SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2589
Asymmetrical Encryption for Wireless Sensor Networks: A
Comparative Study
Heena Dogra1, Jyoti Kohil2
1Student, M-Tech, Electronics and Communication Engineering, Jalandhar, Punjab, India
2Assistant Professor, Department of Electronics and Electrical Engineering, Jalandhar, Punjab, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In wireless sensor networks use of nodes which
serves as the communicating devices in the networks. The use
of such nodes comes with the security issues like data
confidently, data availability, authentication, data integrity.
All these issues should be solved by using cryptography
techniques to provide efficient and reliable security for secure
data transmission. This paper speaks to a review over the
utilization of cryptography procedures in WSNs. The primary
concentration of this paper is utilization of public key
cryptography procedures over thesymmetricaloneandgiving
a solid and secure information transmission.
Key Words: Wireless Sensor Networks (WSNs), Efficient
and Reliable Security, Security Issues, Cryptography.
1. INTRODUCTION
The first section of this paper provides the introductory
concepts of WSN, security issues and requirements. The
section II reviews the various cryptographic techniques. In
section III the reviews for the typesofcryptography withkey
management ideas. Section IV contains the current and
future work in asymmetrical cryptography and section V
provides the general views of our work on the concluded
comparison between cryptography techniques and at last
this paper is finished up with section VI.
1.1 WIRELESS SENSOR NETWORKS.
A remote sensor system has a storage facility of capacity,
handling, detecting and transmission as principle electronic
parts in a conveyed way. It contains countless, self-
coordinated and, low controlled gadgets called sensor hubs
which are utilized to detect the nearness of wanted
application like temperature control, fire cautions,
development location, and so forth. In WSNs an extensive
number of haphazardly disseminated, battery-worked,
inserted gadgets that are utilized to gather, prepare, and
pass on information to the clients as a matter of course as its
fundamentals of operation [1]. Every hub is intended for
performing errands like gathering information, detecting,
preparing and speaking with different hubs [2]. For some
ongoing applications the sensor hubs are performing
distinctive diverse undertakings like distinguishing the
neighbor hubs, savvy detecting, putting away of information
and handling of put away information, information total,
following of target, control and observing, hub restriction,
synchronization and proficient steering amongst hubs and
base station [3]. As appeared in figure 1 the WSN contains a
detecting unit, a handling unit and an imparting unit every
one of these units are controlled by a powerunitusedtogive
the working of WSNs by utilizing these critical units to give
dependable and productive working of conveying between
the hubs and for secure information transmission imparting
between the hubs ought to be solid and effective.
Fig- 1: Block Diagram of Wireless Sensor Network
WSNs couldn't give a solid and an effective working model
because of the dangers of systems administration. These
dangers are influencing distinctive layers of imparting
conventions essentially, transport layer, organize layer,
session and application layers. Before actualizing
information uprightness, information secrecy, and
information validation we should managethesedangersand
ought to discover some approaches to maintain a strategic
distance from them.
1.2 THREATS IN WSNs.
The following threats in wireless sensor network includes
basically security issues of the secure data transmission in
WSNs during node communication includes some of the
basic communication threats and some advance threats
which affects the wireless sensor network’s working model
[4]. The following table shows the basic threats involvement
in WSNs.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2590
Table -1: Threats in WSNs.
Threaets Description
False node
insertion
Flow false data and prevents the
true data to flow.
Routing attack Changes the routingpathcausing
Sinkhole, Warm hole.
Malicious data False observations.
Subversion of
node
Node misbehavior causes
extraction of data.
1.3 SECURITY REQUIREMENTS.
When managing security in WSNs, mostly the issue is
accomplishing thesecurityamidtransmissionofinformation
over the communication system which includes a few or all
security issues portrayed beneath. There are different
security issues in WSN as takes after [5].
1. Data Integrity: It is the ability to confirm the messagehas
not been changed while it was on the network i.e. messaging
authentication.
2. Data Freshness: Ensures that the informationislater,and
no old messages have been sending again i.e. stays away
from replay of messages.
3. Data Availability: Determines whether a node has the
ability to use the resources and whether the network is
available for the messages to communicate i.e. node
availability is there or not.
4. Data Confidentiality: It is the abilitytohidemessagefrom
a passive attacker i.e. data encryptionordata authentication.
5. Self-Organization:Aremotesensorarrangerequireseach
sensor hub to be autonomous and sufficiently adaptable to
act naturally sorting out and self-recuperating as indicated
by various circumstances i.e. long life time ought to be there
for a hub in a system.
6. Authentication: Ensures that the communication from
one node to another node is authorized i.e. authenticated
users are communicating in a network to avoid attacker’s
forgery.
2. CRYPTOGRAPHY TECHNIQUES.
Cryptography plans are created to meet the fundamental
security prerequisites of secrecy and honesty in systems to
give dependable and productive secure information
