : 2013
Authors : Mr. Bhavin N Patel , Ms. Neha Pandya

Citation 

Mr. Bhavin N Patel , Ms. Neha Pandya. "Secure Data Transfer using Cryptography with Virtual Energy for Wireless Sensor Network". International Journal of Engineering Trends and Technology (IJETT). V4(8):3468-3473 Jul 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

The wireless sensor network technology is one of the largest data processing and communication networks systems which continuously developed for distributed environment in field of real time application. There are so many factor associated with it’s as Data security, operating speed, cost efficiency and additional sensor network constraints. Main consideration is about increase the security over existing attacks without aff ect the performance and complexity of overall wireless sensor network. Normally, two approach of symmetric key and asymmetric key data encryption technique is applied for it at sensor nodes. So, the proposed work is to explore design of cost efficient secu re network protocol which reduces number of key transmission required in symmetric key encryption for rekeying task. In proposed algorithm mainly three steps are performed as key generation, data cryptography and data transmission. First generation of key is done by method of dynamic key approach using virtual energy value of sensor node. Then mechanism of symmetric key block cipher algorithm RC5 is performed for data cryptography. After that encrypted data packet transferred over the network using TCP/IP p rotocol layer in WSN. It also has performance evaluation to achieved benefit of lightweight symmetric key block cipher algorithm for proposed work in unreliable medium of wireless sensor network

References

[1] S. Uluagac, R. A. Beyah, Yingshu Li, A. Copeland “VEBEK: Vi rtual Energy Based Encryption and Keying for wireless sensor networks “ IEEE Transaction on Mobile Computing vol. 9 No 7 pp.994 - 1007 July 2010.
[2] S.Bhargavi, Ranjitha B.T, “Implementation of Node Energy Based On Encryption Keying” International Journal of Ad vanced Computer Science and Applications, Vol. 2, No. 8, 2011.
[3] K. Ravi Chythanya, S.P.Anandaraj and S. Padmaja, “Virtual Energy Efficient Encryption and Keying for wireless sensor networks” International Journal on Computer Science and Engineering, August, 2011.
[4] H. Hou, C. Corbett, Y. Li, and R. Beyah, “Dynamic Energy - Based Encoding and Filtering in Sensor Networks,” Proc. IEEE Military Comm. Conf. (MILCOM ’07), Oct. 2007.
[5] Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, “Performance Evaluation of Encr yption Algorithm for Wireless Sensor Networks” International Conference on Information Technology and e - Services, 2012.
[6] Juha Kukkurainen, Mikael Soini, Lauri Sydanheimo, “RC5 - Based Security in Wireless Sensor Networks: Utilization and Performance” WSEAS TR ANSACTIONS on COMPUTERS, ISSN: 1109 - 2750, Issue 10, Volume 9, October 2010.
[7] Tingyuan Nie, Yansheng Li, Chuanwang Song, “Performance Evaluation of CAST and RC5 Encryption Algorithms” International Conference on Computing, Control and Industrial Engineering, year - 2010.
[8] Abu Shohel Ahmed, “An Evaluation of Security Protocols on Wireless Sensor Network” TKK T - 110.5190 Seminar on Internetworking, 2009.
[9] S.Prasanna, Srinivasa Rao, “An Overview of Wireless Sensor Networks Applications and Security” International Jou rnal of Soft Computing and Engineering (IJSCE) ISSN: 2231 - 2307, Volume - 2, Issue - 2, May 2012.
[10] Dhanashri H. Gawali, Vijay M. Wadhai, “RC5 Algorithm: potential cipher solution for security in WBSN” International Journal of Advanced Smart Sensor Network System s (IJASSN), Volume 2, No.3, July 2012.
[11] Abhishek Pandey, R.C. Tripathi, “A Survey on Wireless Sensor Networks Security” International Journal of Computer Applications (0975 – 8887) Volume 3 – No.2, June 2010.
[12] Mohammad AL - Rousan, A. Rjoub and Ahmad Baset, “A Low - Energy Security Algorithm for Exchanging Information in Wireless Sensor Networks” Journal of Information Assurance and Security, Issue - 4, 2009.
[13] Anu Jyothy, “Secure and Efficient Data Transfer in WSN” International Journal of Electronics & Communicatio n Technology, ISSN: 2230 - 9543, Vol. 2, Issue 3, Sept. 2011.
[14] Omar Elkeelany, “Design and Analysis of Various Models of RC5 - 192 Embedded Information Security Algorithm”, International journal of applied mathematics and informatics, Issue 1, Volume 2, 2008.
[15] E lias Ekonomou and Kate Booth, “SecRose: a data transportation layer security mechanism for Wireless Sensor Networks”, International journal of computer application and security, 2006.
[16] R.L. Rivest, “The RC5 Encryption Algorithm”, Proc. 2nd International Wor kshop on Fast Software Encryption, Leuven, Belgium, December 1994.
[17] Ganapathi Avabrath, “Some Issues of Wireless Sensor Networks”, International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
[18] K. Naga Krishnaja, “Cryptogra phy via Virtual Energy for Wireless Sensor Networks”, International Journal of Information and Education Technology vol. 2, no. 1, pp. 51 - 56, 2012.
[19] Boshir Ahmed, Md. Khaled Ben Islam, Julia Rahman, “Simulation, Analysis and Performance Comparison among dif ferent Routing Protocols for Wireless Sensor Network”, Computer Engineering and Intelligent Systems, Vol . 2 , No . 4 , 2011.
[20] Aditya Shukla, Anurag Pandey, Saurabh Srivastava, “Virtual Energy Based Encryption & Keying on Wireless Sensor Network’’, IOSR Journal of Computer Engineering (IOSR - JCE) e - ISSN: 2278 - 0661, p - ISSN: 2278 - 8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 34 - 43.

Keywords
Wireless sensor network security, cryptography with virtual energy, WSN data encryption, symmetric key cryptography for WSN .