SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 171
Analyzing & Securing Data Transmission in Wireless Sensor
Networks through Cryptography Techniques
Shahid Ishaq1*, Rashmi Raj2
1Research Scholar, 2Assistant Professor
Department of Electronics and Communication Engineering,
Universal Institute of Engineering & Technology, Mohali, Punjab
ABSTRACT
Wireless Sensor Networks are gaining popularity in various fields and areas.
But these nodes are vulnerable as they are open networks and easily
accessible. The major challenge is to have a secure data transmission between
the nodes. To establish a secure transmission, we require a security scheme
like a cryptographic algorithm, but this also requires a securekeydistribution
between nodes. The WSN’s have constraints like limited area, power and
memory which restrict all the categories of cryptographic algorithm.
Depending upon the criteria’s and constraints, cryptographic algorithm like
Elliptic Curve Cryptography (ECC)is bestsuitableforWSN’s environment.ECC
has a smaller key size, high security and less computation time which makes
the node an efficient crypto system. In order to protect the security ofdata,we
propose a novel secure transmission strategy based on Cryptography. In this
design, we acquire sensitive information securely so as to make use of the
advantage of encryption. Our approach deal withthe weakness oflimitationin
sensor node resources and the security threats, it is suitableforstreamdata in
sensor nodes. The simulation experiments also demonstrate that this
approach is effective in transmitting sensitive data covertly with the
characteristics of lower energy consumptions and invisibility. This paper
describes the implementationofECCcryptosystemfor WSNforsecurekey and
data transmission between the nodes.
KEYWORDS: WSN, IEEE 802.15, Cryptograhical, Remote Sensor
How to cite this paper: Shahid Ishaq |
Rashmi Raj "Analyzing & Securing Data
Transmission in Wireless Sensor
Networks through
Cryptography
Techniques"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-6470, Volume-4 |
Issue-3, April 2020, pp.171-175, URL:
www.ijtsrd.com/papers/ijtsrd30328.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
Wireless sensor network (WSN) is a self-organized multi-
hop network composed of a large number of sensor nodes
[1]. Each sensor node has the ability to sense data, process
data, and communicates with others, so it is data-centric
network. WSN is typically used in environment monitoring,
healthcare, traffic management and battlefield. The data
transmitted between the nodes may be sensitive (e.g.
offensive weapon, troop movement, defense information).
The whole network will be threatenediftheyare revealed by
an eavesdropper. So it is vital for us to adopt effective
strategy to ensure the transmission safety of the secret
information.
In this paper, we propose a new secure transmission
strategy based on encryption by using its characteristic
which shrouds the data security without encryption, to aim
at the weakness of limitation in sensor node resources and
the security threats.
Unlike in existing schemes, it transmits data after embeds
sensitive information into ordinary information. Compared
with existing strategies, our strategy has obvious
advantages. Transmitting the encryptive sensitive data can
decrease the risk of communication from being monitored,
intercepted and the communication overhead can be
decreased. A real time hiding/extraction algorithm is
proposed to stream data, which conceals and extracts the
sensitive data effectively with low energy consumption.
The functionality of sensor nodes is limited by processing
power, storage capacity, communication, and battery
resources. The nodes are always exposed in open fields
where they are unreachable. Any node may become a attack
target with external and internal security risks including
eavesdrop, DoS (Denial-of-Service), leak, tamper, infuse,
playback, misguide, disrupt and others.
WSN needs to guarantee the security of network, nodes and
data, while the security of the data is the most important
including confidentiality, authentication, integrity and
Freshness. The existing threats in WSN could be solved by
making use of the data security technology to a great extent.
Cryptography and digital watermarking are the two major
data security technologies. At present, the mechanism to
solve this is mainly cryptography based such as data
encryption, message authentication, integrity ensuring and
broadcast validation. The available asymmetric
cryptography and other ciphers cannot suitable due to the
hardware restrictions. So researches of data security focus
on key establishment, exchange, distribution and
management mostly. Examples include pre-distribution,
IJTSRD30328
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 172
random key assignment, pair-wise key scheme, group-wise
key scheme, and etc.
Fig No. 1.1: Basic blocks of Sensing Networks
The authentication and key management technologies in
WSN become burdensome, which depend on the security of