transmission i.e. security of information and client's
character over an uncertain system. Cryptography is
basically encryption techniques used for encryption of data
or information into some secured data packetsofcodeddata
words i.e. raw data is converted into a secure coded data
packets, which is beingtransmittedoverthe network instead
of direct original data packets transmission in an insecure
format. Encrypted data is basically a set of some extra bits
along with the data bits for securing the original data from
being accessed by the unauthorized users’ means the
original data is encrypted into some data bits in a coded
form by changing its actual sequence into some random
occurrence. During transmission encrypted data which is
secured and compatible to the existing protocols over the
network operating as a layered model of network i.e.
compatible for transmission over the physical, data link,
transport, and network and application layers in a secure
way without being affected by threats of protocols layered
architecture as original sequence of data is randomized
using encryption techniques.
Cryptography is basically of two types: Symmetric
Cryptography (secret key) and Asymmetrical Cryptography
(public key) [6].
1. Symmetrical cryptography / Symmetric
encryption / secret-key cryptography:
Most referred earlier technique and uses only a singlesecret
key for both encryption and decryptionofthedata packetsin
a communicating network which is kept as secret in a
network as shown in Figure 2. This technique makes use of
only a single key called secret key which is shared between
the communicating parties over the network, thus this
process of sharing the key is much threat prone. The further
classification of Symmetric key algorithms isi)block ciphers
for fixed transformations i.e. when data transmission is
considered to be of fixed size as every time the sequence of
data bits and their size is same with may be same or
different content, and ii) stream ciphers for time varying
transformations, where size is variedaccordingtothelength
and type of data being transmitted over the network. The
two subdivisions are used for comparing encryption
algorithms on plain texts of the algorithm at various levels
for example, the levels would be considered as various data
types, battery power consumption parameters, variousdata
block sizes, for various key sizes [14] [15] and various
encryption/decryption speeds [7] [8] used as comparison
basics.
Fig- 2: Symmetric -Key Cryptography.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2591
Keeping the key secreted in the network in the most difficult
task in the network as this key more prone to threats over
the insecure channel [9]. Examples of Symmetric key
cryptosystems are AES, DES, RC4 CAST,RC5algorithmsused
in WSN [12] [13] [14] [15] these are the algorithms
employed to implement the symmetrical encryption
techniques but not used mostly now as it is as the threat
levels are high, they are used in combinations to provide
secure data transmission.
2. Asymmetric Cryptography/Asymmetric
encryption /public-key cryptography:
Being used at present time as cryptography technique in
recent years due to its advantages over symmetrical
techniques which were used toencryptanddecryptthedata.
Asymmetrical cryptography strategyutilizestwokeyspublic
and private keys for information encryption and decryption
which stays away from the danger of key partaking in a
system to execute solid security needs as the general public
key just shared over the uncertain system yet the
unscrambling should be possible just by utilizing theprivate
key which is accessible just to the decoding hubatgoal [9]as
appeared in figure 3.
Fig- 3: Asymmetric Key Cryptography.
The keys are used as two-way security providers as the
algorithm uses a pair of keys which are not same and not
made for same encryption and decryption purpose, private
key never makes the encrypted data publically known to
every user it is only provided to the authorized users for
accessing the data and by having matched private key a user
can decrypt the data at the destination end comparing its
public and private key with the sender’s public and private
key i.e. key sharing of public key could not benefits the
attacker to decrypt the data as for decrypting the data
private key is required and which is not shared over the
network only authorized user is having private key for data
decryption.
3. ASYMMETRICAL CRYPTOGRAPHY
IMPLEMENTATIONS.
A public key cryptography/Asymmetrical Cryptography is
basically used now as this cryptography technique avoids
threats of security more efficiently then symmetrical ones.
As the basic principle of public key says it consists of a pair
of related and different keys i) public: provided publicallyto
all the users in a communicating network ii) private: user
specified i.e. between only two secured and authorized
users. The keys are related to each other but
computationally different as theyaretwodifferentkeys,also
we cannot determine our private key using our public key
because of having different computation processing [10] as
shown in figure 4 thus higher level attacks are avoided by
using such cryptography algorithms and also degrades
security complexities by avoiding known key in a network
i.e. public key only used for encryption of data but not for
decryption of data therefore, mostly applicable for data
communication in present era [11].
3.1 PUBLIC KEY CRYPTOGRAPHY.
Asymmetric cryptography such as the Diffie-Hellman key
exchange system [14] [15], ECC or RSA signatures are
typically used in WSNs [12]. Mostly RSA are easy to
employee thus used widely in WSNs. RSA is having easy
computational capabilities but employed less as the new
developments like ECC provides less hardware
implementations as compared to RSA but for the software
developments mostly RSA is preferred due to its easy
computational processing’s.
Fig- 4: Public key cryptography.
3.2 KEY MANAGEMENT.
Key administration is the most up to date scope for
actualizing open key cryptography in WSNs which is
generally utilized now as open key encryption system. Key
administration is a fundamental security issue in remote
sensor systems to set up the safe correspondence utilizing
cryptographic advances between sensor hubs in a detected
region over a shaky system. Key administration is the
procedure by which cryptographic keys are produced, put
away, secured, exchanged, stacked, utilized, anddemolished
in a system. There are four central issues in a key
administration system:
1. Key arrangement/pre-circulation: How to characterize
the path by which the key appropriation oughtto befinished
prior to the hubs are sent and what number of keys are
required for arrangement in entire system?
2. Key foundation: How a gathering of hubs could build up
any protected session in the imparting system over an
uncertain channel or system for secure information
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2592
transmission in WSNs and being not influenced by the
dangers in the system layers?
3. Part/hub option: How ought to a hub could be added to
the system to such an extent that it ought to have the
capacity to set up secure sessions with existing hubs in the
system, while not having the capacity to make issues for
pervious information stream in the system?
4. Part/hub expulsion: How ought to a hub could be
expelled from the system to such an extent that it won't
again have the capacity to build up secure sessions with any
of the current hubs in the system, and not have the capacity
to interpret next information stream in the system?
4. CURRENT AND FUTURE WORK.
In WSNs Symmetrical cryptography are more prone to
security issues while the stronger asymmetrical
cryptography still seems to be applicable one in providing
security for secure data transmission needs. The Public key
cryptosystems are used presently for solving securityissues
of WSNs currently mostly ECC, RSA, LPKC (large size PKC),
MQ-PKC (multivariate quadratic PKC)[12][13][14][15]are
used along with key generation techniques either using
static key generation or by using group key generation
providing number of WSNs applications successful
implementations [14] [15]. Thekeygenerationisthebasicof
new work being deployed in WSNs while are implementing
public key cryptography in today’s scenario as with key
generation the problems regarding key exchange and key
sharing are being solved easily.
4.1 WORK BEING DONE.
The study of key management schemes are based on the
review of some research papers defining some works done
on cryptography for solving security issues on data
transmission over the network.
1. Wenliang Du. Jing Deng. Yunghsidng S. Hant. Shigang
ChenT. also, Prainod K. Varshney (2004): "A Key
Management Scheme for Wireless Sensor Networks Using
Deployment Knowledge"- this paper concentrates on the
ideas based to accomplish securityinremotesensorsystems
for which it is essential to encode messages sent among
sensor hubs. Keys for encryption purposes must be settled
upon by conveying hubs.
2. Examination of cryptography for remote sensor arrange
security by F. Amin, A. H. Jahangir, and H. Rasifard (2008):
According to their review RSA isnota productivemethod for
information encryption in WSNs. For this they have
ComparedECC-160andRSA-1024.Resultsdemonstrates that
execution of RSA cryptography devours more endeavors for
actualizingsecurityprerequisiteswhencontrastedwithECC-
224 which gives more plausible, time and power utilization
arrangements.
3. Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah,
Ahlem Bencheikh (2010): "An Efficient and Highly Resilient
Key Management Scheme for Wireless Sensor Networks"-
portrays the assets constraint of WSNs makes the general
population key based arrangements, which offer more
proficient key administration administrations, inadmissible
for remote sensor systems. In this paper, a novel effective
tree-based probabilistic key administration conspire which
is exceedingly flexible against hub catch assaults.
Arrangement depends on symmetric cryptography with a
probabilistic key pre-dispersion.
4. Unforgiving Kupwade Patil, Joseph Camp, Stephen A.
Szygenda (2012): In thispaper,proposedanarea andvitality
productive directing plan utilizing character bases
cryptography. Explored the established particular sending
assault on WSN and perceive how a personality based
cryptographic plan utilizing a cross-layer configuration
approach is useful in evading such an assault. Also,
demonstrated that a personality basedcryptographicway to
deal with steering in WSN is more down to businessthen the
conventional open key framework (PKI) based plans.
5. Kun Mu, Qingmin Cui (2012): This paper depends on "An
Efficient Pairwise Key Establishment Scheme for Wireless
Sensor Networks" portraying about the Wireless Sensor
Networks (WSNs) and Security in WSNs whichisbasicwhen
there are potential foes. In this paper, novel key
administration conspire for remote sensor systems are
assessed. The plan depends on EG plan and utilize one-way
hash capacity to produce another key pool from a given key
pool. Contrasted with leaving key pre conveyanceconspires,
this plans is generously more strength against sensor hubs
catch.
6. Information security utilizing open key cryptography in
WSNs by Amin Reza Sedghi, Mohammad Reza Kaghazgaran
(June 2013): The utilization of open key cryptography on
little remote gadgets is given unraveling to solid and
effective verification and key trade conventions
prerequisites.
7. PKC-Based DoS Attacks-Resistant Scheme in Wireless
Sensor Networks by Daehee Kim, Sunshin An (April 15,
2016): PKC-based cryptography resistance plans regard