key heavily. It is difficult to be solved entirely only by secure
key. Designing a new security mechanism, obviating
potential security problem effectively and reducing security
threat are hard assignment. New approaches are required
for WSN development and application.
As the WSN’s communication is open, WSNs are highly
susceptible and at high risk, thereby effecting the entire
system, if suitable safety measures are not taken.
Authentication between WSN’s plays an important role in
securing data transmission against various types of attacks
like node impersonation, falsification of data, replay attacks
etc. Another issue is that WSN’s are a combination of many
tiny and low-cost sensor nodes where they have limited
energy and limitedcomputationabilitytoprocessortransmit
the data. Thereby securing WSNs with it presents
environmental resource-constrained has been becoming a
challenging task. WSN’s is a combination of multiple self
organized sensor nodes capable of communicating
wirelessly and security requirements are similar to any
usual computer networks [1, 2]. As the WSNs have various
constrains, all security solutions applicable forconventional
computer networks
Fig No. 1.2: Functionality of a Sensor Node
Problems to be Evaluated:
Proposed a proficient gathering key exchange convention in
view of a direct mystery sharing for remote sensor systems
(WSNs), if aggregate key validation.Security examinationfor
conceivable assaults is incorporated. Therefore, this
convention can oppose potential assaults and furthermore
fundamentally diminish the overhead of framework
execution.
Proposed Algorithm:
Here we have implemented ECC for WSN on a Matlab
simulator. From the survey made in our earlier stages, we
can conclude that ECC is a better algorithm than RSA as it
requires smaller key without compromising with the
security aspects. We have tried to implement a topology.
One of the major concerns is the mutual authentication
between the nodes in WSN’s. This issue is resolved by the
proposed ECC technique used for secure data
communication.
In our topology there is a Sender and a Receiver, where they
are communicating and data transfer takes place among
them self. We also have shown an attacker as Eve, who also
tries to access the data transmitted between the Sender and
the Receiver. Since the data andWSN nodes,bothareinopen
and vulnerable for attackers, there is a need for security
within the nodes and for the data. By implementing ECC in
WSN, the nodes can securely transmit data. The Sender and
Receiver each generate their ownPrivateKeyandPublic Key
for each others. These keys are generated using the elliptic
curve and the points on that curve generated. Both the
Sender and receiver decide on to which curve and the finite
points. When a node wants to communicate or send date
with some other node, then the sender node uses its own
Private Key and the Public Key of the intended node to
generate a Shared Key. This Shared Key is used for
Encryption of the data to send across other nodes. Once a
node receives a data, the receiver also generates a Shared
Key. This Shared Key is used for Decryption ofthedata atthe
receiver end. On the other hand the Eve also receives the
Public Keys generated by both the Sender and the Receiver
nodes. We also try to show that the Eve in spite of having the
Public Keys of both the nodes still cannot generate the
Shared Keys as the Eve does not have the Private Keys of
both the nodes, thus securing the data. We also show that
even if the Eve generates same set of points in the elliptic
curve and assuming that Eve also has same set of finite
points, still it is not possible for the Eve to generate the
Shared key. By the time Eve tries to decrypt the data using
various keys, next set of data transmissions are over
.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 173
Results:
In the wake of performing nuts and bolts of calculation we
have gotten taking after reproduction comes about
indicating essentials of encryption unscrambling comes
about. Utilization of this symmetric calculation gives us the
outcomes demonstrating that the this calculation is more
suited over the uneven ones as the symmetrical calculations
are more dependable with variable key administration era
procedures giving productive security objectives as the key
size is in distinguishable and shifted at each progression
without being in need to make them known to all hubs in a
system as private key is not figured by open key of the
system gave as a security highlight of deviated
cryptosystems. Likewise the symmetricalcryptosystems are
more effective in security objectives accomplishment when
contrasted with asymmetrical ones as they have to give the
connection keys publically which causes unapproved
assaults and client's information security surrenders.
Fig No. 1.3: Nodes formation for base paper.
Fig No.1.4: Total stimulation time graph
Fig No 1.5: Simulation time required and dead and alive
nodes information of base paper
Fig No 1.6: Simulation cluster formation