dodge DoS assaults and are vitality proficient and
dependably holds information bundlesunderacknowledged
limit constrains regardless of the possibility that vast
number of false parcels are being produced by neighboring
cells.
8. Open Key Cryptographic Primitives in Wireless Sensor
Networks by Kyung-Ah Shim (2016): For information
correspondence and transmission PKC primitives are
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2593
productive arrangement suppliers in settling on choicesand
outlining security conspires on WSN systems which are
straightforwardly material for WSNs applications without
much adjustment.
9. Key eras from remote channels by Junqing zhang, Trungq.
Duong, Alan marshall, and Roger woods (2016): For simple
and proficient reasonable working of key era with
cryptography calculations in WSNs arbitrary key era for
remote correspondence channels are utilized.
5. COMAPARISION RESULTS.
The following resultsareobtained byapplyingtheconcluded
work.
0 50 100 150
-1
-0.5
0
0.5
1
Dead Nodes In Network
Rounds
DeadNodes
0 50 100 150
99
99.5
100
100.5
101
Alive Nodes In Network
Rounds
Alive
Fig- 4: Node formation and comparision of dead and alive
nodes.
0 20 40 60 80 100 120
0.7
0.8
0.9
1
1.1
1.2
1.3
1.4
1.5
1.6
x 10
-5
Rounds
Delay
Fig- 5: Dealy graph.
0 10 20 30
0.985
0.99
0.995
1
1.005
energydissipatedbyNodes
time
0 20 40 60
0.97
0.98
0.99
1
1.01
energydissipatedbynodes
time
0 20 40 60 80
0.94
0.96
0.98
1
energydissipatedbyNodes
time
0 50 100
0.94
0.96
0.98
1
energydissipatedbyNodes
time
Fig- 6: Energy dissipation graphs based on asymmetrical
techniques.
6. CONCLUSIONS
In this way finished up data proposes that the Public key
cryptography is more useful as a result of its low memory
utilization, low CPU utilization, and little key size over
symmetrical plans. These plans givepositivevitalitybenefits
than doing irregular drops as in key administration plans.
The time calculationsaremoredependablewithvariable key
administration era procedures giving proficient security
objectives as the key size is indistinguishable and differedat
each progression without being in need to make them
known to all hubs in a system as key calculation for key
calculation for computing open key and private key is not
same and not indistinguishable keys are utilized for
encryption and decryption. Thesymmetrical cryptographyis
not appropriate for WSNs when contrasted with
asymmetrical cryptography as symmetrical cryptosystems
because of maintain a strategic distance from security
dangers effectively. Notwithstandingkeyadministrationand
security, public key cryptography can be the effective and
dependable plan for number of WSNs applications as key
administration scopes the general public key cryptosystems
more solid and productive type of key era and trade handle.
Likewise the public cryptosystems are more proficient in
security objectives accomplishment when contrasted with
symmetrical ones as symmetrical ones needs to give the
connection keys publically which causes unapproved
assaults and client's information security absconds while
public cryptosystems does not have to publically profittheir
key era as public key is utilized for encryption is promptly
accessible yet the private key utilizedforunscramblingisnot
made accessible in this manner security dangers decreases
as assailant have no learning in regards to the private key
which can decode the information hence information
respectability, information secrecy, and validation could be
accomplished which gives the fundamental secure
transmission needs achievement.
REFERENCES
[1] K. Akkaya and M. Younis, "A Survey on steering
conventions for remote sensor systems, Ad Hoc
arranges", 3 (2005), pp 325-349.
[2] Gustavo S. Quirino, Admilson R. L. Riberio and Edward
David Moreno "Hilter kilterEncryptioninremotesensor
systems", 8(2012), http;// dx.doi.org/10.5772/48464.
[3] E. Shi and A. Perrig, "Outlining secure sensor systems".
Remote correspondence magazine, 11 (6), pp 37-43,
2004.
[4] Y. Wang, G. Attebeery, and B. Ramamurthy, "A Survey of
security issues in remote sensor systems", IEEE
correspondence overviews and instructional exercises,
8(2): pp 2-23, 2006.
[5] Y. Wang, W. Hmm, S. Chellappan, Dong Xuan, and Ten H.
Laii, "Seek based physical assaults in sensor systems:
Modeling and Defense, specialized report, bureau of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2594
software engineering and designing, Ohio state college,
2005.
[6] Shish Ahmad, MohamadRizwanask,andQamarAbbas,"
Energy sparing secure structure for sensor arrange
utilizing circular bend cryptography Mobile Adhoc
systems", pp 167-172, 2012.
[7] R. Ahlswede and I. Csiszar,"Common irregularityindata
hypothesis and cryptography I. mystery sharing" , vol.
39, no.4, pp 1121-1132, July.1993.
[8] D. Han Kerson, A. Meneres, S. Vanstone, "Manual for
Elliptical bend cryptography", Springer-Verlag New
York, Inc. 2004.
[9] A. J. Menezes, P.C. Van oorschot, S.A. Vanstone,
"Handbook of connected cryptography", 1997.
[10] G. Gaubtaz, J. P. Kaps, and B. Sunar, "Open key
cryptography in sensor systems returned to", pp 1-17,
2004.
[11] A. S. Meander, N. Gura, H. Eberle, V. Gupta and S.C.
Shantz, "Vitality examination of open key cryptography
for remote sensor arrange", pp 324-328, 2005.
[12] Zhang Yu, "The Scheme of open key foundation for
enhancing remotesensorsystemssecurity",pp167-172,
2003
[13] W. Du, J. Deny, Y. S. Han, Shigang Chen, P. K.Varshney,"A
key administration conspire for remote sensororganize
utilizing arrangement learning", 2004.
[14] O. Gungor, F. Chen, C. E. Koksal, "Emit key era through
restriction and portability", vol. 6, no. 6, pp 2214-2230,
Jun. 2015.
[15] H. Liu, J. Yang, Y. Wang, Y. Chen and C. E. Koksal, "Gather
key era", vol. 13, no. 12, pp 2820-2835, Dec 2014.
BIOGRAPHY
HEENA DOGRA
Student, M-Tech,
Electronics and
Communication
Engineering, Jalandhar,
Punjab, India

More Related Content

What's hot

Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkIRJET Journal
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...University of Southern California
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewalleSAT Publishing House
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challengesTELKOMNIKA JOURNAL
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network SecurityIRJET Journal
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET Journal
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
A Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture IndustryA Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture Industrydrboon
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...rahulmonikasharma
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Securityijtsrd
 

What's hot (20)

Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
Review on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewallReview on redundancy removal of rules for optimizing firewall
Review on redundancy removal of rules for optimizing firewall
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challenges
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
A Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture IndustryA Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture Industry
 
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
Biometric Based Intrusion Detection System using Dempster-Shafer Theory for M...
 
A Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT SecurityA Novel SDN Architecture for IoT Security
A Novel SDN Architecture for IoT Security
 
Lecture 17
Lecture 17Lecture 17
Lecture 17
 

Similar to Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study

Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksIRJET Journal
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelIRJET Journal
 
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...IRJET Journal
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesIRJET Journal
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET Journal
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformIRJET Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 

Similar to Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study (20)

Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor NetworksReview for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
 
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...Advancements in Network Infrastructure: Replication, Expansion, and Security ...
Advancements in Network Infrastructure: Replication, Expansion, and Security ...
 
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET-  	  Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoT
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2589 Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study Heena Dogra1, Jyoti Kohil2 1Student, M-Tech, Electronics and Communication Engineering, Jalandhar, Punjab, India 2Assistant Professor, Department of Electronics and Electrical Engineering, Jalandhar, Punjab, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In wireless sensor networks use of nodes which serves as the communicating devices in the networks. The use of such nodes comes with the security issues like data confidently, data availability, authentication, data integrity. All these issues should be solved by using cryptography techniques to provide efficient and reliable security for secure data transmission. This paper speaks to a review over the utilization of cryptography procedures in WSNs. The primary concentration of this paper is utilization of public key cryptography procedures over thesymmetricaloneandgiving a solid and secure information transmission. Key Words: Wireless Sensor Networks (WSNs), Efficient and Reliable Security, Security Issues, Cryptography. 1. INTRODUCTION The first section of this paper provides the introductory concepts of WSN, security issues and requirements. The section II reviews the various cryptographic techniques. In section III the reviews for the typesofcryptography withkey management ideas. Section IV contains the current and future work in asymmetrical cryptography and section V provides the general views of our work on the concluded comparison between cryptography techniques and at last this paper is finished up with section VI. 1.1 WIRELESS SENSOR NETWORKS. A remote sensor system has a storage facility of capacity, handling, detecting and transmission as principle electronic parts in a conveyed way. It contains countless, self- coordinated and, low controlled gadgets called sensor hubs which are utilized to detect the nearness of wanted application like temperature control, fire cautions, development location, and so forth. In WSNs an extensive number of haphazardly disseminated, battery-worked, inserted gadgets that are utilized to gather, prepare, and pass on information to the clients as a matter of course as its fundamentals of operation [1]. Every hub is intended for performing errands like gathering information, detecting, preparing and speaking with different hubs [2]. For some ongoing applications the sensor hubs are performing distinctive diverse undertakings like distinguishing the neighbor hubs, savvy detecting, putting away of information and handling of put away information, information total, following of target, control and observing, hub restriction, synchronization and proficient steering amongst hubs and base station [3]. As appeared in figure 1 the WSN contains a detecting unit, a handling unit and an imparting unit every one of these units are controlled by a powerunitusedtogive the working of WSNs by utilizing these critical units to give dependable and productive working of conveying between the hubs and for secure information transmission imparting between the hubs ought to be solid and effective. Fig- 1: Block Diagram of Wireless Sensor Network WSNs couldn't give a solid and an effective working model because of the dangers of systems administration. These dangers are influencing distinctive layers of imparting conventions essentially, transport layer, organize layer, session and application layers. Before actualizing information uprightness, information secrecy, and information validation we should managethesedangersand ought to discover some approaches to maintain a strategic distance from them. 1.2 THREATS IN WSNs. The following threats in wireless sensor network includes basically security issues of the secure data transmission in WSNs during node communication includes some of the basic communication threats and some advance threats which affects the wireless sensor network’s working model [4]. The following table shows the basic threats involvement in WSNs.