Fig No 1.7: Energy dissipation over time of proposed work
simulation results
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 174
Fig No 1.8: Comparison of nodes-70,100,150 for energy
dissipation graphs for proposed work.
a) For base work-total stimulation time b) for proposed
work-total stimulation time
Fig No 1.9: Nodes comparison for energy dissipation
graphs for proposed work
Fig No 1.10 : Delay graphs of 100-nodes-comparision b/w
base paper and proposed work
Fig No 1.11: Combined delay graphs between base paper
and proposed work
Fig No 1.12 : Comparison graphs between base paper and
proposed work on the basis of energy dissipation
Conclusion:
We have compared files of various sizes and compared both
the algorithms. The results are also shown in terms of bar
graphs as shown. The comparison has been made with the
standard algorithm, which is a traditional and the mostused
algorithm, with proposed algorithm. In our findings, here it
is clearly seen that ECC consumes more time once in the
beginning, we can see that, for a file size of 7 KB the
encryption is drasticallymoreforencryptionand from12 KB
it requires less time and increases gradually for encryption.
Though ECC requires more time for encryption, the key size
is too small compared to RSA. However the decryption time
taken by ECC is very less than the traditional RSA algorithm,
even if the file size increases as shown. The decryption time
for ECC is nearly similar for all files compared to RSA
algorithm. Compared with the other three results, our
obtained results are better by an average of 20%. The
implementation of Elliptic curve can be further extended to
implement on hyper elliptic curves on WSN. FurthertheECC
can also have various types of point generation methods on
the curve and ECC can also be integrated with other
cryptographic algorithms for additional security.
ACKNOWLEDGEMENT
I express my sincere gratitude to the I.K.Gujral Punjab
Technical University, Jalandhar for giving me the
opportunity to work on the thesis during my final year of
M.Tech. I owe mysincerestgratitudetowardsDr.Prabhjot
Kaur, Director Engg, Universal Institute of Engineering
and Technology, Lalru, for valuable advice and healthy
criticism throughout my thesis which helped me
immensely to complete my work successfully.
I would like to express a deep sense of gratitude and
thanks profusely to Er. Rashmi Raj Assistant Professor,
DepartmentofElectronics&CommunicationEngineering,
UIET, who was the thesis Supervisor. Without the wise
counsel and able guidance, itwould have beenimpossible
to complete the thesis in this manner.
I would like to thank the members of the Departmental
Research Committee for their valuable suggestions and
healthy criticism during my presentation of the work. I
express gratitude to other faculty members of Electronics &
Communication Engineering Department, UIET, for their
intellectual support throughout the course of this work.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 175
References:
[1] T. Gao, D. Greenspan, M. Welsh, R. R. Juang, and A. Alm,
"Fundamental signs observing and understanding
following over a remote system," in Proc. IEEE 27th
Annu. Int. Conf. Eng. Med. Biol. Soc. (IEEE-EMBS), Jan.
2006, pp. 102–105.
[2] L. Gu et al., "Lightweight recognition and grouping for
remote sensor arranges in reasonable conditions," in
Proc. third ACM Conf. Implanted Network Sensor
System, Nov. 2005, pp. 205–217.
[3] G. J. Pottie and W. J. Kaiser, "Remote incorporated
system sensors," CommunicationACM,vol.43,no.5,pp.
51–58, 2000.
[4] L. Eschenauer and V. D. Gligor, "A key-administration
plot for dispersed sensor systems," inProc. ninth ACM
Conf. CCS, 2002, pp. 41–47.
[5] H. Chan, A. Perrig, and D. Melody, "Irregular key pre
appropriation plans for sensor systems,"in Proc. IEEE
Symp. SP, May 2003, pp. 197–213.
[6] W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A
key administration conspire forremote sensorsystems
utilizing organization learning," in Proc. IEEE
INFOCOM, Mar. 2004, pp.586–597.
[7] A. Rasheed and R. Mahapatra,"Keyredistributionplans
for building up pairwise keys with aversatile sink in
sensor systems," IEEE Trans. Parallel Distrib. Syst., vol.
22, no. 1, pp. 176–184,Jan. 2011.
[8] S, Ruj, A, Nayak, and I. Stojmenovic,"Pairwiseandtriple
key dispersion in remote sensor systems with
applications," IEEE Trans. Comput., vol. 62, no. 11, pp.
2224–2237, Nov. 2013.
[9] F. Li and P. Xiong, "Reasonable secure correspondence
for incorporating remote sensor systems into the
Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp.
3677–3684, Oct. 2013.
[10] R. Blom, "Non-open key appropriation," in Advances in
Cryptology, D. Chaum, R. L. Rivest, and A. T. Sherman,
Eds. New York, NY, USA: Plenum, 1982, pp. 231–236.
[11] Daehee Kim, Sunshin ―Ef icient and Scalable Public
Key Infrastructurefor Wireless SensorNetworks‖,This
work was partly supported by the National Research
Foundation of Korea (NRF) grant funded by the Korea
government (MEST), (No. 2012KlA3AlA09026959)
978-1-4799-5874-0/14/©2016 IEEE.