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2590 Table -1: Threats in WSNs. Threaets Description False node insertion Flow false data and prevents the true data to flow. Routing attack Changes the routingpathcausing Sinkhole, Warm hole. Malicious data False observations. Subversion of node Node misbehavior causes extraction of data. 1.3 SECURITY REQUIREMENTS. When managing security in WSNs, mostly the issue is accomplishing thesecurityamidtransmissionofinformation over the communication system which includes a few or all security issues portrayed beneath. There are different security issues in WSN as takes after [5]. 1. Data Integrity: It is the ability to confirm the messagehas not been changed while it was on the network i.e. messaging authentication. 2. Data Freshness: Ensures that the informationislater,and no old messages have been sending again i.e. stays away from replay of messages. 3. Data Availability: Determines whether a node has the ability to use the resources and whether the network is available for the messages to communicate i.e. node availability is there or not. 4. Data Confidentiality: It is the abilitytohidemessagefrom a passive attacker i.e. data encryptionordata authentication. 5. Self-Organization:Aremotesensorarrangerequireseach sensor hub to be autonomous and sufficiently adaptable to act naturally sorting out and self-recuperating as indicated by various circumstances i.e. long life time ought to be there for a hub in a system. 6. Authentication: Ensures that the communication from one node to another node is authorized i.e. authenticated users are communicating in a network to avoid attacker’s forgery. 2. CRYPTOGRAPHY TECHNIQUES. Cryptography plans are created to meet the fundamental security prerequisites of secrecy and honesty in systems to give dependable and productive secure information transmission i.e. security of information and client's character over an uncertain system. Cryptography is basically encryption techniques used for encryption of data or information into some secured data packetsofcodeddata words i.e. raw data is converted into a secure coded data packets, which is beingtransmittedoverthe network instead of direct original data packets transmission in an insecure format. Encrypted data is basically a set of some extra bits along with the data bits for securing the original data from being accessed by the unauthorized users’ means the original data is encrypted into some data bits in a coded form by changing its actual sequence into some random occurrence. During transmission encrypted data which is secured and compatible to the existing protocols over the network operating as a layered model of network i.e. compatible for transmission over the physical, data link, transport, and network and application layers in a secure way without being affected by threats of protocols layered architecture as original sequence of data is randomized using encryption techniques. Cryptography is basically of two types: Symmetric Cryptography (secret key) and Asymmetrical Cryptography (public key) [6]. 1. Symmetrical cryptography / Symmetric encryption / secret-key cryptography: Most referred earlier technique and uses only a singlesecret key for both encryption and decryptionofthedata packetsin a communicating network which is kept as secret in a network as shown in Figure 2. This technique makes use of only a single key called secret key which is shared between the communicating parties over the network, thus this process of sharing the key is much threat prone. The further classification of Symmetric key algorithms isi)block ciphers for fixed transformations i.e. when data transmission is considered to be of fixed size as every time the sequence of data bits and their size is same with may be same or different content, and ii) stream ciphers for time varying transformations, where size is variedaccordingtothelength and type of data being transmitted over the network. The two subdivisions are used for comparing encryption algorithms on plain texts of the algorithm at various levels for example, the levels would be considered as various data types, battery power consumption parameters, variousdata block sizes, for various key sizes [14] [15] and various encryption/decryption speeds [7] [8] used as comparison basics. Fig- 2: Symmetric -Key Cryptography.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2591 Keeping the key secreted in the network in the most difficult task in the network as this key more prone to threats over the insecure channel [9]. Examples of Symmetric key cryptosystems are AES, DES, RC4 CAST,RC5algorithmsused in WSN [12] [13] [14] [15] these are the algorithms employed to implement the symmetrical encryption techniques but not used mostly now as it is as the threat levels are high, they are used in combinations to provide secure data transmission. 2. Asymmetric Cryptography/Asymmetric encryption /public-key cryptography: Being used at present time as cryptography technique in recent years due to its advantages over symmetrical techniques which were used toencryptanddecryptthedata. Asymmetrical cryptography strategyutilizestwokeyspublic and private keys for information encryption and decryption which stays away from the danger of key partaking in a system to execute solid security needs as the general public key just shared over the uncertain system yet the unscrambling should be possible just by utilizing theprivate key which is accessible just to the decoding hubatgoal [9]as appeared in figure 3. Fig- 3: Asymmetric Key Cryptography. The keys are used as two-way security providers as the algorithm uses a pair of keys which are not same and not made for same encryption and decryption purpose, private key never makes the encrypted data publically known to every user it is only provided to the authorized users for accessing the data and by having matched private key a user can decrypt the data at the destination end comparing its public and private key with the sender’s public and private key i.e. key sharing of public key could not benefits the attacker to decrypt the data as for decrypting the data private key is required and which is not shared over the network only authorized user is having private key for data decryption. 3. ASYMMETRICAL CRYPTOGRAPHY IMPLEMENTATIONS. A public key cryptography/Asymmetrical Cryptography is basically used now as this cryptography technique avoids threats of security more efficiently then symmetrical ones. As the basic principle of public key says it consists of a pair of related and different keys i) public: provided publicallyto all the users in a communicating network ii) private: user specified i.e. between only two secured and authorized users. The keys are related to each other but computationally different as theyaretwodifferentkeys,also we cannot determine our private key using our public key because of having different computation processing [10] as shown in figure 4 thus higher level attacks are avoided by using such cryptography algorithms and also degrades security complexities by avoiding known key in a network i.e. public key only used for encryption of data but not for decryption of data therefore, mostly applicable for data communication in present era [11]. 3.1 PUBLIC KEY CRYPTOGRAPHY. Asymmetric cryptography such as the Diffie-Hellman key exchange system [14] [15], ECC or RSA signatures are typically used in WSNs [12]. Mostly RSA are easy to employee thus used widely in WSNs. RSA is having easy computational capabilities but employed less as the new developments like ECC provides less hardware implementations as compared to RSA but for the software developments mostly RSA is preferred due to its easy computational processing’s. Fig- 4: Public key cryptography. 3.2 KEY MANAGEMENT. Key administration is the most up to date scope for actualizing open key cryptography in WSNs which is generally utilized now as open key encryption system. Key administration is a fundamental security issue in remote sensor systems to set up the safe correspondence utilizing cryptographic advances between sensor hubs in a detected region over a shaky system. Key administration is the procedure by which cryptographic keys are produced, put away, secured, exchanged, stacked, utilized, anddemolished in a system. There are four central issues in a key administration system: 1. Key arrangement/pre-circulation: How to characterize the path by which the key appropriation oughtto befinished prior to the hubs are sent and what number of keys are required for arrangement in entire system? 2. Key foundation: How a gathering of hubs could build up any protected session in the imparting system over an uncertain channel or system for secure information
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2592 transmission in WSNs and being not influenced by the dangers in the system layers? 3. Part/hub option: How ought to a hub could be added to the system to such an extent that it ought to have the capacity to set up secure sessions with existing hubs in the system, while not having the capacity to make issues for pervious information stream in the system? 4. Part/hub expulsion: How ought to a hub could be expelled from the system to such an extent that it won't again have the capacity to build up secure sessions with any of the current hubs in the system, and not have the capacity to interpret next information stream in the system? 4. CURRENT AND FUTURE WORK. In WSNs Symmetrical cryptography are more prone to security issues while the stronger asymmetrical cryptography still seems to be applicable one in providing security for secure data transmission needs. The Public key cryptosystems are used presently for solving securityissues of WSNs currently mostly ECC, RSA, LPKC (large size PKC), MQ-PKC (multivariate quadratic PKC)[12][13][14][15]are used along with key generation techniques either using static key generation or by using group key generation providing number of WSNs applications successful implementations [14] [15]. Thekeygenerationisthebasicof new work being deployed in WSNs while are implementing public key cryptography in today’s scenario as with key generation the problems regarding key exchange and key sharing are being solved easily. 4.1 WORK BEING DONE. The study of key management schemes are based on the review of some research papers defining some works done on cryptography for solving security issues on data transmission over the network. 1. Wenliang Du. Jing Deng. Yunghsidng S. Hant. Shigang ChenT. also, Prainod K. Varshney (2004): "A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge"- this paper concentrates on the ideas based to accomplish securityinremotesensorsystems for which it is essential to encode messages sent among sensor hubs. Keys for encryption purposes must be settled upon by conveying hubs. 2. Examination of cryptography for remote sensor arrange security by F. Amin, A. H. Jahangir, and H. Rasifard (2008): According to their review RSA isnota productivemethod for information encryption in WSNs. For this they have ComparedECC-160andRSA-1024.Resultsdemonstrates that execution of RSA cryptography devours more endeavors for actualizingsecurityprerequisiteswhencontrastedwithECC- 224 which gives more plausible, time and power utilization arrangements. 3. Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah, Ahlem Bencheikh (2010): "An Efficient and Highly Resilient Key Management Scheme for Wireless Sensor Networks"- portrays the assets constraint of WSNs makes the general population key based arrangements, which offer more proficient key administration administrations, inadmissible for remote sensor systems. In this paper, a novel effective tree-based probabilistic key administration conspire which is exceedingly flexible against hub catch assaults. Arrangement depends on symmetric cryptography with a probabilistic key pre-dispersion. 4. Unforgiving Kupwade Patil, Joseph Camp, Stephen A. Szygenda (2012): In thispaper,proposedanarea andvitality productive directing plan utilizing character bases cryptography. Explored the established particular sending assault on WSN and perceive how a personality based cryptographic plan utilizing a cross-layer configuration approach is useful in evading such an assault. Also, demonstrated that a personality basedcryptographicway to deal with steering in WSN is more down to businessthen the conventional open key framework (PKI) based plans. 5. Kun Mu, Qingmin Cui (2012): This paper depends on "An Efficient Pairwise Key Establishment Scheme for Wireless Sensor Networks" portraying about the Wireless Sensor Networks (WSNs) and Security in WSNs whichisbasicwhen there are potential foes. In this paper, novel key administration conspire for remote sensor systems are assessed. The plan depends on EG plan and utilize one-way hash capacity to produce another key pool from a given key pool. Contrasted with leaving key pre conveyanceconspires, this plans is generously more strength against sensor hubs catch. 