More Related Content

What's hot

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Pvrtechnologies Nellore
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detectingjpstudcorner
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice basedijcsa
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks IJECEIAES
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inFinalyear Projects
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeIJMTST Journal
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chIJECEIAES
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...IRJET Journal
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LeMeniz Infotech
 

What's hot (19)

Ew25914917
Ew25914917Ew25914917
Ew25914917
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...
 
Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...Lightweight secure scheme for detecting provenance forgery and packet drop at...
Lightweight secure scheme for detecting provenance forgery and packet drop at...
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
 
An efficient approach for secured communication in wireless sensor networks
 An efficient approach for secured communication in wireless sensor networks  An efficient approach for secured communication in wireless sensor networks
An efficient approach for secured communication in wireless sensor networks
 
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
 
V 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 chV 14 15432 8feb 27jan 6sep18 ch
V 14 15432 8feb 27jan 6sep18 ch
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...IRJET- -  	  Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
A0320105
A0320105A0320105
A0320105
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 

Similar to Analyzing and Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques

A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksZac Darcy
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...ijtsrd
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 

Similar to Analyzing and Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques (20)

A Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor NetworksA Key Management Approach For Wireless Sensor Networks
A Key Management Approach For Wireless Sensor Networks
 
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
D0371028039
D0371028039D0371028039
D0371028039
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
A05510105
A05510105A05510105
A05510105
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Proximate node aware optimal and secure data aggregation in wireless sensor ...
Proximate node aware optimal and secure data aggregation in  wireless sensor ...Proximate node aware optimal and secure data aggregation in  wireless sensor ...
Proximate node aware optimal and secure data aggregation in wireless sensor ...
 