6. Information security utilizing open key cryptography in WSNs by Amin Reza Sedghi, Mohammad Reza Kaghazgaran (June 2013): The utilization of open key cryptography on little remote gadgets is given unraveling to solid and effective verification and key trade conventions prerequisites. 7. PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks by Daehee Kim, Sunshin An (April 15, 2016): PKC-based cryptography resistance plans regard dodge DoS assaults and are vitality proficient and dependably holds information bundlesunderacknowledged limit constrains regardless of the possibility that vast number of false parcels are being produced by neighboring cells. 8. Open Key Cryptographic Primitives in Wireless Sensor Networks by Kyung-Ah Shim (2016): For information correspondence and transmission PKC primitives are
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2593 productive arrangement suppliers in settling on choicesand outlining security conspires on WSN systems which are straightforwardly material for WSNs applications without much adjustment. 9. Key eras from remote channels by Junqing zhang, Trungq. Duong, Alan marshall, and Roger woods (2016): For simple and proficient reasonable working of key era with cryptography calculations in WSNs arbitrary key era for remote correspondence channels are utilized. 5. COMAPARISION RESULTS. The following resultsareobtained byapplyingtheconcluded work. 0 50 100 150 -1 -0.5 0 0.5 1 Dead Nodes In Network Rounds DeadNodes 0 50 100 150 99 99.5 100 100.5 101 Alive Nodes In Network Rounds Alive Fig- 4: Node formation and comparision of dead and alive nodes. 0 20 40 60 80 100 120 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5 1.6 x 10 -5 Rounds Delay Fig- 5: Dealy graph. 0 10 20 30 0.985 0.99 0.995 1 1.005 energydissipatedbyNodes time 0 20 40 60 0.97 0.98 0.99 1 1.01 energydissipatedbynodes time 0 20 40 60 80 0.94 0.96 0.98 1 energydissipatedbyNodes time 0 50 100 0.94 0.96 0.98 1 energydissipatedbyNodes time Fig- 6: Energy dissipation graphs based on asymmetrical techniques. 6. CONCLUSIONS In this way finished up data proposes that the Public key cryptography is more useful as a result of its low memory utilization, low CPU utilization, and little key size over symmetrical plans. These plans givepositivevitalitybenefits than doing irregular drops as in key administration plans. The time calculationsaremoredependablewithvariable key administration era procedures giving proficient security objectives as the key size is indistinguishable and differedat each progression without being in need to make them known to all hubs in a system as key calculation for key calculation for computing open key and private key is not same and not indistinguishable keys are utilized for encryption and decryption. Thesymmetrical cryptographyis not appropriate for WSNs when contrasted with asymmetrical cryptography as symmetrical cryptosystems because of maintain a strategic distance from security dangers effectively. Notwithstandingkeyadministrationand security, public key cryptography can be the effective and dependable plan for number of WSNs applications as key administration scopes the general public key cryptosystems more solid and productive type of key era and trade handle. Likewise the public cryptosystems are more proficient in security objectives accomplishment when contrasted with symmetrical ones as symmetrical ones needs to give the connection keys publically which causes unapproved assaults and client's information security absconds while public cryptosystems does not have to publically profittheir key era as public key is utilized for encryption is promptly accessible yet the private key utilizedforunscramblingisnot made accessible in this manner security dangers decreases as assailant have no learning in regards to the private key which can decode the information hence information respectability, information secrecy, and validation could be accomplished which gives the fundamental secure transmission needs achievement. REFERENCES [1] K. Akkaya and M. Younis, "A Survey on steering conventions for remote sensor systems, Ad Hoc arranges", 3 (2005), pp 325-349. [2] Gustavo S. Quirino, Admilson R. L. Riberio and Edward David Moreno "Hilter kilterEncryptioninremotesensor systems", 8(2012), http;// dx.doi.org/10.5772/48464. [3] E. Shi and A. Perrig, "Outlining secure sensor systems". Remote correspondence magazine, 11 (6), pp 37-43, 2004. [4] Y. Wang, G. Attebeery, and B. Ramamurthy, "A Survey of security issues in remote sensor systems", IEEE correspondence overviews and instructional exercises, 8(2): pp 2-23, 2006. [5] Y. Wang, W. Hmm, S. Chellappan, Dong Xuan, and Ten H. Laii, "Seek based physical assaults in sensor systems: Modeling and Defense, specialized report, bureau of
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2594 software engineering and designing, Ohio state college, 2005. [6] Shish Ahmad, MohamadRizwanask,andQamarAbbas," Energy sparing secure structure for sensor arrange utilizing circular bend cryptography Mobile Adhoc systems", pp 167-172, 2012. [7] R. Ahlswede and I. Csiszar,"Common irregularityindata hypothesis and cryptography I. mystery sharing" , vol. 39, no.4, pp 1121-1132, July.1993. [8] D. Han Kerson, A. Meneres, S. Vanstone, "Manual for Elliptical bend cryptography", Springer-Verlag New York, Inc. 2004. [9] A. J. Menezes, P.C. Van oorschot, S.A. Vanstone, "Handbook of connected cryptography", 1997. [10] G. Gaubtaz, J. P. Kaps, and B. Sunar, "Open key cryptography in sensor systems returned to", pp 1-17, 2004. [11] A. S. Meander, N. Gura, H. Eberle, V. Gupta and S.C. Shantz, "Vitality examination of open key cryptography for remote sensor arrange", pp 324-328, 2005. [12] Zhang Yu, "The Scheme of open key foundation for enhancing remotesensorsystemssecurity",pp167-172, 2003 [13] W. Du, J. Deny, Y. S. Han, Shigang Chen, P. K.Varshney,"A key administration conspire for remote sensororganize utilizing arrangement learning", 2004. [14] O. Gungor, F. Chen, C. E. Koksal, "Emit key era through restriction and portability", vol. 6, no. 6, pp 2214-2230, Jun. 2015. [15] H. Liu, J. Yang, Y. Wang, Y. Chen and C. E. Koksal, "Gather key era", vol. 13, no. 12, pp 2820-2835, Dec 2014. BIOGRAPHY HEENA DOGRA Student, M-Tech, Electronics and Communication Engineering, Jalandhar, Punjab, India