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
Network Security Enhancement in WSN by Detecting Misbehavioural Activity as C...
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Analyzing and Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 171 Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques Shahid Ishaq1*, Rashmi Raj2 1Research Scholar, 2Assistant Professor Department of Electronics and Communication Engineering, Universal Institute of Engineering & Technology, Mohali, Punjab ABSTRACT Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a securekeydistribution between nodes. The WSN’s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria’s and constraints, cryptographic algorithm like Elliptic Curve Cryptography (ECC)is bestsuitableforWSN’s environment.ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security ofdata,we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal withthe weakness oflimitationin sensor node resources and the security threats, it is suitableforstreamdata in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementationofECCcryptosystemfor WSNforsecurekey and data transmission between the nodes. KEYWORDS: WSN, IEEE 802.15, Cryptograhical, Remote Sensor How to cite this paper: Shahid Ishaq | Rashmi Raj "Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3, April 2020, pp.171-175, URL: www.ijtsrd.com/papers/ijtsrd30328.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION Wireless sensor network (WSN) is a self-organized multi- hop network composed of a large number of sensor nodes [1]. Each sensor node has the ability to sense data, process data, and communicates with others, so it is data-centric network. WSN is typically used in environment monitoring, healthcare, traffic management and battlefield. The data transmitted between the nodes may be sensitive (e.g. offensive weapon, troop movement, defense information). The whole network will be threatenediftheyare revealed by an eavesdropper. So it is vital for us to adopt effective strategy to ensure the transmission safety of the secret information. In this paper, we propose a new secure transmission strategy based on encryption by using its characteristic which shrouds the data security without encryption, to aim at the weakness of limitation in sensor node resources and the security threats. Unlike in existing schemes, it transmits data after embeds sensitive information into ordinary information. Compared with existing strategies, our strategy has obvious advantages. Transmitting the encryptive sensitive data can decrease the risk of communication from being monitored, intercepted and the communication overhead can be decreased. A real time hiding/extraction algorithm is proposed to stream data, which conceals and extracts the sensitive data effectively with low energy consumption. The functionality of sensor nodes is limited by processing power, storage capacity, communication, and battery resources. The nodes are always exposed in open fields where they are unreachable. Any node may become a attack target with external and internal security risks including eavesdrop, DoS (Denial-of-Service), leak, tamper, infuse, playback, misguide, disrupt and others. WSN needs to guarantee the security of network, nodes and data, while the security of the data is the most important including confidentiality, authentication, integrity and Freshness. The existing threats in WSN could be solved by making use of the data security technology to a great extent. Cryptography and digital watermarking are the two major data security technologies. At present, the mechanism to solve this is mainly cryptography based such as data encryption, message authentication, integrity ensuring and broadcast validation. The available asymmetric cryptography and other ciphers cannot suitable due to the hardware restrictions. So researches of data security focus on key establishment, exchange, distribution and management mostly. Examples include pre-distribution, IJTSRD30328
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 172 random key assignment, pair-wise key scheme, group-wise key scheme, and etc. Fig No. 1.1: Basic blocks of Sensing Networks The authentication and key management technologies in WSN become burdensome, which depend on the security of key heavily. It is difficult to be solved entirely only by secure key. Designing a new security mechanism, obviating potential security problem effectively and reducing security threat are hard assignment. New approaches are required for WSN development and application. As the WSN’s communication is open, WSNs are highly susceptible and at high risk, thereby effecting the entire system, if suitable safety measures are not taken. Authentication between WSN’s plays an important role in securing data transmission against various types of attacks like node impersonation, falsification of data, replay attacks etc. Another issue is that WSN’s are a combination of many tiny and low-cost sensor nodes where they have limited energy and limitedcomputationabilitytoprocessortransmit the data. Thereby securing WSNs with it presents environmental resource-constrained has been becoming a challenging task. WSN’s is a combination of multiple self organized sensor nodes capable of communicating wirelessly and security requirements are similar to any usual computer networks [1, 2]. As the WSNs have various constrains, all security solutions applicable forconventional computer networks Fig No. 1.2: Functionality of a Sensor Node Problems to be Evaluated: Proposed a proficient gathering key exchange convention in view of a direct mystery sharing for remote sensor systems (WSNs), if aggregate key validation.Security examinationfor conceivable assaults is incorporated. Therefore, this convention can oppose potential assaults and furthermore fundamentally diminish the overhead of framework execution. Proposed Algorithm: Here we have implemented ECC for WSN on a Matlab simulator. From the survey made in our earlier stages, we can conclude that ECC is a better algorithm than RSA as it requires smaller key without compromising with the security aspects. We have tried to implement a topology. One of the major concerns is the mutual authentication between the nodes in WSN’s. This issue is resolved by the proposed ECC technique used for secure data communication. In our topology there is a Sender and a Receiver, where they are communicating and data transfer takes place among them self. We also have shown an attacker as Eve, who also tries to access the data transmitted between the Sender and the Receiver. Since the data andWSN nodes,bothareinopen and vulnerable for attackers, there is a need for security within the nodes and for the data. By implementing ECC in WSN, the nodes can securely transmit data. The Sender and Receiver each generate their ownPrivateKeyandPublic Key for each others. These keys are generated using the elliptic curve and the points on that curve generated. Both the Sender and receiver decide on to which curve and the finite points. When a node wants to communicate or send date with some other node, then the sender node uses its own Private Key and the Public Key of the intended node to generate a Shared Key. This Shared Key is used for Encryption of the data to send across other nodes. Once a node receives a data, the receiver also generates a Shared Key. This Shared Key is used for Decryption ofthedata atthe receiver end. On the other hand the Eve also receives the Public Keys generated by both the Sender and the Receiver nodes. We also try to show that the Eve in spite of having the Public Keys of both the nodes still cannot generate the Shared Keys as the Eve does not have the Private Keys of both the nodes, thus securing the data. We also show that even if the Eve generates same set of points in the elliptic curve and assuming that Eve also has same set of finite points, still it is not possible for the Eve to generate the Shared key. By the time Eve tries to decrypt the data using various keys, next set of data transmissions are over .
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 173 Results: In the wake of performing nuts and bolts of calculation we have gotten taking after reproduction comes about indicating essentials of encryption unscrambling comes about. Utilization of this symmetric calculation gives us the outcomes demonstrating that the this calculation is more suited over the uneven ones as the symmetrical calculations are more dependable with variable key administration era procedures giving productive security objectives as the key size is in distinguishable and shifted at each progression without being in need to make them known to all hubs in a system as private key is not figured by open key of the system gave as a security highlight of deviated cryptosystems. Likewise the symmetricalcryptosystems are more effective in security objectives accomplishment when contrasted with asymmetrical ones as they have to give the connection keys publically which causes unapproved assaults and client's information security surrenders. Fig No. 1.3: Nodes formation for base paper. Fig No.1.4: Total stimulation time graph Fig No 1.5: Simulation time required and dead and alive nodes information of base paper Fig No 1.6: Simulation cluster formation Fig No 1.7: Energy dissipation over time of proposed work simulation results
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 174 Fig No 1.8: Comparison of nodes-70,100,150 for energy dissipation graphs for proposed work. a) For base work-total stimulation time b) for proposed work-total stimulation time Fig No 1.9: Nodes comparison for energy dissipation graphs for proposed work Fig No 1.10 : Delay graphs of 100-nodes-comparision b/w base paper and proposed work Fig No 1.11: Combined delay graphs between base paper and proposed work Fig No 1.12 : Comparison graphs between base paper and proposed work on the basis of energy dissipation Conclusion: We have compared files of various sizes and compared both the algorithms. The results are also shown in terms of bar graphs as shown. The comparison has been made with the standard algorithm, which is a traditional and the mostused algorithm, with proposed algorithm. In our findings, here it is clearly seen that ECC consumes more time once in the beginning, we can see that, for a file size of 7 KB the encryption is drasticallymoreforencryptionand from12 KB it requires less time and increases gradually for encryption. Though ECC requires more time for encryption, the key size is too small compared to RSA. However the decryption time taken by ECC is very less than the traditional RSA algorithm, even if the file size increases as shown. The decryption time for ECC is nearly similar for all files compared to RSA algorithm. Compared with the other three results, our obtained results are better by an average of 20%. The implementation of Elliptic curve can be further extended to implement on hyper elliptic curves on WSN. FurthertheECC can also have various types of point generation methods on the curve and ECC can also be integrated with other cryptographic algorithms for additional security. ACKNOWLEDGEMENT I express my sincere gratitude to the I.K.Gujral Punjab Technical University, Jalandhar for giving me the opportunity to work on the thesis during my final year of M.Tech. I owe mysincerestgratitudetowardsDr.Prabhjot Kaur, Director Engg, Universal Institute of Engineering and Technology, Lalru, for valuable advice and healthy criticism throughout my thesis which helped me immensely to complete my work successfully. I would like to express a deep sense of gratitude and thanks profusely to Er. Rashmi Raj Assistant Professor, DepartmentofElectronics&CommunicationEngineering, UIET, who was the thesis Supervisor. Without the wise counsel and able guidance, itwould have beenimpossible to complete the thesis in this manner. I would like to thank the members of the Departmental Research Committee for their valuable suggestions and healthy criticism during my presentation of the work. I express gratitude to other faculty members of Electronics & Communication Engineering Department, UIET, for their intellectual support throughout the course of this work.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30328 | Volume – 4 | Issue – 3 | March-April 2020 Page 175 References: [1] T. Gao, D. Greenspan, M. Welsh, R. R. Juang, and A. Alm, "Fundamental signs observing and understanding following over a remote system," in Proc. IEEE 27th Annu. Int. Conf. Eng. Med. Biol. Soc. (IEEE-EMBS), Jan. 2006, pp. 102–105. [2] L. Gu et al., "Lightweight recognition and grouping for remote sensor arranges in reasonable conditions," in Proc. third ACM Conf. Implanted Network Sensor System, Nov. 2005, pp. 205–217. [3] G. J. Pottie and W. J. Kaiser, "Remote incorporated system sensors," CommunicationACM,vol.43,no.5,pp. 51–58, 2000. [4] L. Eschenauer and V. D. Gligor, "A key-administration plot for dispersed sensor systems," inProc. ninth ACM Conf. CCS, 2002, pp. 41–47. [5] H. Chan, A. Perrig, and D. Melody, "Irregular key pre appropriation plans for sensor systems,"in Proc. IEEE Symp. SP, May 2003, pp. 197–213. [6] W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key administration conspire forremote sensorsystems utilizing organization learning," in Proc. IEEE INFOCOM, Mar. 2004, pp.586–597. [7] A. Rasheed and R. Mahapatra,"Keyredistributionplans for building up pairwise keys with aversatile sink in sensor systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 1, pp. 176–184,Jan. 2011. [8] S, Ruj, A, Nayak, and I. Stojmenovic,"Pairwiseandtriple key dispersion in remote sensor systems with applications," IEEE Trans. Comput., vol. 62, no. 11, pp. 2224–2237, Nov. 2013. [9] F. Li and P. Xiong, "Reasonable secure correspondence for incorporating remote sensor systems into the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3677–3684, Oct. 2013. [10] R. Blom, "Non-open key appropriation," in Advances in Cryptology, D. Chaum, R. L. Rivest, and A. T. Sherman, Eds. New York, NY, USA: Plenum, 1982, pp. 231–236. [11] Daehee Kim, Sunshin ―Ef icient and Scalable Public Key Infrastructurefor Wireless SensorNetworks‖,This work was partly supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST), (No. 2012KlA3AlA09026959) 978-1-4799-5874-0/14/©2016 IEEE.